全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Mohammed Anbar , Rosni Abdullah ...
来源:[J].Neural Computing and Applications(IF 1.168), 2017, Vol.28 (1), pp.525-538
摘要:A computer worm is a self-replicating malicious code that does not alter files but resides in active memory where it duplicates itself. Worms use parts of the operating system that are automatic and usually invisible to the user. Worms commonly exhibit abnormal behaviors, which b...
作者:Mohammed Anbar , Tat-Chee Wan
来源:[J].Information Sciences(IF 3.643), 2019, Vol.500, pp.259-273
摘要:Abstract(#br)Direct transmission in widespread wireless sensor networks, where the cluster heads (CHs) and the base station (BS) are far from each other, is considered a critical factor because of its influence on network efficiency in terms of power consumption and lifetime. Thi...
作者:Omar E. Elejla , Mohammed Anbar , Bahari Belaton
来源:[J].IETE Technical Review(IF 0.705), 2017, Vol.34 (4), pp.390-407
摘要:ABSTRACT(#br)The number of internet users and devices that are in need for more IP addresses to be assigned to them is rapidly increasing. A new protocol named IPv6 was developed in 1998 to overcome the addressing issue and to improve network communications in general. IPv6 is an...
作者:Mohammed Anbar , Selvakumar Manickam
来源:[J].IETE Technical Review(IF 0.705), 2016, Vol.33 (3), pp.244-255
摘要:ABSTRACT(#br)IPv6 was designed to solve the issue of adopting IPv4 addresses by presenting a large number of address spaces. Currently, many networking devices consider IPv6 as a supportive IPv6-enabled device that includes routers, notebooks, personal computers, and mobile phone...
作者:Mohammed Anbar , Ahmed Manasrah , Selvakumar Manickam
来源:[J].International Journal of Computer Mathematics(IF 0.542), 2012, Vol.89 (15), pp.1952-1969
摘要:Network scanning is considered to be the first step taken by attackers trying to gain access to a targeted network. System and network administrators find it useful if they are able to identify the targets scanned by network attackers. Resources and services can be further p...
作者:MOHAMMED ANBAR , AHMED K AL-ANI
来源:[J].Sādhanā: Published by the Indian Academy of Sciences(IF 0.393), 2020, Vol.45 (1), pp.390-407
摘要:Abstract(#br)Internet Protocol version 6 (IPv6) deployment continues to gain ground due to the increasing demand for IP addresses generated by the number of Internet facing devices, and it is compounded by the exhaustion of allocatable IPv4 addresses. Dynamic Host Configurat...
作者:Mohammed Anbar , Rosni Abdullah ...
来源:[J].Cognitive Computation(IF 0.867), 2018, Vol.10 (2), pp.201-214
摘要:Abstract(#br)Router advertisement (RA) flooding attack aims to exhaust all node resources, such as CPU and memory, attached to routers on the same link. A biologically inspired machine learning-based approach is proposed in this study to detect RA flooding attacks. The proposed t...
作者:... Bahari Belaton , Mohammed Anbar , Ahmad Alnajjar
来源:[J].Neural Computing and Applications(IF 1.168), 2018, Vol.30 (1), pp.45-56
摘要:Abstract(#br)Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are thorny and a grave problem of today’s Internet, resulting in economic damages for organizations and individuals. DoS and DDoS attacks that are using Internet Control Message Protocol ve...
作者:Mohammed Anbar , Bahari Belaton
来源:[J].Neural Computing and Applications(IF 1.168), 2019, Vol.31 (8), pp.3629-3646
摘要:Abstract(#br)DDoS attacks that depend on Internet Control Message Protocol version 6 (ICMPv6) are one of the most commonly performed IPv6 attacks against today’s IPv6 networks. A few detection systems were proposed to detect these attacks based on self-generated datasets. Th...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×