Handbook of research on modern cryptographic solutions for computer and cyber security B Gupta, DP Agrawal, S Yamaguchi IGI global, 2016 | 399 | 2016 |
Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art E Alomari, S Manickam, BB Gupta, S Karuppayah, R Alfaris arXiv preprint arXiv:1208.0403, 2012 | 282 | 2012 |
Evolving fuzzy neural network for phishing emails detection A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ... Journal of Computer Science 8 (7), 1099, 2012 | 59 | 2012 |
Malware detection using deep learning and correlation-based feature selection ES Alomari, RR Nuiaa, ZAA Alyasseri, HJ Mohammed, NS Sani, MI Esa, ... Symmetry 15 (1), 123, 2023 | 54 | 2023 |
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network RMA Saad, M Anbar, S Manickam, E Alomari IETE Technical Review 33 (3), 244-255, 2016 | 53 | 2016 |
A Secure Machine Learning-Based Optimal Routing in Ad Hoc Networks for Classifying and Predicting Vulnerabilities A Reddy Yeruva, E Saleh Alomari, S Rashmi, A Shrivastava, ... Cybernetics and Systems, 1-12, 2023 | 47 | 2023 |
Review of security vulnerabilities in the IPv6 neighbor discovery protocol M Anbar, R Abdullah, RMA Saad, E Alomari, S Alsaleem Information Science and Applications (ICISA) 2016, 603-612, 2016 | 39 | 2016 |
Design, deployment and use of HTTP-based botnet (HBB) testbed E Alomari, S Manickam, BB Gupta, P Singh, M Anbar 16th International Conference on Advanced Communication Technology, 1265-1269, 2014 | 37 | 2014 |
A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDoS attacks RR Nuiaa, S Manickam, AH Alsaeedi, ES Alomari Int. J. Electr. Comput. Eng 12 (2), 1869-1880, 2022 | 26 | 2022 |
A survey of botnet-based ddos flooding attacks of application layer: Detection and mitigation approaches E Alomari, S Manickam, BB Gupta, M Anbar, RMA Saad, S Alsaleem Handbook of research on modern cryptographic solutions for computer and …, 2016 | 23 | 2016 |
E-health state in middle east countries: an overview A Neamah, M Ghani, A Ahmad, ES Alomari, RR Nuiaa Turk Online J Design Art Commun 2018, 2974-90, 2018 | 16 | 2018 |
DESIGN & DEPLOYMENT OF TESTBED BASED ON ICMPv6 FLOODING ATTACK. R Saad, S Manickam, E ALOMARI, M ANBAR, P SINGH Journal of Theoretical & Applied Information Technology 64 (3), 2014 | 15 | 2014 |
Secured environment for cloud integrated fog and mist architecture HMR Al-Khafaji, ES Alomari, HS Majdi 2019 IEEE International Conference on Electrical Engineering and Photonics …, 2019 | 9 | 2019 |
VANET Network Traffic Anomaly Detection Using GRU-Based Deep Learning Model G ALMahadin, Y Aoudni, M Shabaz, AV Agrawal, G Yasmin, ES Alomari, ... IEEE Transactions on Consumer Electronics, 2023 | 7 | 2023 |
Enhancing the Performance of Detect DRDoS DNS Attacks Based on the Machine Learning and Proactive Feature Selection (PFS) Model. RR Nuiaa, S Manickam, AH Alsaeedi, ES Alomari IAENG International Journal of Computer Science 49 (2), 2022 | 6 | 2022 |
An adaptive intrusion detection system by using decision tree OA Raheem, ES Alomari J. AL-Qadisiyah Comput. Sci. Math. Vol 10 (2), 2018 | 6 | 2018 |
Soft computing based cluster head selection for secured energy aware routing in flying ad hoc networks (FANET) ES Alomari Indian J. Public Health Res. Dev 9, 1993, 2018 | 5 | 2018 |
Review of Analytics Tools on Traffic for IoT and Cloud Based Network Environment HMR Al-Khafaji, ES Alomari, HS Majdi 2020 3rd International Conference on Engineering Technology and its …, 2020 | 4 | 2020 |
An Adaptive Intrusion Detection System by using Decision Tree Osamah Adil R Esraa, S Alomari Journal of AL-Qadisiyah for computer science and mathematics 10 (2), 2018 | 3 | 2018 |
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm RRN Al Ogaili, ES Alomari, MBM Alkorani, ZAA Alyasseri, MA Mohammed, ... Wireless Networks, 1-17, 2023 | 2 | 2023 |