关注
Esraa Saleh Alomari
Esraa Saleh Alomari
其他姓名Esraa Alomari (ORCID iD: 0000-0003-4281-8954)
College of Education for Pure Sciences, Wasit University, 52001 Al-Kut, Wasit, Iraq
在 uowasit.edu.iq 的电子邮件经过验证 - 首页
标题
引用次数
年份
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm
RRN Al Ogaili, ES Alomari, MBM Alkorani, ZAA Alyasseri, MA Mohammed, ...
Wireless Networks, 1-17, 2023
62023
VANET network traffic anomaly detection using GRU-based deep learning model
G ALMahadin, Y Aoudni, M Shabaz, AV Agrawal, G Yasmin, ES Alomari, ...
IEEE Transactions on Consumer Electronics, 2023
172023
A Secure Machine Learning-Based Optimal Routing in Ad Hoc Networks for Classifying and Predicting Vulnerabilities
A Reddy Yeruva, E Saleh Alomari, S Rashmi, A Shrivastava, ...
Cybernetics and Systems, 1-12, 2023
612023
Malware detection using deep learning and correlation-based feature selection
ES Alomari, RR Nuiaa, ZAA Alyasseri, HJ Mohammed, NS Sani, MI Esa, ...
Symmetry 15 (1), 123, 2023
652023
Enhancing the Performance of Detect DRDoS DNS Attacks Based on the Machine Learning and Proactive Feature Selection (PFS) Model.
RR Nuiaa, S Manickam, AH Alsaeedi, ES Alomari
IAENG International Journal of Computer Science 49 (2), 2022
142022
A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDoS attacks
RR Nuiaa, S Manickam, AH Alsaeedi, ES Alomari
Int. J. Electr. Comput. Eng 12 (2), 1869-1880, 2022
262022
Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers
N Abdullah, S Manickam, M Anbar
Springer Nature, 2021
12021
Review of Analytics Tools on Traffic for IoT and Cloud Based Network Environment
HMR Al-Khafaji, ES Alomari, HS Majdi
2020 3rd International Conference on Engineering Technology and its …, 2020
122020
Secured environment for cloud integrated fog and mist architecture
HMR Al-Khafaji, ES Alomari, HS Majdi
2019 IEEE International Conference on Electrical Engineering and Photonics …, 2019
162019
Soft computing-based cluster head selection for secured energy aware routing in flying ad hoc networks (FANET)
ES Alomari
Indian J. Public Health Res. Dev 9, 1993, 2018
122018
E-health state in middle east countries: an overview
A Neamah, M Ghani, A Ahmad, E Alomari, RR Nuiaa
Turk Online J Design Art Commun 2018, 2974-90, 2018
162018
An adaptive intrusion detection system by using decision tree
OA Raheem, ES Alomari
J. AL-Qadisiyah Comput. Sci. Math. Vol 10 (2), 2018
62018
An Adaptive Intrusion Detection System by using Decision Tree Osamah Adil
R Esraa, S Alomari
Journal of AL-Qadisiyah for computer science and mathematics 10 (2), 2018
32018
Energy Aware Dynamic Clustering Algorithm Using NIA-LEACH in Wireless Sensor Networks
ES Alomari
2018
A Rule-Based Mechanism for Detecting HTTP Denial of Service Attacks During Flash Crowd Event
ES Samer Alsaleem, Selvakumar Manickam, Mohammed Anbar, Ahmed Alnajjar
Advanced Science Letters 23, http://www.ingentaconnect.com/content/as, 2017
12017
Handbook of research on modern cryptographic solutions for computer and cyber security
B Gupta, DP Agrawal, S Yamaguchi
IGI global, 2016
3982016
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network
RMA Saad, M Anbar, S Manickam, E Alomari
IETE Technical Review 33 (3), 244-255, 2016
552016
A survey of botnet-based ddos flooding attacks of application layer: Detection and mitigation approaches
E Alomari, S Manickam, BB Gupta, M Anbar, RMA Saad, S Alsaleem
Handbook of research on modern cryptographic solutions for computer and …, 2016
242016
Review of security vulnerabilities in the IPv6 neighbor discovery protocol
M Anbar, R Abdullah, RMA Saad, E Alomari, S Alsaleem
Information Science and Applications (ICISA) 2016, 603-612, 2016
412016
DESIGN & DEPLOYMENT OF TESTBED BASED ON ICMPv6 FLOODING ATTACK.
R Saad, S Manickam, E ALOMARI, M ANBAR, P SINGH
Journal of Theoretical & Applied Information Technology 64 (3), 2014
152014
系统目前无法执行此操作,请稍后再试。
文章 1–20