Novel deep convolutional neural network-based contextual recognition of Arabic handwritten scripts R Ahmed, M Gogate, A Tahir, K Dashtipour, B Al-Tamimi, A Hawalah, ... Entropy 23 (3), 340, 2021 | 65 | 2021 |
A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks M Anbar, R Abdullah, BN Al-Tamimi, A Hussain Cognitive Computation 10, 201-214, 2018 | 52 | 2018 |
Review on feature selection algorithms for anomaly-based intrusion detection system TA Alamiedy, M Anbar, AK Al-Ani, BN Al-Tamimi, N Faleh Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019 | 28 | 2019 |
Components and Analysis Method of Enterprise Resource Planning (ERP) Requirements in Small and Medium Enterprises (SMEs) B Khaleel, Y., Abuhamdah, A., Sara, M. A., & Al-Tamimi International Journal of Electrical and Computer Engineering (IJECE) 6 (2), 2016 | 27* | 2016 |
Cloud computing and internet of things integration systems: a review A Amairah, BN Al-tamimi, M Anbar, K Aloufi Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019 | 22 | 2019 |
Arabic sentiment analysis based on word embeddings and deep learning N Elhassan, G Varone, R Ahmed, M Gogate, K Dashtipour, H Almoamari, ... Computers 12 (6), 126, 2023 | 13 | 2023 |
Protecting teredo clients from source routing exploits BNA AL-tamimi, AM Taib, R Budiarto 2008 First International Conference on Distributed Framework and …, 2008 | 9 | 2008 |
Climbing harmony search algorithm for nurse rostering problems M Hadwan, M Ayob, M Al-Hagery, BN Al-Tamimi Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019 | 6 | 2019 |
A Novel Hierarchical Extreme Machine-Learning-Based Approach for Linear Attenuation Coefficient Forecasting G Varone, C Ieracitano, AÖ Çiftçioğlu, T Hussain, M Gogate, K Dashtipour, ... Entropy 25 (2), 253, 2023 | 2 | 2023 |
Fuzzy unbalanced linguistic variables to enhance the course assessment process M Al-Sarem, BN Al-Tamimi 2016 11th International Conference on Intelligent Systems: Theories and …, 2016 | 1 | 2016 |
Cybersecurity Challenges and Implications for the Adoption of Cloud Computing and IoT: DDoS Attacks as an Example BN Al-Tamimi, H Almoamari, A Nehme, S Basurra Decision Making and Security Risk Management for IoT Environments, 39-51, 2024 | | 2024 |
Protecting Home Agent Client from IPv6 Routing Header Vulnerability in Mixed IP Networks BN Al-Tamimi, M Shenify, R Budiarto Journal of Information & Communication Technology 14, 2015 | | 2015 |
Exploiting IPV6 Routing Headers Type 0/2 in Different IP Wireless Networks: Attack Scenario & Analysis BN Al-Tamimi, R Budiarto, MA Omar, K M. Journal of Theoretical and Applied Information Technology 59 (2), 2014 | | 2014 |
A New Approach for Seamless Mobility and Security in Coexist IPv4 BNA Al-Tamimi Universiti Sains Malaysia, 2014 | | 2014 |
A New Scheme for a Mobile Node Seamless Mobility in Mixed Networks IPv4 and IPv6 Traversing NAT Routers BN Al-Tamimi, R Budiarto, MA Omar | | 2012 |
Using Fuzzy Unbalanced Linguistic Variables to Enhance the Course Assessment Process M Al-Sarem, BN Al-Tamimi | | |