Search Results - "Anbar, Mohammed"
-
1
Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models
Published in Sensors (Basel, Switzerland) (23-08-2023)“…The Internet of Things (IoT) has transformed our interaction with technology and introduced security challenges. The growing number of IoT attacks poses a…”
Get full text
Journal Article -
2
Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm
Published in Information sciences (01-10-2019)“…Direct transmission in widespread wireless sensor networks, where the cluster heads (CHs) and the base station (BS) are far from each other, is considered a…”
Get full text
Journal Article -
3
CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks
Published in Sensors (Basel, Switzerland) (19-07-2023)“…The Internet of Things (IoT) has brought significant advancements that have connected our world more closely than ever before. However, the growing number of…”
Get full text
Journal Article -
4
Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks
Published in Sensors (Basel, Switzerland) (30-09-2023)“…The significant surge in Internet of Things (IoT) devices presents substantial challenges to network security. Hackers are afforded a larger attack surface to…”
Get full text
Journal Article -
5
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking
Published in Sensors (Basel, Switzerland) (01-05-2023)“…Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability…”
Get full text
Journal Article -
6
Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation
Published in Journal of King Saud University. Computer and information sciences (01-07-2024)“…Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the field of cybersecurity. Overlooking the properties of the carrier image and…”
Get full text
Journal Article -
7
ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review
Published in IEEE access (2020)“…Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's address depletion, but also mandated the use of Internet Control…”
Get full text
Journal Article -
8
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks
Published in Sensors (Basel, Switzerland) (16-06-2023)“…The increasing use of Internet of Things (IoT) devices has led to a rise in Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks on these…”
Get full text
Journal Article -
9
Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks
Published in IEEE access (2020)“…The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various…”
Get full text
Journal Article -
10
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
Published in Sensors (Basel, Switzerland) (22-02-2022)“…Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication…”
Get full text
Journal Article -
11
HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN
Published in PloS one (08-02-2024)“…Software Defined Network (SDN) has alleviated traditional network limitations but faces a significant challenge due to the risk of Distributed Denial of…”
Get full text
Journal Article -
12
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Published in Sensors (Basel, Switzerland) (08-12-2021)“…Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system…”
Get full text
Journal Article -
13
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
Published in Sensors (Basel, Switzerland) (29-04-2022)“…The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate…”
Get full text
Journal Article -
14
Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner
Published in Sensors (Basel, Switzerland) (04-04-2023)“…Concept drift (CD) in data streaming scenarios such as networking intrusion detection systems (IDS) refers to the change in the statistical distribution of the…”
Get full text
Journal Article -
15
VPPCS: VANET-Based Privacy-Preserving Communication Scheme
Published in IEEE access (01-01-2020)“…Over the past years, vehicular ad hoc networks (VANETs) have been commonly used in intelligent traffic systems. VANET's design encompasses critical features…”
Get full text
Journal Article -
16
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network
Published in Symmetry (Basel) (01-10-2020)“…The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group…”
Get full text
Journal Article -
17
Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Published in IEEE access (2021)“…Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within…”
Get full text
Journal Article -
18
Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates
Published in Applied sciences (01-06-2022)“…The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of…”
Get full text
Journal Article -
19
DAD-match; Security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network
Published in PloS one (02-04-2019)“…An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a…”
Get full text
Journal Article -
20
ETH-PSD: A MACHINE LEARNING-BASED PHISHING SCAM DETECTION APPROACH IN ETHEREUM
Published in IEEE access (2022)“…Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals' attention to launch blockchain-based attacks…”
Get full text
Journal Article