关注
bahari belaton
bahari belaton
在 cs.usm.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
ICMPv6-based DoS and DDoS attacks and defense mechanisms
OE Elejla, M Anbar, B Belaton
IETE Technical Review 34 (4), 390-407, 2017
662017
Intrusion detection systems of ICMPv6-based DDoS attacks
OE Elejla, B Belaton, M Anbar, A Alnajjar
Neural Computing and Applications 30, 45-56, 2018
412018
Flow-based IDS for ICMPv6-based DDoS attacks detection
OE Elejla, M Anbar, B Belaton, BO Alijla
Arabian Journal for Science and Engineering 43, 7757-7775, 2018
382018
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: a review
M Tayyab, B Belaton, M Anbar
IEEE Access 8, 170529-170547, 2020
362020
IoT adoption and application for smart healthcare: a systematic review
M Al-Rawashdeh, P Keikhosrokiani, B Belaton, M Alawida, A Zwiri
Sensors 22 (14), 5377, 2022
292022
False positives reduction via intrusion alert quality framework
NA Bakar, B Belaton, A Samsudin
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
292005
Labeled flow-based dataset of ICMPv6-based DDoS attacks
OE Elejla, M Anbar, B Belaton, S Hamouda
Neural Computing and Applications 31, 3629-3646, 2019
252019
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection
OE Elejla, B Belaton, M Anbar, B Alabsi, AK Al-Ani
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
242019
Brain image segmentation in recent years: A narrative review
A Fawzi, A Achuthan, B Belaton
Brain Sciences 11 (8), 1055, 2021
222021
Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework
WAHM Ghanem, B Belaton
2013 IEEE international conference on control system, computing and …, 2013
212013
A K-means based generic segmentation system
AAZ Irani, B Belaton
2009 Sixth International Conference on Computer Graphics, Imaging and …, 2009
202009
SBI model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique
N Mohamed, B Belaton
IEEE Access 9, 42919-42932, 2021
192021
A Reference Dataset for ICMPv6 Flooding Attacks* Omar E. Elejla," Bahari Belaton," Mohammed Anbar and “Ahmad Alnajjar" School of Computer Science, Universiti Sains Malaysia …
O Elejla
J. Eng. Appl. Sci 100, 476-481, 2016
182016
Towards implementing intrusion alert quality framework
NA Bakar, B Belaton
First International Conference on Distributed Frameworks for Multimedia …, 2005
172005
A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things
TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla, IH Hasbullah, ...
Sensors 22 (9), 3400, 2022
152022
A new set of features for detecting router advertisement flooding attacks
OE Elejla, B Belaton, M Anbar, IM Smadi
2017 Palestinian International Conference on Information and Communication …, 2017
142017
An improved iterative closest point algorithm for rigid point registration
J Chen, B Belaton
Machine Learning and Cybernetics: 13th International Conference, Lanzhou …, 2014
142014
A visual analytics framework for the examination timetabling problem
JJ Thomas, AT Khader, B Belaton
2008 Fifth International Conference on Computer Graphics, Imaging and …, 2008
132008
Credit card fraud detection using a new hybrid machine learning architecture
EF Malik, KW Khaw, B Belaton, WP Wong, XY Chew
Mathematics 10 (9), 1480, 2022
122022
Adaptive face modelling for reconstructing 3D face shapes from single 2D images
A Maghari, I Venkat, IY Liao, B Belaton
IET Computer Vision 8 (5), 441-454, 2014
122014
系统目前无法执行此操作,请稍后再试。
文章 1–20