Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm RRN Al Ogaili, ES Alomari, MBM Alkorani, ZAA Alyasseri, MA Mohammed, ... Wireless Networks, 1-17, 2023 | 6 | 2023 |
VANET network traffic anomaly detection using GRU-based deep learning model G ALMahadin, Y Aoudni, M Shabaz, AV Agrawal, G Yasmin, ES Alomari, ... IEEE Transactions on Consumer Electronics, 2023 | 17 | 2023 |
A Secure Machine Learning-Based Optimal Routing in Ad Hoc Networks for Classifying and Predicting Vulnerabilities A Reddy Yeruva, E Saleh Alomari, S Rashmi, A Shrivastava, ... Cybernetics and Systems, 1-12, 2023 | 61 | 2023 |
Malware detection using deep learning and correlation-based feature selection ES Alomari, RR Nuiaa, ZAA Alyasseri, HJ Mohammed, NS Sani, MI Esa, ... Symmetry 15 (1), 123, 2023 | 65 | 2023 |
Enhancing the Performance of Detect DRDoS DNS Attacks Based on the Machine Learning and Proactive Feature Selection (PFS) Model. RR Nuiaa, S Manickam, AH Alsaeedi, ES Alomari IAENG International Journal of Computer Science 49 (2), 2022 | 14 | 2022 |
A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDoS attacks RR Nuiaa, S Manickam, AH Alsaeedi, ES Alomari Int. J. Electr. Comput. Eng 12 (2), 1869-1880, 2022 | 26 | 2022 |
Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers N Abdullah, S Manickam, M Anbar Springer Nature, 2021 | 1 | 2021 |
Review of Analytics Tools on Traffic for IoT and Cloud Based Network Environment HMR Al-Khafaji, ES Alomari, HS Majdi 2020 3rd International Conference on Engineering Technology and its …, 2020 | 12 | 2020 |
Secured environment for cloud integrated fog and mist architecture HMR Al-Khafaji, ES Alomari, HS Majdi 2019 IEEE International Conference on Electrical Engineering and Photonics …, 2019 | 16 | 2019 |
Soft computing-based cluster head selection for secured energy aware routing in flying ad hoc networks (FANET) ES Alomari Indian J. Public Health Res. Dev 9, 1993, 2018 | 12 | 2018 |
E-health state in middle east countries: an overview A Neamah, M Ghani, A Ahmad, E Alomari, RR Nuiaa Turk Online J Design Art Commun 2018, 2974-90, 2018 | 16 | 2018 |
An adaptive intrusion detection system by using decision tree OA Raheem, ES Alomari J. AL-Qadisiyah Comput. Sci. Math. Vol 10 (2), 2018 | 6 | 2018 |
An Adaptive Intrusion Detection System by using Decision Tree Osamah Adil R Esraa, S Alomari Journal of AL-Qadisiyah for computer science and mathematics 10 (2), 2018 | 3 | 2018 |
Energy Aware Dynamic Clustering Algorithm Using NIA-LEACH in Wireless Sensor Networks ES Alomari | | 2018 |
A Rule-Based Mechanism for Detecting HTTP Denial of Service Attacks During Flash Crowd Event ES Samer Alsaleem, Selvakumar Manickam, Mohammed Anbar, Ahmed Alnajjar Advanced Science Letters 23, http://www.ingentaconnect.com/content/as, 2017 | 1 | 2017 |
Handbook of research on modern cryptographic solutions for computer and cyber security B Gupta, DP Agrawal, S Yamaguchi IGI global, 2016 | 398 | 2016 |
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network RMA Saad, M Anbar, S Manickam, E Alomari IETE Technical Review 33 (3), 244-255, 2016 | 55 | 2016 |
A survey of botnet-based ddos flooding attacks of application layer: Detection and mitigation approaches E Alomari, S Manickam, BB Gupta, M Anbar, RMA Saad, S Alsaleem Handbook of research on modern cryptographic solutions for computer and …, 2016 | 24 | 2016 |
Review of security vulnerabilities in the IPv6 neighbor discovery protocol M Anbar, R Abdullah, RMA Saad, E Alomari, S Alsaleem Information Science and Applications (ICISA) 2016, 603-612, 2016 | 41 | 2016 |
DESIGN & DEPLOYMENT OF TESTBED BASED ON ICMPv6 FLOODING ATTACK. R Saad, S Manickam, E ALOMARI, M ANBAR, P SINGH Journal of Theoretical & Applied Information Technology 64 (3), 2014 | 15 | 2014 |