Internet of Things (IoT) communication protocols S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi 2017 8th International conference on information technology (ICIT), 685-690, 2017 | 741 | 2017 |
Impact of coronavirus pandemic crisis on technologies and cloud computing applications ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a Journal of Electronic Science and Technology 19 (1), 100059, 2021 | 186 | 2021 |
Internet of things market analysis forecasts, 2020–2030 S Al-Sarawi, M Anbar, R Abdullah, AB Al Hawari 2020 Fourth World Conference on smart trends in systems, security and …, 2020 | 147 | 2020 |
Survey of authentication and privacy schemes in vehicular ad hoc networks MA Al-Shareeda, M Anbar, IH Hasbullah, S Manickam IEEE Sensors Journal 21 (2), 2422-2433, 2021 | 140 | 2021 |
DNS rule-based schema to botnet detection K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta Enterprise Information Systems 15 (4), 545-564, 2019 | 119 | 2019 |
Intrusion detection system based on a modified binary grey wolf optimisation QM Alzubi, M Anbar, ZNM Alqattan, MA Al-Betar, R Abdullah Neural Computing and Applications, 1-13, 2019 | 95 | 2019 |
Vppcs: Vanet-based privacy-preserving communication scheme MA Al-Shareeda, M Anbar, S Manickam, AA Yassin IEEE Access 8, 150914-150928, 2020 | 92 | 2020 |
Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks BH Khudayer, M Anbar, SM Hanshi, TC Wan IEEE Access 8, 24019-24032, 2020 | 90 | 2020 |
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm TA Alamiedy, M Anbar, ZNM Alqattan, QM Alzubi Journal of Ambient Intelligence and Humanized Computing 11 (9), 3735-3756, 2020 | 79 | 2020 |
Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges AK Mohammed Al-Shalabi Mohammed Anbar , Tat-Chee Wan Electronics 7 (8), 136, 2018 | 77 | 2018 |
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review MA Aladaileh, M Anbar, IH Hasbullah, YW Chong, YK Sanjalawe IEEE Access 8, 143985-143995, 2020 | 74 | 2020 |
ICMPv6-based DoS and DDoS attacks and defense mechanisms OE Elejla, M Anbar, B Belaton IETE Technical Review 34 (4), 390-407, 2017 | 70 | 2017 |
Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm M Al-Shalabi, M Anbar, TC Wan, Z Alqattan Information Sciences 500, 259-273, 2019 | 65 | 2019 |
Evolving fuzzy neural network for phishing emails detection A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ... Journal of Computer Science 8 (7), 1099, 2012 | 59 | 2012 |
Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks MA Al-Shareeda, M Anbar, IH Hasbullah, S Manickam, SM Hanshi IEEE access 8, 144957-144968, 2020 | 57 | 2020 |
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah Sensors 21 (24), 8206, 2021 | 55 | 2021 |
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network RMA Saad, M Anbar, S Manickam, E Alomari IETE Technical Review 33 (3), 244-255, 2016 | 54 | 2016 |
Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets) MA Al-shareeda, M Anbar, IH Hasbullah, S Manickam, N Abdullah, ... 2020 IEEE 3rd International Conference on Information Communication and …, 2020 | 53 | 2020 |
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review M Tayyab, B Belaton, M Anbar IEEE Access 8, 170529-170547, 2020 | 53 | 2020 |
A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah Sensors 22 (5), 1696, 2022 | 52 | 2022 |