Follow
Dr. Ban Mohammed Khammas
Dr. Ban Mohammed Khammas
Al-Nahrain University
Verified email at coie-nahrain.edu.iq
Title
Cited by
Cited by
Year
Metaheuristic algorithms for PID controller parameters tuning: Review, approaches and open problems
SB Joseph, EG Dada, A Abidemi, DO Oyewola, BM Khammas
Heliyon 8 (5), 2022
1482022
Ransomware detection using random forest technique
BM Khammas
ICT Express 6 (4), 325-331, 2020
752020
Implementation of a sigmoid activation function for neural network using FPGA
TM Jamel, BM Khammas
13th scientific conference of Al-Ma’moon University College 13, 1589-1591, 2012
482012
Feature selection and machine learning classification for malware detection
BM Khammas, A Monemi, JS Bassi, I Ismail, SM Nor, MN Marsono
Jurnal Teknologi 77 (1), 243-250, 2015
442015
Incorporating known malware signatures to classify new malware variants in network traffic
I Ismail, MN Marsono, BM Khammas, SM Nor
International Journal of Network Management 25 (6), 471-489, 2015
152015
Malware detection using sub-signatures and machine learning technique
B Khammas
Journal of Information Security Research 9 (3), 96-106, 2018
122018
Metamorphic malware detection based on support vector machine classification of malware sub-signatures
BM Khammas, A Monemi, I Ismail, SM Nor, MN Marsono
TELKOMNIKA (Telecommunication Computing Electronics and Control) 14 (3 …, 2016
112016
Accuracy improved malware detection method using snort sub-signatures and machine learning techniques
BM Khammas, S Hasan, RA Ahmed, JS Bassi, I Ismail
2018 10th Computer Science and Electronic Engineering (CEEC), 107-112, 2018
92018
Pre-filters in-transit malware packets detection in the network
BM Khammas, I Ismail, MN Marsono
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (4 …, 2019
82019
The performance of iot malware detection technique using feature selection and feature reduction in fog layer
BM Khammas
IOP Conference Series: Materials Science and Engineering 928 (2), 022047, 2020
72020
Comparative analysis of various machine learning algorithms for ransomware detection
BM Khammas
Telkomnika (Telecommunication Computing Electronics and Control) 20 (1), 43-51, 2022
52022
First line defense against spreading new malware in the network
BM Khammas, S Hasan, N Nateq, JS Bassi, I Ismail, MN Marsono
2018 10th Computer Science and Electronic Engineering (CEEC), 113-118, 2018
52018
Online peer-to-peer traffic identification. based on complex events processing of traffic event signatures
JS Bassi, LH Ru, I Ismail, BM Khammas, MN Marsono
Jurnal Teknologi 78 (7), 9-16, 2016
52016
Design Neural Wireless Sensor Network Using FPGA
BM Khammas
Eng. & Tech. Journal 30 (9), 1641-1661, 2012
52012
Obfuscated computer virus detection using machine learning algorithm
TH Xin, I Ismail, BM Khammas
Bulletin of Electrical Engineering and Informatics 8 (4), 1383-1391, 2019
42019
Hybrid evolutionary approach in feature vector for ransomware detection
N Aljubory, BM Khammas
2021 International Conference on Intelligent Technology, System and Service …, 2021
32021
Ambiguity and Concepts in Real Time Online Internet Traffic Classification
HAH Ibrahim, SM Nor, BM Khammas
International Journal of Engineering & Technology 6, 0975-4024, 2014
32014
FPGA based neural wireless sensor network
TM Jamel, BM Khammas, MK Zibar
The 13th International Arab Conference on Information Technology, 2012
32012
AN EFFECTIVE AND EFFICIENT FEATURES VECTORS FOR RANSOMWARE DETECTION VIA MACHINE LEARNING TECHNIQUE
NA Khalil, BM Khammas
Iraqi Journal of Information and Communication Technology 5 (3), 23-33, 2022
22022
Online traffic classification for malicious flows using efficient machine learning techniques
YY Chan, IB Ismail, BM Khammas
TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (4 …, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20