Search Results - "Saleh Alomari, Esraa"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    A Secure Machine Learning-Based Optimal Routing in Ad Hoc Networks for Classifying and Predicting Vulnerabilities by Reddy Yeruva, Ajay, Saleh Alomari, Esraa, Rashmi, S., Shrivastava, Anurag, Kathiravan, M., Chaturvedi, Abhay

    Published in Cybernetics and systems (08-01-2023)
    “…In both the military and the civilian sectors, next-generation wireless networks can be employed for a wide range of intricate and adaptive applications. It is…”
    Get full text
    Journal Article
  2. 2

    Malware Detection Using Deep Learning and Correlation-Based Feature Selection by Alomari, Esraa Saleh, Nuiaa, Riyadh Rahef, Alyasseri, Zaid Abdi Alkareem, Mohammed, Husam Jasim, Sani, Nor Samsiah, Esa, Mohd Isrul, Musawi, Bashaer Abbuod

    Published in Symmetry (Basel) (01-01-2023)
    “…Malware is one of the most frequent cyberattacks, with its prevalence growing daily across the network. Malware traffic is always asymmetrical compared to…”
    Get full text
    Journal Article
  3. 3

    VANET Network Traffic Anomaly Detection Using GRU-Based Deep Learning Model by ALMahadin, Ghayth, Aoudni, Yassine, Shabaz, Mohammad, Agrawal, Anurag Vijay, Yasmin, Ghazaala, Alomari, Esraa Saleh, Al-Khafaji, Hamza Mohammed Ridha, Dansana, Debabrata, Maaliw, Renato Racelis

    Published in IEEE transactions on consumer electronics (01-02-2024)
    “…The rise of Vehicular Ad-hoc Networks (VANETs) has led to the growing significance in intelligent transportation systems. This research suggests a deep…”
    Get full text
    Journal Article
  4. 4
  5. 5
  6. 6

    Secured Environment for Cloud Integrated Fog and Mist Architecture by Ridha Al-Khafaji, Hamza Mohammed, Saleh Alomari, Esraa, Majdi, Hasan Shakir

    “…One of the most overgrown research domains is Fog computing in which cloud services are strikingly extended to the network's edge, simultaneously inducing…”
    Get full text
    Conference Proceeding