Follow
Kamal Alieyan
Kamal Alieyan
Faculty of Computer Sciences and Informatics, Amman Arab University, Amman, Jordan.
Verified email at aau.edu.jo
Title
Cited by
Cited by
Year
Internet of Things (IoT) communication protocols
S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi
2017 8th International conference on information technology (ICIT), 685-690, 2017
7042017
A survey of botnet detection based on DNS
K Alieyan, A ALmomani, A Manasrah, MM Kadhum
Neural Computing and Applications 28, 1541-1558, 2017
1532017
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems 15 (4), 545-564, 2021
1132021
An overview of DDoS attacks based on DNS
K Alieyan, MM Kadhum, M Anbar, SU Rehman, NKA Alajmi
2016 International Conference on Information and Communication Technology …, 2016
382016
Machine learning for phishing detection and mitigation
M Alauthman, A Almomani, M Alweshah, W Omoush, K Alieyan
Machine Learning for Computer and Cyber Security, 48-74, 2019
272019
Botnet and Internet of Things (IoTs): A definition, taxonomy, challenges, and future directions
K Alieyan, A Almomani, R Abdullah, B Almutairi, M Alauthman
Research Anthology on Combating Denial-of-Service Attacks, 138-150, 2021
252021
Review on mechanisms for detecting sinkhole attacks on RPLs
M Alzubaidi, M Anbar, S Al-Saleem, S Al-Sarawi, K Alieyan
2017 8th International Conference on Information Technology (ICIT), 369-374, 2017
252017
Botnets detecting attack based on DNS features
K Alieyan, M Anbar, A Almomani, R Abdullah, M Alauthman
2018 International Arab conference on information technology (ACIT), 1-4, 2018
192018
Detection of HTTP flooding DDoS attack using Hadoop with MapReduce: a survey
ZR Al Ashhab, M Anbar, MM Singh, K Alieyan, WI Ghazaleh
Int. J. Adv. Trends Comput. Sci. Eng 8 (1), 71-77, 2019
142019
Automatic data clustering based mean best artificial bee colony algorithm
A Alrosan, W Alomoush, M Alswaitti, K Alissa, S Sahran, SN Makhadmeh, ...
Computers, Materials & Continua 68 (2), 1575-1593, 2021
122021
Hybrid Newton–Sperm Swarm Optimization Algorithm for Nonlinear Systems
O Said Solaiman, R Sihwail, H Shehadeh, I Hashim, K Alieyan
Mathematics 11 (6), 1473, 2023
42023
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions
K Keshkeh, A Jantan, K Alieyan, UM Gana
Advances in Cyber Security: Third International Conference, ACeS 2021 …, 2021
42021
A rule-based approach to detect botnets based on DNS
K Alieyan, A Almomani, R Abdullah, M Anbar
2018 8th IEEE International Conference on Control System, Computing and …, 2018
42018
Timestamp utilization in trust-nd mechanism for securing neighbor discovery protocol
IH Hasbullah, MM Kadhum, YW Chong, K Alieyan, A Osman
2016 14th Annual Conference on Privacy, Security and Trust (PST), 275-281, 2016
32016
A machine learning classification approach to detect TLS-based malware using entropy-based flow set features
K Keshkeh, A Jantan, K Alieyan
Journal of Information and Communication Technology 21 (03), 279-313, 2022
22022
VoIP Protocols’ Bandwidth Based-Mini/RTP Header Using Different Codecs: A Comparison
KA Naser Alajmi, Hadeel Saleh Haj Aliwi
Asian J. Sci. Res 10, 110-115, 2017
22017
A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time
HSH Aliwi, NKA Alajmi, P Sumari, K Alieyan
Engineering, Technology & Applied Science Research 6 (4), 1050-1055, 2016
12016
A hybrid facial recognition approach based on grasshopper optimization method
DR Ibrahim, HA Shehadeh, MA Aladaileh, K Alieyan, GM Jaradat, ...
AIP Conference Proceedings 2979 (1), 2023
2023
E-health security in big data of cloud computing in Jordanian healthcare sector
R Shahin, B Irtahi, R Al-Sayyed, K Alieyan
AIP Conference Proceedings 2979 (1), 2023
2023
A Mathematical Model of the Behavior of SIP Signaling and Media Messages
NKA Alajmi, HSH Aliwi, K Alieyan, MI Sarwar
Applied Physics, System Science and Computers: Proceedings of the 1st …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20