Search Results - "Anbar, Mohammed"

Refine Results
  1. 1

    Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models by Rihan , Shaza Dawood Ahmed, Anbar , Mohammed, Alabsi, Basim Ahmad

    Published in Sensors (Basel, Switzerland) (23-08-2023)
    “…The Internet of Things (IoT) has transformed our interaction with technology and introduced security challenges. The growing number of IoT attacks poses a…”
    Get full text
    Journal Article
  2. 2

    Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm by Al-Shalabi, Mohammed, Anbar, Mohammed, Wan, Tat-Chee, Alqattan, Zakaria

    Published in Information sciences (01-10-2019)
    “…Direct transmission in widespread wireless sensor networks, where the cluster heads (CHs) and the base station (BS) are far from each other, is considered a…”
    Get full text
    Journal Article
  3. 3

    CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks by Alabsi, Basim Ahmad, Anbar, Mohammed, Rihan, Shaza Dawood Ahmed

    Published in Sensors (Basel, Switzerland) (19-07-2023)
    “…The Internet of Things (IoT) has brought significant advancements that have connected our world more closely than ever before. However, the growing number of…”
    Get full text
    Journal Article
  4. 4

    Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks by Rihan, Shaza Dawood Ahmed, Anbar, Mohammed, Alabsi, Basim Ahmad

    Published in Sensors (Basel, Switzerland) (30-09-2023)
    “…The significant surge in Internet of Things (IoT) devices presents substantial challenges to network security. Hackers are afforded a larger attack surface to…”
    Get full text
    Journal Article
  5. 5

    A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking by Bahashwan, Abdullah Ahmed, Anbar, Mohammed, Manickam, Selvakumar, Al-Amiedy, Taief Alaa, Aladaileh, Mohammad Adnan, Hasbullah, Iznan H

    Published in Sensors (Basel, Switzerland) (01-05-2023)
    “…Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability…”
    Get full text
    Journal Article
  6. 6

    Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation by Kasasbeh, Dima, Anbar, Mohammed

    “…Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the field of cybersecurity. Overlooking the properties of the carrier image and…”
    Get full text
    Journal Article
  7. 7

    ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review by Tayyab, Mohammad, Belaton, Bahari, Anbar, Mohammed

    Published in IEEE access (2020)
    “…Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's address depletion, but also mandated the use of Internet Control…”
    Get full text
    Journal Article
  8. 8

    Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks by Alabsi, Basim Ahmad, Anbar, Mohammed, Rihan, Shaza Dawood Ahmed

    Published in Sensors (Basel, Switzerland) (16-06-2023)
    “…The increasing use of Internet of Things (IoT) devices has led to a rise in Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks on these…”
    Get full text
    Journal Article
  9. 9

    Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks by Khudayer, Baidaa Hamza, Anbar, Mohammed, Hanshi, Sabri M., Wan, Tat-Chee

    Published in IEEE access (2020)
    “…The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various…”
    Get full text
    Journal Article
  10. 10

    A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks by Al-Shareeda, Mahmood A, Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H

    Published in Sensors (Basel, Switzerland) (22-02-2022)
    “…Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication…”
    Get full text
    Journal Article
  11. 11

    HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN by Bahashwan, Abdullah Ahmed, Anbar, Mohammed, Manickam, Selvakumar, Issa, Ghassan, Aladaileh, Mohammad Adnan, Alabsi, Basim Ahmad, Rihan, Shaza Dawood Ahmed

    Published in PloS one (08-02-2024)
    “…Software Defined Network (SDN) has alleviated traditional network limitations but faces a significant challenge due to the risk of Distributed Denial of…”
    Get full text
    Journal Article
  12. 12

    SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks by Al-Shareeda, Mahmood A, Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H

    Published in Sensors (Basel, Switzerland) (08-12-2021)
    “…Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system…”
    Get full text
    Journal Article
  13. 13

    A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things by Al-Amiedy, Taief Alaa, Anbar, Mohammed, Belaton, Bahari, Kabla, Arkan Hammoodi Hasan, Hasbullah, Iznan H, Alashhab, Ziyad R

    Published in Sensors (Basel, Switzerland) (29-04-2022)
    “…The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate…”
    Get full text
    Journal Article
  14. 14

    Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner by Shyaa, Methaq A, Zainol, Zurinahni, Abdullah, Rosni, Anbar, Mohammed, Alzubaidi, Laith, Santamaría, José

    Published in Sensors (Basel, Switzerland) (04-04-2023)
    “…Concept drift (CD) in data streaming scenarios such as networking intrusion detection systems (IDS) refers to the change in the statistical distribution of the…”
    Get full text
    Journal Article
  15. 15

    VPPCS: VANET-Based Privacy-Preserving Communication Scheme by Al-Shareeda, Mahmood A., Anbar, Mohammed, Manickam, Selvakumar, Yassin, Ali A.

    Published in IEEE access (01-01-2020)
    “…Over the past years, vehicular ad hoc networks (VANETs) have been commonly used in intelligent traffic systems. VANET's design encompasses critical features…”
    Get full text
    Journal Article
  16. 16

    An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network by Al-shareeda, Mahmood A., Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H.

    Published in Symmetry (Basel) (01-10-2020)
    “…The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group…”
    Get full text
    Journal Article
  17. 17

    Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks by Al-Shareeda, Mahmood A., Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan Husainy

    Published in IEEE access (2021)
    “…Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within…”
    Get full text
    Journal Article
  18. 18

    Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates by Aladaileh, Mohammad Adnan, Anbar, Mohammed, Hintaw, Ahmed J., Hasbullah, Iznan H., Bahashwan, Abdullah Ahmed, Al-Sarawi, Shadi

    Published in Applied sciences (01-06-2022)
    “…The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of…”
    Get full text
    Journal Article
  19. 19

    DAD-match; Security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network by Al-Ani, Ahmed K, Anbar, Mohammed, Manickam, Selvakumar, Al-Ani, Ayman

    Published in PloS one (02-04-2019)
    “…An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a…”
    Get full text
    Journal Article
  20. 20

    ETH-PSD: A MACHINE LEARNING-BASED PHISHING SCAM DETECTION APPROACH IN ETHEREUM by Kabla, Arkan Hammoodi Hasan, Anbar, Mohammed, Manickam, Selvakumar, Karupayah, Shankar

    Published in IEEE access (2022)
    “…Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals' attention to launch blockchain-based attacks…”
    Get full text
    Journal Article