Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Mihail Popescu
Daniel P. Kennedy
Ch. Pichot
Dan Graur
Barbara Aquilani
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Mohammed Alweshah
Chen Ma
Home
/
Author
/
MOHAMMED ANBAR
Author Info
Open Visualization
Name
Affiliation
Papers
MOHAMMED ANBAR
National Advanced IPv6 Centre of Excellence, Universiti Sains Malaysia, Penang, Malaysia
26
Collaborators
Citations
PageRank
56
16
9.05
Referers
Referees
References
67
286
102
Search Limit
100
286
Publications (26 rows)
Collaborators (56 rows)
Referers (67 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues And Challenges
0
0.34
2022
Dns Rule-Based Schema To Botnet Detection
0
0.34
2021
Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks.
3
0.40
2020
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
1
0.35
2020
Intrusion detection system based on a modified binary grey wolf optimisation
3
0.36
2020
Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network.
0
0.34
2020
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.
0
0.34
2020
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.
0
0.34
2020
Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS).
0
0.34
2019
Labeled flow-based dataset of ICMPv6-based DDoS attacks
0
0.34
2019
Energy Efficient Multi-hop Path in Wireless Sensor Networks Using an Enhanced Genetic Algorithm
2
0.36
2019
Ddos Attack Aware Environment With Secure Clustering And Routing Based On Rpl Protocol Operation
0
0.34
2019
AUTHENTICATION AND PRIVACY APPROACH FOR DHCPv6
0
0.34
2019
Botnets Detecting Attack Based on DNS Features
0
0.34
2018
Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network.
0
0.34
2018
DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.
0
0.34
2018
Intrusion Detection Systems of ICMPv6-based DDoS attacks.
1
0.36
2018
Rule-based detection technique for ICMPv6 anomalous behaviour.
0
0.34
2018
A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks.
2
0.37
2018
NADTW: new approach for detecting TCP worm.
0
0.34
2017
IPv6 OS Fingerprinting Methods: Review.
0
0.34
2017
Comparative performance analysis of classification algorithms for intrusion detection system.
0
0.34
2016
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)
1
0.39
2015
A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES
2
0.36
2014
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning SCANS
1
0.36
2012
An Investigation Towards Worms Detection Approaches over Network
0
0.34
2011
1