关注
Dr. Bassam N. Al-Tamimi
Dr. Bassam N. Al-Tamimi
在 bcu.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Novel deep convolutional neural network-based contextual recognition of Arabic handwritten scripts
R Ahmed, M Gogate, A Tahir, K Dashtipour, B Al-Tamimi, A Hawalah, ...
Entropy 23 (3), 340, 2021
652021
A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks
M Anbar, R Abdullah, BN Al-Tamimi, A Hussain
Cognitive Computation 10, 201-214, 2018
522018
Review on feature selection algorithms for anomaly-based intrusion detection system
TA Alamiedy, M Anbar, AK Al-Ani, BN Al-Tamimi, N Faleh
Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019
282019
Components and Analysis Method of Enterprise Resource Planning (ERP) Requirements in Small and Medium Enterprises (SMEs)
B Khaleel, Y., Abuhamdah, A., Sara, M. A., & Al-Tamimi
International Journal of Electrical and Computer Engineering (IJECE) 6 (2), 2016
27*2016
Cloud computing and internet of things integration systems: a review
A Amairah, BN Al-tamimi, M Anbar, K Aloufi
Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019
222019
Arabic sentiment analysis based on word embeddings and deep learning
N Elhassan, G Varone, R Ahmed, M Gogate, K Dashtipour, H Almoamari, ...
Computers 12 (6), 126, 2023
132023
Protecting teredo clients from source routing exploits
BNA AL-tamimi, AM Taib, R Budiarto
2008 First International Conference on Distributed Framework and …, 2008
92008
Climbing harmony search algorithm for nurse rostering problems
M Hadwan, M Ayob, M Al-Hagery, BN Al-Tamimi
Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019
62019
A Novel Hierarchical Extreme Machine-Learning-Based Approach for Linear Attenuation Coefficient Forecasting
G Varone, C Ieracitano, AÖ Çiftçioğlu, T Hussain, M Gogate, K Dashtipour, ...
Entropy 25 (2), 253, 2023
22023
Fuzzy unbalanced linguistic variables to enhance the course assessment process
M Al-Sarem, BN Al-Tamimi
2016 11th International Conference on Intelligent Systems: Theories and …, 2016
12016
Cybersecurity Challenges and Implications for the Adoption of Cloud Computing and IoT: DDoS Attacks as an Example
BN Al-Tamimi, H Almoamari, A Nehme, S Basurra
Decision Making and Security Risk Management for IoT Environments, 39-51, 2024
2024
Protecting Home Agent Client from IPv6 Routing Header Vulnerability in Mixed IP Networks
BN Al-Tamimi, M Shenify, R Budiarto
Journal of Information & Communication Technology 14, 2015
2015
Exploiting IPV6 Routing Headers Type 0/2 in Different IP Wireless Networks: Attack Scenario & Analysis
BN Al-Tamimi, R Budiarto, MA Omar, K M.
Journal of Theoretical and Applied Information Technology 59 (2), 2014
2014
A New Approach for Seamless Mobility and Security in Coexist IPv4
BNA Al-Tamimi
Universiti Sains Malaysia, 2014
2014
A New Scheme for a Mobile Node Seamless Mobility in Mixed Networks IPv4 and IPv6 Traversing NAT Routers
BN Al-Tamimi, R Budiarto, MA Omar
2012
Using Fuzzy Unbalanced Linguistic Variables to Enhance the Course Assessment Process
M Al-Sarem, BN Al-Tamimi
系统目前无法执行此操作,请稍后再试。
文章 1–16