Evaluation of DDoS attacks detection in a CICIDS2017 dataset based on classification algorithms AA Abdulrahman, MK Ibrahem Iraqi Journal of Information and Communications Technology (IJICT) 1 (3), 2018 | 33 | 2018 |
Toward constructing a balanced intrusion detection dataset based on CICIDS2017 AA Abdulrahman, MK Ibrahem Samarra Journal of Pure and Applied Science 2 (3), 132-142, 2020 | 12 | 2020 |
Toward constructing a balanced intrusion detection dataset AAA Alsameraee, MK Ibrahem Samarra Journal of Pure and Applied Science, 2021 | 6 | 2021 |
Intrusion detection system using data stream classification AA Abdualrahman, MK Ibrahem Iraqi Journal of Science, 319-328, 2021 | 3 | 2021 |
Survey on intrusion detection system based on analysis concept drift: Status and future directions NS Salman, AA Abdulrahman International Journal of Nonlinear Analysis and Applications 14 (1), 299-307, 2023 | 2 | 2023 |
Edge detection for lips area using RGB color space AA Abdualrahman AL-USTATH journal 2 (209), 149-158, 2014 | 2 | 2014 |
Survey on distributed denial of service attack detection using deep learning: A review MD Jassem, AA Abdulrahman International Journal of Nonlinear Analysis and Applications 13 (2), 753-762, 2022 | 1 | 2022 |
Development of intrusion detection systems using the concept of drift in the data stream AAAN salman Dijlah Journal 6 (2), 2023 | | 2023 |
Construct an efficient distributed denial of service attack detection system based on data mining techniques AAA Dhurgham Kareem Gharkan Indonesian Journal of Electrical Engineering and Computer Science 29 (1 …, 2023 | | 2023 |
Construct an Efficient DDoS Attack Detection System Based on RF-C4. 5-GridSearchCV DK Ghurkan, AA Abdulrahman 2022 Iraqi International Conference on Communication and Information …, 2022 | | 2022 |
Reusable General Component in Unknown Domain BF AL-Dulaimi, AA Abdurehman Iraqi Journal of Information Technology 6 (1 اللغة الانكليزية), 2014 | | 2014 |
Software Security using Aspect-Oriented Software Development ABAK Amer Abdulmejeed Abdulrehman Buthainah F. AL-Dulaimi Journal Of College Of Education For Women 25 (3), 858-864, 2014 | | 2014 |
A comparative Study to calculate the Runs Property in the encryption systems AAA Ayad Ghazi Naser Al-Shimmariand Journal of the College of Education for Women 25 (4), 2014 | | 2014 |
Key Exchange Management by using Neural Network Synchronization BFALDA Abdulmejeed, AAWA Al Kader Journal of the College of Education for Women 24 (1), 2013 | | 2013 |
The Writer Authentication by Using Syllables Frequency AA Abdulrahman Baghdad Science Journal 5 (2), 318-323, 2008 | | 2008 |
Ear Biometrics Using Images Similarity Matching Measures AA Abdulrahman, AMS Rahma Journal of the College of Education for Women 19 (2), 2008 | | 2008 |