Follow
Kamal Alieyan
Kamal Alieyan
Faculty of Computer Sciences and Informatics, Amman Arab University, Amman, Jordan.
Verified email at aau.edu.jo
Title
Cited by
Cited by
Year
Internet of Things (IoT) communication protocols
S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi
2017 8th International conference on information technology (ICIT), 685-690, 2017
4302017
A survey of botnet detection based on DNS
K Alieyan, A ALmomani, A Manasrah, MM Kadhum
Neural Computing and Applications 28 (7), 1541-1558, 2017
1102017
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems 15 (4), 545-564, 2021
512021
An overview of DDoS attacks based on DNS
K Alieyan, MM Kadhum, M Anbar, SU Rehman, NKA Alajmi
2016 International Conference on Information and Communication Technology …, 2016
252016
Internet of Things (IoT) communication protocols
SA Sarawi, M Anbar, K Alieyan, M Alzubaidi
Proceedings of 8th International Conference on Infocomm Technology (ICIT …, 2017
202017
Machine learning for phishing detection and mitigation
M Alauthman, A Almomani, M Alweshah, W Omoush, K Alieyan
Machine Learning for Computer and Cyber Security, 48-74, 2019
182019
Review on mechanisms for detecting sinkhole attacks on RPLs
M Alzubaidi, M Anbar, S Al-Saleem, S Al-Sarawi, K Alieyan
2017 8th International Conference on Information Technology (ICIT), 369-374, 2017
182017
Botnet and Internet of Things (IoTs): a definition, taxonomy, challenges, and future directions
K Alieyan, A Almomani, R Abdullah, B Almutairi, M Alauthman
Research Anthology on Combating Denial-of-Service Attacks, 138-150, 2021
162021
Botnets detecting attack based on DNS features
K Alieyan, M Anbar, A Almomani, R Abdullah, M Alauthman
2018 International Arab Conference on Information Technology (ACIT), 1-4, 2018
112018
Detection of HTTP flooding DDoS attack using Hadoop with MapReduce: a survey
ZR Al Ashhab, M Anbar, MM Singh, K Alieyan, WIA Ghazaleh
Int. J. Adv. Trends Comput. Sci. Eng 8 (1), 71-77, 2019
92019
A rule-based approach to detect botnets based on DNS
K Alieyan, A Almomani, R Abdullah, M Anbar
2018 8th IEEE International Conference on Control System, Computing and …, 2018
42018
Automatic data clustering based mean best artificial bee colony algorithm
A Alrosan, W Alomoush, M Alswaitti, K Alissa, S Sahran, SN Makhadmeh, ...
Cmc-Comput. Mater. Contin 68, 1575-1593, 2021
32021
Timestamp utilization in trust-nd mechanism for securing neighbor discovery protocol
IH Hasbullah, MM Kadhum, YW Chong, K Alieyan, A Osman
2016 14th Annual Conference on Privacy, Security and Trust (PST), 275-281, 2016
32016
VoIP Protocols’ Bandwidth Based-Mini/RTP Header Using Different Codecs: A Comparison
KA Naser Alajmi, Hadeel Saleh Haj Aliwi
Asian J. Sci. Res 10, 110-115, 2017
22017
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions
K Keshkeh, A Jantan, K Alieyan, UM Gana
International Conference on Advances in Cyber Security, 213-229, 2021
2021
A Mathematical Model of the Behavior of SIP Signaling and Media Messages
NKA Alajmi, HSH Aliwi, K Alieyan, MI Sarwar
International Conference on Applied Physics, System Science and Computers …, 2017
2017
Performance Evaluation of VoIP Protocols within Certain Number of Calls: Jitter
N KA Aljam, H Saleh Haj, K Alieyan
Journal of Applied Sciences 17 (5), 259-263, 2017
2017
An Analytical Model for the Behavior of SIP, RSW, and H. 323 Messages and Session Time
NKA ALAJMI, HSHAJ ALIWI, K ALIEYAN
WSEAS TRANSACTIONS on COMMUNICATIONS 16, 2017
2017
The effect of packet loss in the homogeneous and heterogeneous protocols media exchange environment: A comparison
HSH Aliwi, P Sumari, NKA Alajmi, K Alieyan
2016 International Conference on Information and Communication Technology …, 2016
2016
A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time
HSH Aliwi, NKA Alajmi, P Sumari, K Alieyan
Engineering, Technology & Applied Science Research 6 (4), 1050-1055, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20