Adversarial deep learning: A survey on adversarial attacks and defense mechanisms on image classification SY Khamaiseh, D Bagagem, A Al-Alaj, M Mancino, HW Alomari IEEE Access 10, 102266-102291, 2022 | 65 | 2022 |
Detecting saturation attacks based on self-similarity of OpenFlow traffic Z Li, W Xing, S Khamaiseh, D Xu IEEE Transactions on Network and Service Management 17 (1), 607-621, 2019 | 39 | 2019 |
Detecting saturation attacks in sdn via machine learning S Khamaiseh, E Serra, Z Li, D Xu 2019 4th International Conference on Computing, Communications and Security …, 2019 | 31 | 2019 |
Deceiving machine learning-based saturation attack detection systems in sdn SY Khamaiseh, I Alsmadi, A Al-Alaj 2020 IEEE Conference on Network Function Virtualization and Software Defined …, 2020 | 26 | 2020 |
vswitchguard: Defending openflow switches against saturation attacks S Khamaiseh, E Serra, D Xu 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 23 | 2020 |
Model-based testing of obligatory ABAC systems S Khamaiseh, P Chapman, D Xu 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 15 | 2018 |
Software security testing via misuse case modeling S Khamaiseh, D Xu 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 15 | 2017 |
The robustness of detecting known and unknown DDoS saturation attacks in SDN via the integration of supervised and semi-supervised classifiers S Khamaiseh, A Al-Alaj, M Adnan, HW Alomari Future Internet 14 (6), 164, 2022 | 9 | 2022 |
FloodDetector: Detecting unknown DoS flooding attacks in SDN SY Khamaiseh, A Al-Alaj, A Warner 2020 International Conference on Internet of Things and Intelligent …, 2020 | 8 | 2020 |
Network parallelization in HPC clusters I Alsmadi, S Khamaiseh, D Xu 2016 International Conference on Computational Science and Computational …, 2016 | 8 | 2016 |
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data A Aleroud, M Shariah, R Malkawi, SY Khamaiseh, A Al-Alaj Cluster Computing 27 (2), 2117-2132, 2024 | 5 | 2024 |
Enhanced approach for agglomerative clustering using topological relations HW Alomari, AF Al-Badarneh, A Al-Alaj, SY Khamaiseh IEEE Access 11, 21945-21967, 2023 | 5 | 2023 |
Constraining adversarial attacks on network intrusion detection systems: transferability and defense analysis N Alhussien, A Aleroud, A Melhem, SY Khamaiseh IEEE Transactions on Network and Service Management, 2024 | 4 | 2024 |
Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks SY Khamaiseh, D Bagagem, A Al-Alaj, M Mancino, H Alomari, A Aleroud 2023 IEEE 47th Annual Computers, Software, and Applications Conference …, 2023 | 4 | 2023 |
On the performance of uplink noma short-packet communication system J Zheng, H Jiang, L Yu, SY Khamaiseh, M Rahman IEEE Transactions on Vehicular Technology, 2024 | 1 | 2024 |
Detection and countermeasure of saturation attacks in software-defined networks SY Khamaiseh | 1 | 2019 |
Fool’Em All—Fool-X: A Powerful & Fast Method for Generating Effective Adversarial Images SY Khamaiseh, M Mancino, D Jost, A Al-Alaj, D Bagagem, E Serra 2024 IEEE International Conference on Big Data (BigData), 7041-7075, 2024 | | 2024 |
AI-Powered AOP: Enhancing Runtime Monitoring with Large Language Models and Statistical Learning. A AlSobeh, A Shatnawi, B Al-Ahmad, A Aljmal, S Khamaiseh International Journal of Advanced Computer Science & Applications 15 (11), 2024 | | 2024 |
Collaborative Motion Planning Based on the Improved Ant Colony Algorithm for Multiple Autonomous Vehicles HW Alomari, AF Al-Badarneh, A Al-Alaj, SY Khamaiseh IEEE ACCESS 11, 21945-21967, 2023 | | 2023 |
Securing a Grant Proposal Workflow Management System P Chapman, S Khamaiseh | | 2017 |