Follow
bahari belaton
bahari belaton
Verified email at cs.usm.my
Title
Cited by
Cited by
Year
ICMPv6-based DoS and DDoS attacks and defense mechanisms
OE Elejla, M Anbar, B Belaton
IETE Technical Review 34 (4), 390-407, 2017
572017
Intrusion detection systems of ICMPv6-based DDoS attacks
OE Elejla, B Belaton, M Anbar, A Alnajjar
Neural Computing and Applications 30 (1), 45-56, 2018
322018
Flow-based IDS for ICMPv6-based DDoS attacks detection
OE Elejla, M Anbar, B Belaton, BO Alijla
Arabian Journal for Science and Engineering 43 (12), 7757-7775, 2018
292018
False positives reduction via intrusion alert quality framework
NA Bakar, B Belaton, A Samsudin
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
272005
A K-means based generic segmentation system
AAZ Irani, B Belaton
2009 Sixth International Conference on Computer Graphics, Imaging and …, 2009
212009
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection
OE Elejla, B Belaton, M Anbar, B Alabsi, AK Al-Ani
Computational Science and Technology, 347-357, 2019
202019
Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework
WAHM Ghanem, B Belaton
2013 IEEE international conference on control system, computing and …, 2013
192013
Towards implementing intrusion alert quality framework
NA Bakar, B Belaton
First International Conference on Distributed Frameworks for Multimedia …, 2005
172005
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: a review
M Tayyab, B Belaton, M Anbar
IEEE Access 8, 170529-170547, 2020
162020
A Reference Dataset for ICMPv6 Flooding Attacks* Omar E. Elejla," Bahari Belaton," Mohammed Anbar and “Ahmad Alnajjar" School of Computer Science, Universiti Sains Malaysia …
OE Elejla
Journal of Engineering and applied sciences 100 (3), 476-481, 2016
162016
Labeled flow-based dataset of ICMPv6-based DDoS attacks
OE Elejla, M Anbar, B Belaton, S Hamouda
Neural Computing and Applications 31 (8), 3629-3646, 2019
132019
An improved iterative closest point algorithm for rigid point registration
J Chen, B Belaton
International Conference on Machine Learning and Cybernetics, 255-263, 2014
132014
A visual analytics framework for the examination timetabling problem
JJ Thomas, AT Khader, B Belaton
2008 Fifth International Conference on Computer Graphics, Imaging and …, 2008
132008
Quantitative analysis on PCA-based statistical 3D face shape modeling.
AYA Maghari, IYI Liao, B Belaton
CompIMAGE, 2012
122012
Adaptive face modelling for reconstructing 3D face shapes from single 2D images
A Maghari, I Venkat, IY Liao, B Belaton
IET Computer Vision 8 (5), 441-454, 2014
112014
SBI model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique
N Mohamed, B Belaton
IEEE Access 9, 42919-42932, 2021
102021
A new set of features for detecting router advertisement flooding attacks
OE Elejla, B Belaton, M Anbar, IM Smadi
2017 Palestinian International Conference on Information and Communication …, 2017
92017
Computerized 3D craniofacial landmark identification and analysis
P Zheng, B Belaton, R Zaharudin, A Irani, ZA Rajion
Electronic Journal of Computer Science and Information Technology 1 (1), 2009
92009
Brain image segmentation in recent years: A narrative review
A Fawzi, A Achuthan, B Belaton
Brain Sciences 11 (8), 1055, 2021
72021
A parallel coordinates visualization for the uncapaciated examination timetabling problem
JJ Thomas, AT Khader, B Belaton
International Visual Informatics Conference, 87-98, 2011
72011
The system can't perform the operation now. Try again later.
Articles 1–20