Review of syn-flooding attack detection mechanism ME Manna, A Amphawan arXiv preprint arXiv:1202.1761, 2012 | 35 | 2012 |
DDoS attack detection approach using an efficient cluster analysis in large data scale W Bhaya, ME Manaa 2017 Annual Conference on New Trends in Information & Communications …, 2017 | 33 | 2017 |
REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS B Wesam, M Mehdi Ebady Journal of Computer Science 10 (10), 2037-2046, 2014 | 26 | 2014 |
A proactive DDoS attack detection approach using data mining cluster analysis W Bhaya, ME Manaa Journal of Next Generation Information Technology 5 (4), 36, 2014 | 21 | 2014 |
A proactive metaheuristic model for optimizing weights of artificial neural network AH Alsaeedi, AH Aljanabi, ME Manna, AL Albukhnefis Indones. J. Electr. Eng. Comput. Sci 20 (2), 976-984, 2020 | 17 | 2020 |
Web documents similarity using k-shingle tokens and minhash technique ME Manaa, G Abdulameer Journal of Engineering and Applied Sciences 13 (6), 1499-1505, 2018 | 16 | 2018 |
Predicting autism spectrum disorder (ASD) for toddlers and children using data mining techniques RA Musa, ME Manaa, G Abdul-Majeed Journal of Physics: Conference Series 1804 (1), 012089, 2021 | 12 | 2021 |
Unsupervised approach for email spam filtering using data mining M Manaa, A Obaid, M Dosh EAI Endorsed Transactions on Energy Web 8 (36), 2021 | 11 | 2021 |
Design an efficient internet of things data compression for healthcare applications AN Kahdim, ME Manaa Bulletin of Electrical Engineering and Informatics 11 (3), 1678-1686, 2022 | 8 | 2022 |
Classification of spam emails using deep learning NH Marza, ME Manaa, HA Lafta 2021 1st Babylon International Conference on Information Technology and …, 2021 | 8 | 2021 |
Data encryption scheme for large data scale in cloud computing ME Manaa Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 8 | 2017 |
Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach KF Hassan, ME Manaa Bulletin of Electrical Engineering and Informatics 11 (3), 1604-1613, 2022 | 7 | 2022 |
Scalable and robust cryptography approach using cloud computing ME Manaa, ZG Hadi Journal of Discrete Mathematical Sciences and Cryptography 23 (7), 1439-1445, 2020 | 7 | 2020 |
Hybrid load-balancing algorithm for distributed fog computing in internet of things environment AS Kadhim, ME Manaa Bulletin of Electrical Engineering and Informatics 11 (6), 3462-3470, 2022 | 5 | 2022 |
A proactive secure file approach using a block chain technique FN Abed, ME Manaa Journal of Discrete Mathematical Sciences and Cryptography 23 (7), 1447-1453, 2020 | 5 | 2020 |
A Cloud-Based Encryption for Document Storage Using Salesforce.com ME Manaa Journal of Engineering and Applied Sciences 13 (1 S1), 2382-2387, 2018 | 5 | 2018 |
Improved MANET Routing Protocols Performance using Optimization Methods ME Manaa, SD Shamsi International Journal of Engineering & Technology 7 (4.19), 1-7, 2018 | 5 | 2018 |
Detecting distributed denial of service attacks in internet of things networks using machine learning in fog computing KF Hassan, ME Manaa 2022 5th International Conference on Engineering Technology and its …, 2022 | 4 | 2022 |
Preventing Cross Site Scripting Attacks in Websites MEMR Hussein Asian Journal of Information Technology 15 (16), 2797-2804, 2016 | 4* | 2016 |
Big data analysis for healthcare application using minhash and machine learning in apache spark framework WS Albaldawi, RM Almuttairi, ME Manaa 2022 International Congress on Human-Computer Interaction, Optimization and …, 2022 | 3 | 2022 |