An automated approach to detect deauthentication and disassociation dos attacks on wireless 802.11 networks HA Noman, SM Abdullah, HI Mohammed International Journal of Computer Science Issues (IJCSI) 12 (4), 107, 2015 | 29 | 2015 |
Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations HA Noman, OMF Abu-Sharkh Sensors 23 (13), 6067, 2023 | 12 | 2023 |
WIRELESS SECURITY IN MALAYSIA: A SURVEY PAPER HA Noman, SA Noman, Q Al-Maatouk Journal of Critical Reviews 7 (4), 2020, 2020 | 6 | 2020 |
Mitigating evil twin attacks in wireless 802.11 networks at jordan SA Noman, M Qasaimeh, R Al-Qassas, HA Noman International Journal of Computer Science Issues (IJCSI) 14 (1), 60, 2017 | 6 | 2017 |
Design and implementation of a security analysis tool that detects and eliminates code caves in windows applications HA Noman, Q Al-Maatouk, SA Noman 2021 International Conference on Data Analytics for Business and Industry …, 2021 | 4 | 2021 |
A Static Analysis Tool for Malware Detection QAMSAN Haitham Ameen Noman Conference on Data Analytics for Business and Industry (ICDABI), 661-665, 2021 | 4* | 2021 |
Designing And Implementing A Secured Smart Network That Can Resist Next-generation State Surveillance HA NOMAN, SIS AL SATARY, OSW AL-QURAINI, MA YOUSFI, ... | 3 | 2021 |
A zero-day attack exploiting a yahoo messenger vulnerability M Aldwairi, H Noman International Journal of Scientific & Engineering Research 3 (8), 1-4, 2012 | 2 | 2012 |
Internet of Things Communication, Networking, and Security: A Survey SA Noman, HA Noman, Q Al-Maatouk, T Atkison International Journal of Computing and Digital Systems, 2023 | 1 | 2023 |
A Robust Scheme to Defend Against Disassociation and Deauthentication DoS Attacks in WLAN Networks. HA Noman, SM Abdullah, SA Noman Journal of Theoretical & Applied Information Technology 93 (2), 2016 | 1 | 2016 |
A Survey of IEEE 802.15. 6: Body Area Networks SA Noman, HA Noman, Q Al-Maatouk, T Atkison International Journal of Computing and Digital Systems 14 (1), 1-xx, 2023 | | 2023 |
Introducing IJam Wireless De-authentication Attack Tool H Al-Ani, A Al-Zubidy Proceedings of the SouthEast Conference, 199-202, 2017 | | 2017 |