Mohammed Anbar, PhD
Cited by
Cited by
Internet of Things (IoT) communication protocols
S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi
2017 8th International conference on information technology (ICIT), 685-690, 2017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
ICMPv6-based DoS and DDoS attacks and defense mechanisms
OE Elejla, M Anbar, B Belaton
IETE Technical Review 34 (4), 390-407, 2017
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
JApSc 11 (18), 3301-3307, 2011
Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges
AK Mohammed Al-Shalabi Mohammed Anbar , Tat-Chee Wan
Electronics 7 (8), 136, 2018
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network
RMA Saad, M Anbar, S Manickam, E Alomari
IETE Technical Review 33 (3), 244-255, 2016
Intrusion detection systems of ICMPv6-based DDoS attacks
OE Elejla, B Belaton, M Anbar, A Alnajjar
Neural Computing and Applications 30 (1), 45-56, 2018
A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks
M Anbar, R Abdullah, BN Al-Tamimi, A Hussain
Cognitive Computation 10 (2), 201-214, 2018
Design, deployment and use of HTTP-based botnet (HBB) testbed
E Alomari, S Manickam, BB Gupta, P Singh, M Anbar
16th International Conference on Advanced Communication Technology, 1265-1269, 2014
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems, 1-20, 2019
A preliminary performance evaluation of K-means, KNN and EM unsupervised machine learning methods for network flow classification
A Munther, R Razif, M AbuAlhaj, M Anbar, S Nizam
Int. J. Electr. Comput. Eng 6 (2), 778, 2016
A survey of botnet-based ddos flooding attacks of application layer: Detection and mitigation approaches
E Alomari, S Manickam, BB Gupta, M Anbar, RMA Saad, S Alsaleem
Handbook of research on modern cryptographic solutions for computer and …, 2016
Review of security vulnerabilities in the IPv6 neighbor discovery protocol
M Anbar, R Abdullah, RMA Saad, E Alomari, S Alsaleem
Information Science and Applications (ICISA) 2016, 603-612, 2016
Intrusion detection system based on a modified binary grey wolf optimisation
QM Alzubi, M Anbar, ZNM Alqattan, MA Al-Betar, R Abdullah
Neural Computing and Applications, 1-13, 2019
Malware detection based on evolving clustering method for classification
A Altaher, A ALmomani, M Anbar, S Ramadass
Scientific Research and Essays 7 (22), 2031-2036, 2012
Comparative performance analysis of classification algorithms for intrusion detection system
M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla
2016 14th Annual Conference on Privacy, Security and Trust (PST), 282-288, 2016
Performance assessment of AGRED, RED and GRED congestion control algorithms
M Baklizi, H Abdel-jaber, S Ramadass, N Abdullah, M Anbar
Information technology journal 11 (2), 255, 2012
Flow-based IDS for ICMPv6-based DDoS attacks detection
OE Elejla, M Anbar, B Belaton, BO Alijla
Arabian Journal for Science and Engineering 43 (12), 7757-7775, 2018
Review on detection techniques against DDoS attacks on a software-defined networking controller
HD Zubaydi, M Anbar, CY Wey
2017 Palestinian International Conference on Information and Communication …, 2017
An overview of DDoS attacks based on DNS
K Alieyan, MM Kadhum, M Anbar, SU Rehman, NKA Alajmi
2016 International Conference on Information and Communication Technology …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20