Follow
Hashem Alaidaros
Hashem Alaidaros
Dar Al-Hekma University
Verified email at dah.edu.sa - Homepage
Title
Cited by
Cited by
Year
An overview of flow-based and packet-based intrusion detection performance in high speed networks
H Alaidaros, M Mahmuddin, A Al Mazari
Proceedings of the International Arab Conference on Information Technology, 1-9, 2011
472011
Enhancing security performance with parallel crypto operations in ssl bulk data transfer phase
HM Alaidaros, MFA Rasid, M Othman, RSAR Abdullah
2007 IEEE International Conference on Telecommunications and Malaysia …, 2007
122007
Flow-based approach on bro intrusion detection
H Alaidaros, M Mahmuddin
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
82017
From Packet-based Towards Hybrid Packet-based and Flow-based Monitoring for Efficient Intrusion Detection: An overview
HM Alaidaros, M Mahmuddin, A Al Mazari
Second International Conference on Communication and Information Technology, 2012
52012
Improving security performance with parallel crypto operations in ssl bulk data transfer
HM Alaidaros, M Othman, MFA Rasid
International Journal of Cryptology Research 1 (2), 235-243, 2009
32009
Forwarding Strategies for Named Data Networking based IOT: Requirements, Taxonomy, and Open Research Challenges
N Askar, A Habbal, FZ Alden, X Wei, H Alaidaros, J Guo, H Yu
IEEE Access, 2023
22023
Enhancing Secure Sockets Layer Bulk Data Transfer Phase Performance with Parallel Cryptography Algorithm
HM Alaidaros
Universiti Putra Malaysia, 2007
12007
A secure multifactor-based clustering scheme for internet of vehicles
SM Karim, A Habbal, H Hamouda, H Alaidaros
Journal of King Saud University-Computer and Information Sciences, 101867, 2023
2023
A New Cybersecurity Assessment Framework for Private Networks
S Alshehri, H Alaidaros, M Arafah, SH Bakry
2022 14th International Conference on Computational Intelligence and …, 2022
2022
Conditional Hybrid Approach for Intrusion Detection
H Alaidaros, M Mahmuddin
2016
Improving Security Performance with Parallel Crypto Operations in SSL Bulk Data Transfer
AR and1Mohd Fadlee
CHID: CONDITIONAL HYBRID INTRUSION DETECTION SYSTEM FOR REDUCING FALSE POSITIVES AND RESOURCE CONSUMPTION ON MALICOUS DATASETS
HM ALAIDAROS
The system can't perform the operation now. Try again later.
Articles 1–12