Reliable behavioral dataset for IPv6 neighbor discovery protocol investigation F Najjar, MM Kadhum 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015 | 15 | 2015 |
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detection F Najjar, M Kadhum, H El-Taj Proceedings of the 4th International Conference on Internet Applications …, 2015 | 13 | 2015 |
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study H El-Taj, F Najjar, H Alsenawi, M Najjar International Journal of Computer Science and Information Security 10 (6), 50, 2012 | 13 | 2012 |
Detecting neighbor discovery protocol-based flooding attack using machine learning techniques F Najjar, MM Kadhum, H El-Taj Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016 | 12 | 2016 |
IPv6 change threats behavior F Najjar, H El-Taj International Journal of Advanced Computer Science and Applications 6 (1), 2015 | 9 | 2015 |
d-HMAC Dynamic HMAC function M Najjar, F Najjar 2006 International Conference on Dependability of Computer Systems, 119-126, 2006 | 5 | 2006 |
An Analysis of Neighbor Discovery Protocol Attacks F Najjar, Q Bsoul, H Al-Refai Computers 12 (6), 125, 2023 | 1 | 2023 |
Detecting Neighbor Discovery Protocol Flooding Attack using Machine Learning Techniques F Najjar, M Kadum, H El-Taj | | |
A Study to investigate the possibility of using a decision-making model with IPS F Najjar | | |