全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Mohammed Anbar , Rosni Abdullah ...
来源:[J].Neural Computing and Applications(IF 1.168), 2017, Vol.28 (1), pp.525-538Springer
摘要:A computer worm is a self-replicating malicious code that does not alter files but resides in active memory where it duplicates itself. Worms use parts of the operating system that are automatic and usually invisible to the user. Worms commonly exhibit abnormal behaviors, which b...
作者:Mohammed Anbar , Selvakumar Manickam
来源:[J].IETE Technical Review(IF 0.705), 2016, Vol.33 (3), pp.244-255Taylor & Francis
摘要:ABSTRACT(#br)IPv6 was designed to solve the issue of adopting IPv4 addresses by presenting a large number of address spaces. Currently, many networking devices consider IPv6 as a supportive IPv6-enabled device that includes routers, notebooks, personal computers, and mobile phone...
作者:Omar E. Elejla , Mohammed Anbar , Bahari Belaton
来源:[J].IETE Technical Review(IF 0.705), 2017, Vol.34 (4), pp.390-407Taylor & Francis
摘要:ABSTRACT(#br)The number of internet users and devices that are in need for more IP addresses to be assigned to them is rapidly increasing. A new protocol named IPv6 was developed in 1998 to overcome the addressing issue and to improve network communications in general. IPv6 is an...
作者:Mohammed Anbar , Rosni Abdullah ...
来源:[J].Cognitive Computation(IF 0.867), 2018, Vol.10 (2), pp.201-214Springer
摘要:Abstract(#br)Router advertisement (RA) flooding attack aims to exhaust all node resources, such as CPU and memory, attached to routers on the same link. A biologically inspired machine learning-based approach is proposed in this study to detect RA flooding attacks. The proposed t...
作者:Mohammed Anbar , Tat-Chee Wan
来源:[J].Information Sciences(IF 3.643), 2019, Vol.500, pp.259-273Elsevier
摘要:Abstract(#br)Direct transmission in widespread wireless sensor networks, where the cluster heads (CHs) and the base station (BS) are far from each other, is considered a critical factor because of its influence on network efficiency in terms of power consumption and lifetime. Thi...
作者:... Bahari Belaton , Mohammed Anbar , Ahmad Alnajjar
来源:[J].Neural Computing and Applications(IF 1.168), 2018, Vol.30 (1), pp.45-56Springer
摘要:Abstract(#br)Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are thorny and a grave problem of today’s Internet, resulting in economic damages for organizations and individuals. DoS and DDoS attacks that are using Internet Control Message Protocol ve...
作者:Mohammed Anbar , Bahari Belaton
来源:[J].Neural Computing and Applications(IF 1.168), 2019, Vol.31 (8), pp.3629-3646Springer
摘要:Abstract(#br)DDoS attacks that depend on Internet Control Message Protocol version 6 (ICMPv6) are one of the most commonly performed IPv6 attacks against today’s IPv6 networks. A few detection systems were proposed to detect these attacks based on self-generated datasets. Th...
作者:Mohammed Anbar , Ahmed Manasrah , Selvakumar Manickam
来源:[J].International Journal of Computer Mathematics(IF 0.542), 2012, Vol.89 (15), pp.1952-1969Taylor & Francis
摘要:Network scanning is considered to be the first step taken by attackers trying to gain access to a targeted network. System and network administrators find it useful if they are able to identify the targets scanned by network attackers. Resources and services can be further p...
作者:... Ahmed Manasrah , Mohammed Anbar , Ahmed Al-Madi
来源:[J].International Journal of Computer Science and Information Security, 2010, Vol.8 (7), pp.151DOAJ
摘要:Correlating the Intrusion Detection Systems (IDS) is one challenging topic in the field of network security. There are many benefits from correlating the IDS alerts: to reduce the huge amount of alerts that IDS triggers, to reduce the false positive ratio and to figure out the re...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×