Mohammed Anbar
Orcid: 0000-0002-7026-6408
According to our database1,
Mohammed Anbar
authored at least 84 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review.
IEEE Access, 2025
2024
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
EURASIP J. Inf. Secur., December, 2024
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things.
Clust. Comput., December, 2024
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm.
Wirel. Networks, November, 2024
Artif. Intell. Rev., September, 2024
Neighbor discovery protocol anomaly-based detection system using neural network algorithm.
Int. J. Inf. Sec., June, 2024
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks.
J. King Saud Univ. Comput. Inf. Sci., January, 2024
Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation.
J. King Saud Univ. Comput. Inf. Sci., 2024
Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems.
Eng. Appl. Artif. Intell., 2024
Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things.
IEEE Access, 2024
Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy.
IEEE Access, 2024
2023
Sensors, October, 2023
Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models.
Sensors, September, 2023
CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks.
Sensors, July, 2023
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things.
Internet Things, July, 2023
Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner.
Sensors, April, 2023
Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller.
Syst., 2023
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.
Sensors, 2023
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.
Sensors, 2023
Deep learning approach for detecting router advertisement flooding-based DDoS attacks.
J. Ambient Intell. Humaniz. Comput., 2023
Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks.
IEEE Access, 2023
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023
2022
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
Sensors, 2022
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.
Sensors, 2022
Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization.
Expert Syst. Appl., 2022
Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks.
EURASIP J. Wirel. Commun. Netw., 2022
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges.
Comput. Syst. Sci. Eng., 2022
Towards deep observation: A systematic survey on artificial intelligence techniques to monitor fetus via Ultrasound Images.
CoRR, 2022
Hierarchical Naming Scheme in Named Data Networking for Internet of Things: A Review and Future Security Challenges.
IEEE Access, 2022
IEEE Access, 2022
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review.
IEEE Access, 2022
2021
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
Sensors, 2021
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic.
PeerJ Comput. Sci., 2021
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey.
IEEE Access, 2021
Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2021
Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms.
IEEE Access, 2021
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP).
IEEE Access, 2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP).
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
2020
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.
Symmetry, 2020
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.
Symmetry, 2020
Neural Comput. Appl., 2020
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm.
J. Ambient Intell. Humaniz. Comput., 2020
ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review.
IEEE Access, 2020
Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks.
IEEE Access, 2020
LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network.
IEEE Access, 2020
Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks.
IEEE Access, 2020
Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review.
IEEE Access, 2020
Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network.
IEEE Access, 2020
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS).
Symmetry, 2019
Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm.
Inf. Sci., 2019
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation.
IET Circuits Devices Syst., 2019
New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization Technology.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019
Proceedings of the 11th International Joint Conference on Knowledge Discovery, 2019
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification.
Proceedings of the Advances in Cyber Security - First International Conference, 2019
Proceedings of the Advances in Cyber Security - First International Conference, 2019
2018
Neural Comput. Appl., 2018
J. Commun., 2018
DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.
J. Commun., 2018
A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks.
Cogn. Comput., 2018
Proceedings of the International Arab Conference on Information Technology, 2018
2017
Proceedings of the Advances in Visual Informatics, 2017
2016
Comparative performance analysis of classification algorithms for intrusion detection system.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
2015
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift).
J. Comput. Sci., 2015
2014
2012
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS).
Int. J. Comput. Math., 2012
2011
Proceedings of the 13th UKSim-AMSS International Conference on Computer Modelling and Simulation, Cambridge University, Emmanuel College, Cambridge, UK, 30 March, 2011