关注
Omar Elejla
Omar Elejla
assistant professor
在 alaqsa.edu.ps 的电子邮件经过验证
标题
引用次数
引用次数
年份
ICMPv6-based DoS and DDoS attacks and defense mechanisms
OE Elejla, M Anbar, B Belaton
IETE Technical Review 34 (4), 390-407, 2017
702017
Intrusion Detection Systems of ICMPv6-based DDoS attacks
OE Elejla, B Belaton, M Anbar, A Alnajjar
Neural Computing and Applications, 1-12, 2016
452016
Flow-based IDS for ICMPv6-based DDoS attacks detection
OE Elejla, M Anbar, B Belaton, BO Alijla
Arabian Journal for Science and Engineering 43 (12), 7757-7775, 2018
422018
Comparative performance analysis of classification algorithms for intrusion detection system
M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla
2016 14th annual conference on privacy, security and trust (PST), 282-288, 2016
392016
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection
OE Elejla, B Belaton, M Anbar, B Alabsi, AK Al-Ani
Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019
312019
Labeled flow-based dataset of ICMPv6-based DDoS attacks
OE Elejla, M Anbar, B Belaton, S Hamouda
Neural Computing and Applications, 1-18, 2018
292018
Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks
OE Elejla, M Anbar, S Hamouda, S Faisal, AA Bahashwan, IH Hasbullah
Applied Sciences 12 (12), 6150, 2022
212022
A Reference Dataset for ICMPv6 Flooding Attacks* Omar E. Elejla," Bahari Belaton," Mohammed Anbar and “Ahmad Alnajjar" School of Computer Science, Universiti Sains Malaysia …
O Elejla
J. Eng. Appl. Sci 100, 476-481, 2016
182016
A New Set of Features for Detecting Router Advertisement Flooding Attacks
OE Elejla, B Belaton, M Anbar, IM Smadi
Information and Communication Technology (PICICT), 2017 Palestinian …, 2017
142017
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION.
OE Elejla, AB JANTAN, AALI AHMED
Journal of Theoretical & Applied Information Technology 70 (2), 2014
142014
Comparative Performance Analysis of classification algorithm for Internal Intrusion Detection
M Anbar, R Abdulah, IH Hasbullah, YW Chong, OE Elejla
2016 14th Annual Conference on Privacy Security and Trust (PCT), 12-14, 2016
132016
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation
BA Alabsi, M Anbar, S Manickam, OE Elejla
IET Circuits, Devices & Systems 13 (6), 748-755, 2019
122019
TrustQR: A new technique for the detection of phishing attacks on QR code
AY Alnajjar, S Manickam, M Anbar, S Al-Saleem, O Elejla
Advanced Science Letters 22 (10), 2905-2909, 2016
122016
IPv6 OS Fingerprinting Methods
OE Elejla, B Belaton, M Anbar, BO Alijla
International Visual Informatics Conference, 661-668, 2017
82017
Recommender model for messaging system at MOODLE
RR Atallah, TS Barhoom, OE Elejla
2017 Palestinian International Conference on Information and Communication …, 2017
72017
QRphish: An Automated QR Code Phishing Detection Approach
AY Alnajjar, M Anbar, S Manickam, O Elejla, H El-Taj
Journal Of Engineering And Applied Sciences 11 (3), 553-560, 2016
72016
Evaluating Security of MQTT Protocol in Internet of Things
A Al-Ani, WK Shen, AK Al-Ani, SA Laghari, OE Elejla
2023 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE …, 2023
42023
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
OEO Elejla
Ph. D. dissertation, School Comput. Sci., Univ. Sci. Malaysia, Penang, Malaysia, 2018
32018
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection
OE Elejla, M Anbar, S Hamouda, B Belaton, TA Al-Amiedy, IH Hasbullah
Symmetry 14 (12), 2556, 2022
22022
Normalization and Denormalization for a Document-Oriented Data.
S Hamouda, M Anbar, OE Elejla
ICAART (3), 972-979, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20