ICMPv6-based DoS and DDoS attacks and defense mechanisms OE Elejla, M Anbar, B Belaton IETE Technical Review 34 (4), 390-407, 2017 | 57 | 2017 |
Intrusion detection systems of ICMPv6-based DDoS attacks OE Elejla, B Belaton, M Anbar, A Alnajjar Neural Computing and Applications 30 (1), 45-56, 2018 | 32 | 2018 |
Flow-based IDS for ICMPv6-based DDoS attacks detection OE Elejla, M Anbar, B Belaton, BO Alijla Arabian Journal for Science and Engineering 43 (12), 7757-7775, 2018 | 29 | 2018 |
False positives reduction via intrusion alert quality framework NA Bakar, B Belaton, A Samsudin 2005 13th IEEE International Conference on Networks Jointly held with the …, 2005 | 27 | 2005 |
A K-means based generic segmentation system AAZ Irani, B Belaton 2009 Sixth International Conference on Computer Graphics, Imaging and …, 2009 | 21 | 2009 |
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection OE Elejla, B Belaton, M Anbar, B Alabsi, AK Al-Ani Computational Science and Technology, 347-357, 2019 | 20 | 2019 |
Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework WAHM Ghanem, B Belaton 2013 IEEE international conference on control system, computing and …, 2013 | 19 | 2013 |
Towards implementing intrusion alert quality framework NA Bakar, B Belaton First International Conference on Distributed Frameworks for Multimedia …, 2005 | 17 | 2005 |
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: a review M Tayyab, B Belaton, M Anbar IEEE Access 8, 170529-170547, 2020 | 16 | 2020 |
A Reference Dataset for ICMPv6 Flooding Attacks* Omar E. Elejla," Bahari Belaton," Mohammed Anbar and “Ahmad Alnajjar" School of Computer Science, Universiti Sains Malaysia … OE Elejla Journal of Engineering and applied sciences 100 (3), 476-481, 2016 | 16 | 2016 |
Labeled flow-based dataset of ICMPv6-based DDoS attacks OE Elejla, M Anbar, B Belaton, S Hamouda Neural Computing and Applications 31 (8), 3629-3646, 2019 | 13 | 2019 |
An improved iterative closest point algorithm for rigid point registration J Chen, B Belaton International Conference on Machine Learning and Cybernetics, 255-263, 2014 | 13 | 2014 |
A visual analytics framework for the examination timetabling problem JJ Thomas, AT Khader, B Belaton 2008 Fifth International Conference on Computer Graphics, Imaging and …, 2008 | 13 | 2008 |
Quantitative analysis on PCA-based statistical 3D face shape modeling. AYA Maghari, IYI Liao, B Belaton CompIMAGE, 2012 | 12 | 2012 |
Adaptive face modelling for reconstructing 3D face shapes from single 2D images A Maghari, I Venkat, IY Liao, B Belaton IET Computer Vision 8 (5), 441-454, 2014 | 11 | 2014 |
SBI model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique N Mohamed, B Belaton IEEE Access 9, 42919-42932, 2021 | 10 | 2021 |
A new set of features for detecting router advertisement flooding attacks OE Elejla, B Belaton, M Anbar, IM Smadi 2017 Palestinian International Conference on Information and Communication …, 2017 | 9 | 2017 |
Computerized 3D craniofacial landmark identification and analysis P Zheng, B Belaton, R Zaharudin, A Irani, ZA Rajion Electronic Journal of Computer Science and Information Technology 1 (1), 2009 | 9 | 2009 |
Brain image segmentation in recent years: A narrative review A Fawzi, A Achuthan, B Belaton Brain Sciences 11 (8), 1055, 2021 | 7 | 2021 |
A parallel coordinates visualization for the uncapaciated examination timetabling problem JJ Thomas, AT Khader, B Belaton International Visual Informatics Conference, 87-98, 2011 | 7 | 2011 |