Survey of authentication and privacy schemes in vehicular ad hoc networks MA Al-Shareeda, M Anbar, IH Hasbullah, S Manickam IEEE Sensors Journal 21 (2), 2422-2433, 2020 | 141 | 2020 |
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review MA Aladaileh, M Anbar, IH Hasbullah, YW Chong, YK Sanjalawe IEEE Access 8, 143985-143995, 2020 | 72 | 2020 |
Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks MA Al-Shareeda, M Anbar, IH Hasbullah, S Manickam, SM Hanshi IEEE access 8, 144957-144968, 2020 | 58 | 2020 |
Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets) MA Al-shareeda, M Anbar, IH Hasbullah, S Manickam, N Abdullah, ... 2020 IEEE 3rd International Conference on Information Communication and …, 2020 | 53 | 2020 |
A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla, IH Hasbullah, ... Sensors 22 (9), 3400, 2022 | 52 | 2022 |
A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah Sensors 22 (5), 1696, 2022 | 52 | 2022 |
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks MA Al-shareeda, M Anbar, S Manickam, IH Hasbullah International Journal of Engineering and Management Research 10 (3), 2394-6962, 2020 | 50 | 2020 |
An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network MA Al-shareeda, M Anbar, S Manickam, IH Hasbullah Symmetry 12 (10), 1687, 2020 | 47 | 2020 |
Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey MA Al-Shareeda, M Anbar, S Manickam, A Khalil, IH Hasbullah IEEE Access 9, 121522-121531, 2021 | 44 | 2021 |
Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah Applied Sciences 12 (3), 1383, 2022 | 41 | 2022 |
Se-cppa: A secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah Sensors 21 (24), 8206, 2021 | 39 | 2021 |
Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah Ieee Access 9, 113226-113238, 2021 | 38 | 2021 |
Comparative performance analysis of classification algorithms for intrusion detection system M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla 2016 14th annual conference on privacy, security and trust (PST), 282-288, 2016 | 38 | 2016 |
Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods Supriyanto, IH Hasbullah, RK Murugesan, S Ramadass IETE Technical Review 30 (1), 64-71, 2013 | 38 | 2013 |
Review of prevention schemes for modification attack in vehicular ad hoc networks MA Al-shareeda, M Anbar, S Manickam, IH Hasbullah International Journal of Engineering and Management Research 10, 2020 | 37 | 2020 |
Security schemes based conditional privacy-preserving in vehicular ad hoc networks MMA Al-shareeda, M Anbar, MA Alazzawi, S Manickam, IH Hasbullah Indonesian Journal of Electrical Engineering and Computer Science 21 (1), 2020 | 30 | 2020 |
NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs) MA Al-shareeda, M Anbar, S Manickam, IH Hasbullah, N Abdullah, ... Appl. Math 14 (6), 1-10, 2020 | 27 | 2020 |
Security mechanism for IPv6 stateless address autoconfiguration S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ... 2015 International Conference on Automation, Cognitive Science, Optics …, 2015 | 27 | 2015 |
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan, IH Hasbullah, ... Internet of Things 22, 100741, 2023 | 24 | 2023 |
Proposed efficient conditional privacy-preserving authentication scheme for v2v and v2i communications based on elliptic curve cryptography in vehicular ad hoc networks MA Al-shareeda, M Anbar, S Manickam, IH Hasbullah, A Khalil, ... Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 24 | 2021 |