Design Network Intrusion Detection System using Hybrid Fuzzy-Neural Network MMT Jawhar, M Mehrotra International Journal of Computer Science and Security 4 (3), 258-294, 2010 | 78 | 2010 |
Anomaly Intrusion Detection System using Hamming Network Approach MMT Jawhar, M Mehrotra International Journal of Computer Science and Communication 1 (1), 163-167, 2010 | 15 | 2010 |
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System NB Ibraheem, MMT Jawhar, HM Osman AL-Rafidain Journal of Computer Sciences and Mathematics 10 (1), 127-135, 2013 | 7 | 2013 |
System Design for Packet Sniffer using NDIS Hooking MMT Jawhar, M Mehrotra International Journal of Computer Science and Communication ISSN: 0973-7391 …, 2010 | 6* | 2010 |
Proposing a Model for Detecting Intrusion Network Attacks Using Machine Learning Techniques TAJ Ali, M Jawhar JOURNAL OF EDUCATION AND SCIENCE, 2022 | 4 | 2022 |
Intrusion Detection System : A Design Perspective MM Taher, M Mehrotra The 2nd International Conference on Data Management, 190-194, 2009 | 4 | 2009 |
Compare between Particle Swarm optimization Algorithm (PSO) and Artificial Bee Colony optimization Algorithm (ABC) in detecting DoS attacks from network traffic AA Maha, MMT Jawhar TELKOMNIKA (Telecommunication Computing Electronics and Control) 20 (4), 2022 | 2* | 2022 |
Quality of Service and Load Balancing in Cloud Computing: A Review MMT Jawhar, HM Osman AL-Rafidain Journal of Computer Sciences and Mathematics 16 (1), 15-22, 2022 | 2 | 2022 |
THE DETECT DOS ATTACK FROM NETWORK TRAFFIC USING GRAY WOLF OPTIMIZATION ALGORITHM MMT Jawhar, MA Alalah Journal of Engineering Science and Technology 15 (No. 6), 3639 - 3648, 2020 | 1 | 2020 |
A Hybrid FCM Clustering- Neural Network Model for Intrusion Detection MMT Jawhar, M Mehrotra International Conference on Control, Robotics and Cybernetics (ICCRC 2011 …, 2011 | 1 | 2011 |
Detect botnet attacks traffic using long shorts term memory technique MMT Jawhar, MAA Mohammad Indonesian Journal of Electrical Engineering and Computer Sciencethis link …, 2023 | | 2023 |
Detecting network attacks model based on a convolutional neural network MMTJ Teba Ali Jasim Ali International Journal of Electrical and Computer Engineering (IJECE) 13 (3 …, 2023 | | 2023 |
Detecting network attacks Model based on a long short-term memory LSTM TA Jasi, MMT Jawhar | | 2022 |
Prevention of Cross-Site Scripting using Hash MMT Jawhar International Journal of Computer Science and Information Security (IJCSIS …, 2018 | | 2018 |
Implementation and Enhancing the design of Signature-based Intrusion Detection Model MMT Jawhar, M Mehrotra Journal of Computer Science and Engineering 11 (9), 2012 | | 2012 |
Protection Of Local Area Network From Internal Intruding: A Design Perspective MMT Jawhar, M Mehrotra International Conference on Emerging Trends in Computer Science …, 2010 | | 2010 |
Real Time Intrusion Detection System based on Neural Network MMT Jawhar, M Mehrotra International Conference On Data Management, pp.168-174, 2010 | | 2010 |
Design And Implementation Of Intrusion Detection System Using Genetic Algorithms MMT Jawhar, M Mehrotra International Conference on Emerging Trends in Computer Science …, 2010 | | 2010 |
Using genetic Algorithm in Task scheduling for Multiprocessing System AY Hammo, GS Basheer, MMT Jawhar AL-Rafidain Journal of Computer Sciences and Mathematics 4 (1), 81-98, 2007 | | 2007 |
استخدام الخوارزمية الجينية في جدولة المهام في الانظمة المتعددة المعالجات YH Asmaa, GS Basheer, MMT Jawhar مجلة الرافدين لعلوم الحاسبات والرياضيات 4 (1), 2007 | | 2007 |