Internet of Things (IoT) communication protocols S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi 2017 8th International conference on information technology (ICIT), 685-690, 2017 | 430 | 2017 |
A survey of botnet detection based on DNS K Alieyan, A ALmomani, A Manasrah, MM Kadhum Neural Computing and Applications 28 (7), 1541-1558, 2017 | 110 | 2017 |
DNS rule-based schema to botnet detection K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta Enterprise Information Systems 15 (4), 545-564, 2021 | 51 | 2021 |
An overview of DDoS attacks based on DNS K Alieyan, MM Kadhum, M Anbar, SU Rehman, NKA Alajmi 2016 International Conference on Information and Communication Technology …, 2016 | 25 | 2016 |
Internet of Things (IoT) communication protocols SA Sarawi, M Anbar, K Alieyan, M Alzubaidi Proceedings of 8th International Conference on Infocomm Technology (ICIT …, 2017 | 20 | 2017 |
Machine learning for phishing detection and mitigation M Alauthman, A Almomani, M Alweshah, W Omoush, K Alieyan Machine Learning for Computer and Cyber Security, 48-74, 2019 | 18 | 2019 |
Review on mechanisms for detecting sinkhole attacks on RPLs M Alzubaidi, M Anbar, S Al-Saleem, S Al-Sarawi, K Alieyan 2017 8th International Conference on Information Technology (ICIT), 369-374, 2017 | 18 | 2017 |
Botnet and Internet of Things (IoTs): a definition, taxonomy, challenges, and future directions K Alieyan, A Almomani, R Abdullah, B Almutairi, M Alauthman Research Anthology on Combating Denial-of-Service Attacks, 138-150, 2021 | 16 | 2021 |
Botnets detecting attack based on DNS features K Alieyan, M Anbar, A Almomani, R Abdullah, M Alauthman 2018 International Arab Conference on Information Technology (ACIT), 1-4, 2018 | 11 | 2018 |
Detection of HTTP flooding DDoS attack using Hadoop with MapReduce: a survey ZR Al Ashhab, M Anbar, MM Singh, K Alieyan, WIA Ghazaleh Int. J. Adv. Trends Comput. Sci. Eng 8 (1), 71-77, 2019 | 9 | 2019 |
A rule-based approach to detect botnets based on DNS K Alieyan, A Almomani, R Abdullah, M Anbar 2018 8th IEEE International Conference on Control System, Computing and …, 2018 | 4 | 2018 |
Automatic data clustering based mean best artificial bee colony algorithm A Alrosan, W Alomoush, M Alswaitti, K Alissa, S Sahran, SN Makhadmeh, ... Cmc-Comput. Mater. Contin 68, 1575-1593, 2021 | 3 | 2021 |
Timestamp utilization in trust-nd mechanism for securing neighbor discovery protocol IH Hasbullah, MM Kadhum, YW Chong, K Alieyan, A Osman 2016 14th Annual Conference on Privacy, Security and Trust (PST), 275-281, 2016 | 3 | 2016 |
VoIP Protocols’ Bandwidth Based-Mini/RTP Header Using Different Codecs: A Comparison KA Naser Alajmi, Hadeel Saleh Haj Aliwi Asian J. Sci. Res 10, 110-115, 2017 | 2 | 2017 |
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions K Keshkeh, A Jantan, K Alieyan, UM Gana International Conference on Advances in Cyber Security, 213-229, 2021 | | 2021 |
A Mathematical Model of the Behavior of SIP Signaling and Media Messages NKA Alajmi, HSH Aliwi, K Alieyan, MI Sarwar International Conference on Applied Physics, System Science and Computers …, 2017 | | 2017 |
Performance Evaluation of VoIP Protocols within Certain Number of Calls: Jitter N KA Aljam, H Saleh Haj, K Alieyan Journal of Applied Sciences 17 (5), 259-263, 2017 | | 2017 |
An Analytical Model for the Behavior of SIP, RSW, and H. 323 Messages and Session Time NKA ALAJMI, HSHAJ ALIWI, K ALIEYAN WSEAS TRANSACTIONS on COMMUNICATIONS 16, 2017 | | 2017 |
The effect of packet loss in the homogeneous and heterogeneous protocols media exchange environment: A comparison HSH Aliwi, P Sumari, NKA Alajmi, K Alieyan 2016 International Conference on Information and Communication Technology …, 2016 | | 2016 |
A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time HSH Aliwi, NKA Alajmi, P Sumari, K Alieyan Engineering, Technology & Applied Science Research 6 (4), 1050-1055, 2016 | | 2016 |