Mohammed Anbar

Orcid: 0000-0002-7026-6408

According to our database1, Mohammed Anbar authored at least 71 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things.
IEEE Access, 2024

2023
Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks.
Sensors, October, 2023

Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models.
Sensors, September, 2023

CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks.
Sensors, July, 2023

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things.
Internet Things, July, 2023

Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner.
Sensors, April, 2023

Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller.
Syst., 2023

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.
Sensors, 2023

Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.
Sensors, 2023

Deep learning approach for detecting router advertisement flooding-based DDoS attacks.
J. Ambient Intell. Humaniz. Comput., 2023

Security and Integrity Attacks in Named Data Networking: A Survey.
IEEE Access, 2023

Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks.
IEEE Access, 2023

Normalization and Denormalization for a Document-Oriented Data.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

2022
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet.
Symmetry, 2022

Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection.
Symmetry, 2022

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
Sensors, 2022

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.
Sensors, 2022

Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization.
Expert Syst. Appl., 2022

Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks.
EURASIP J. Wirel. Commun. Netw., 2022

Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges.
Comput. Syst. Sci. Eng., 2022

Towards deep observation: A systematic survey on artificial intelligence techniques to monitor fetus via Ultrasound Images.
CoRR, 2022

Hierarchical Naming Scheme in Named Data Networking for Internet of Things: A Review and Future Security Challenges.
IEEE Access, 2022

Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum.
IEEE Access, 2022

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review.
IEEE Access, 2022

2021
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
Sensors, 2021

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic.
PeerJ Comput. Sci., 2021

DNS rule-based schema to botnet detection.
Enterp. Inf. Syst., 2021

COVID-19 Automatic Detection Using Deep Learning.
Comput. Syst. Sci. Eng., 2021

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey.
IEEE Access, 2021

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2021

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms.
IEEE Access, 2021

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP).
IEEE Access, 2021

2020
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.
Symmetry, 2020

Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.
Symmetry, 2020

Intrusion detection system based on a modified binary grey wolf optimisation.
Neural Comput. Appl., 2020

Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm.
J. Ambient Intell. Humaniz. Comput., 2020

ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review.
IEEE Access, 2020

VPPCS: VANET-Based Privacy-Preserving Communication Scheme.
IEEE Access, 2020

Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks.
IEEE Access, 2020

LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network.
IEEE Access, 2020

Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks.
IEEE Access, 2020

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review.
IEEE Access, 2020

Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network.
IEEE Access, 2020

Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

A Labeled Transactions-Based Dataset on the Ethereum Network.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS).
Symmetry, 2019

Labeled flow-based dataset of ICMPv6-based DDoS attacks.
Neural Comput. Appl., 2019

Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm.
Inf. Sci., 2019

DDoS attack aware environment with secure clustering and routing based on RPL protocol operation.
IET Circuits Devices Syst., 2019

Authentication and Privacy Approach for DHCPv6.
IEEE Access, 2019

New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization Technology.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

A Flexible Schema for Document Oriented Database (SDOD).
Proceedings of the 11th International Joint Conference on Knowledge Discovery, 2019

Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Rule-based detection technique for ICMPv6 anomalous behaviour.
Neural Comput. Appl., 2018

Intrusion Detection Systems of ICMPv6-based DDoS attacks.
Neural Comput. Appl., 2018

Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network.
J. Commun., 2018

DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.
J. Commun., 2018

A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks.
Cogn. Comput., 2018

Botnets Detecting Attack Based on DNS Features.
Proceedings of the International Arab Conference on Information Technology, 2018

2017
NADTW: new approach for detecting TCP worm.
Neural Comput. Appl., 2017

IPv6 OS Fingerprinting Methods: Review.
Proceedings of the Advances in Visual Informatics, 2017

2016
Comparative performance analysis of classification algorithms for intrusion detection system.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

An overview of DDoS attacks based on DNS.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift).
J. Comput. Sci., 2015

2014
A Review of Peer-to-Peer Botnet Detection Techniques.
J. Comput. Sci., 2014

2012
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS).
Int. J. Comput. Math., 2012

2011
An Investigation Towards Worms Detection Approaches over Network.
Proceedings of the 13th UKSim-AMSS International Conference on Computer Modelling and Simulation, Cambridge University, Emmanuel College, Cambridge, UK, 30 March, 2011


  Loading...