Mohammed Anbar, PhD
Cited by
Cited by
Internet of Things (IoT) communication protocols
S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi
2017 8th International conference on information technology (ICIT), 685-690, 2017
Impact of coronavirus pandemic crisis on technologies and cloud computing applications
ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a
Journal of Electronic Science and Technology 19 (1), 100059, 2021
ICMPv6-based DoS and DDoS attacks and defense mechanisms
OE Elejla, M Anbar, B Belaton
IETE Technical Review 34 (4), 390-407, 2017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
Intrusion detection system based on a modified binary grey wolf optimisation
QM Alzubi, M Anbar, ZNM Alqattan, MA Al-Betar, R Abdullah
Neural Computing and Applications, 1-13, 2019
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems 15 (4), 545-564, 2019
Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges
AK Mohammed Al-Shalabi Mohammed Anbar , Tat-Chee Wan
Electronics 7 (8), 136, 2018
Survey of authentication and privacy schemes in vehicular ad hoc networks
MA Al-Shareeda, M Anbar, IH Hasbullah, S Manickam
IEEE Sensors Journal 21 (2), 2422-2433, 2021
Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks
BH Khudayer, M Anbar, SM Hanshi, TC Wan
IEEE Access 8, 24019-24032, 2020
Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm
M Al-Shalabi, M Anbar, TC Wan, Z Alqattan
Information Sciences 500, 259-273, 2019
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network
RMA Saad, M Anbar, S Manickam, E Alomari
IETE Technical Review 33 (3), 244-255, 2016
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
TA Alamiedy, M Anbar, ZNM Alqattan, QM Alzubi
Journal of Ambient Intelligence and Humanized Computing 11 (9), 3735-3756, 2020
A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks
M Anbar, R Abdullah, BN Al-Tamimi, A Hussain
Cognitive Computation 10 (2), 201-214, 2018
Intrusion detection systems of ICMPv6-based DDoS attacks
OE Elejla, B Belaton, M Anbar, A Alnajjar
Neural Computing and Applications 30 (1), 45-56, 2018
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
Vppcs: Vanet-based privacy-preserving communication scheme
MA Al-Shareeda, M Anbar, S Manickam, AA Yassin
IEEE Access 8, 150914-150928, 2020
Design, deployment and use of HTTP-based botnet (HBB) testbed
E Alomari, S Manickam, BB Gupta, P Singh, M Anbar
16th International Conference on Advanced Communication Technology, 1265-1269, 2014
Flow-based IDS for ICMPv6-based DDoS attacks detection
OE Elejla, M Anbar, B Belaton, BO Alijla
Arabian Journal for Science and Engineering 43 (12), 7757-7775, 2018
Comparative performance analysis of classification algorithms for intrusion detection system
M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla
2016 14th Annual Conference on Privacy, Security and Trust (PST), 282-288, 2016
Review of security vulnerabilities in the IPv6 neighbor discovery protocol
M Anbar, R Abdullah, R Saad, E Alomari, S Alsaleem
Information Science and Applications (ICISA) 2016, 603-612, 2016
The system can't perform the operation now. Try again later.
Articles 1–20