Name
Affiliation
Papers
MOHAMMED ANBAR
National Advanced IPv6 Centre of Excellence, Universiti Sains Malaysia, Penang, Malaysia
26
Collaborators
Citations 
PageRank 
56
16
9.05
Referers 
Referees 
References 
67
286
102
Search Limit
100286
Title
Citations
PageRank
Year
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues And Challenges00.342022
Dns Rule-Based Schema To Botnet Detection00.342021
Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks.30.402020
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm10.352020
Intrusion detection system based on a modified binary grey wolf optimisation30.362020
Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network.00.342020
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.00.342020
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.00.342020
Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS).00.342019
Labeled flow-based dataset of ICMPv6-based DDoS attacks00.342019
Energy Efficient Multi-hop Path in Wireless Sensor Networks Using an Enhanced Genetic Algorithm20.362019
Ddos Attack Aware Environment With Secure Clustering And Routing Based On Rpl Protocol Operation00.342019
AUTHENTICATION AND PRIVACY APPROACH FOR DHCPv600.342019
Botnets Detecting Attack Based on DNS Features00.342018
Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network.00.342018
DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.00.342018
Intrusion Detection Systems of ICMPv6-based DDoS attacks.10.362018
Rule-based detection technique for ICMPv6 anomalous behaviour.00.342018
A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks.20.372018
NADTW: new approach for detecting TCP worm.00.342017
IPv6 OS Fingerprinting Methods: Review.00.342017
Comparative performance analysis of classification algorithms for intrusion detection system.00.342016
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)10.392015
A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES20.362014
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning SCANS10.362012
An Investigation Towards Worms Detection Approaches over Network00.342011