Mohammed Anbar, PhD
Cited by
Cited by
Internet of Things (IoT) communication protocols
S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi
2017 8th International conference on information technology (ICIT), 685-690, 2017
ICMPv6-based DoS and DDoS attacks and defense mechanisms
OE Elejla, M Anbar, B Belaton
IETE Technical Review 34 (4), 390-407, 2017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges
AK Mohammed Al-Shalabi Mohammed Anbar , Tat-Chee Wan
Electronics 7 (8), 136, 2018
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network
RMA Saad, M Anbar, S Manickam, E Alomari
IETE Technical Review 33 (3), 244-255, 2016
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks
M Anbar, R Abdullah, BN Al-Tamimi, A Hussain
Cognitive Computation 10 (2), 201-214, 2018
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems 15 (4), 545-564, 2019
Intrusion detection system based on a modified binary grey wolf optimisation
QM Alzubi, M Anbar, ZNM Alqattan, MA Al-Betar, R Abdullah
Neural Computing and Applications, 1-13, 2019
Intrusion detection systems of ICMPv6-based DDoS attacks
OE Elejla, B Belaton, M Anbar, A Alnajjar
Neural Computing and Applications 30 (1), 45-56, 2018
Design, deployment and use of HTTP-based botnet (HBB) testbed
E Alomari, S Manickam, BB Gupta, P Singh, M Anbar
16th International Conference on Advanced Communication Technology, 1265-1269, 2014
Review of security vulnerabilities in the IPv6 neighbor discovery protocol
M Anbar, R Abdullah, RMA Saad, E Alomari, S Alsaleem
Information Science and Applications (ICISA) 2016, 603-612, 2016
Comparative performance analysis of classification algorithms for intrusion detection system
M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla
2016 14th Annual Conference on Privacy, Security and Trust (PST), 282-288, 2016
Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm
M Al-Shalabi, M Anbar, TC Wan, Z Alqattan
Information Sciences 500, 259-273, 2019
A preliminary performance evaluation of K-means, KNN and EM unsupervised machine learning methods for network flow classification
A Munther, R Razif, M AbuAlhaj, M Anbar, S Nizam
Int. J. Electr. Comput. Eng 6 (2), 778, 2016
A survey of botnet-based ddos flooding attacks of application layer: Detection and mitigation approaches
E Alomari, S Manickam, BB Gupta, M Anbar, RMA Saad, S Alsaleem
Handbook of research on modern cryptographic solutions for computer and …, 2016
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
TA Alamiedy, M Anbar, ZNM Alqattan, QM Alzubi
Journal of Ambient Intelligence and Humanized Computing, 1-22, 2019
Malware detection based on evolving clustering method for classification
A Altaher, A ALmomani, M Anbar, S Ramadass
Scientific Research and Essays 7 (22), 2031-2036, 2012
Performance assessment of AGRED, RED and GRED congestion control algorithms
M Baklizi, H Abdel-jaber, S Ramadass, N Abdullah, M Anbar
Information technology journal 11 (2), 255, 2012
Vppcs: Vanet-based privacy-preserving communication scheme
MA Al-Shareeda, M Anbar, S Manickam, AA Yassin
IEEE Access 8, 150914-150928, 2020
The system can't perform the operation now. Try again later.
Articles 1–20