FCM–SVM Based Intrusion Detection System for Cloud Computing Environment AN Jaber, SU Rehman Cluster Computing 23 (4), 3221-3231, 2020 | 124 | 2020 |
Use of Cryptography in Cloud Computing AN Jaber, MF Zolkipli Control System, Computing and Engineering (ICCSCE), 2013 IEEE International …, 2013 | 78 | 2013 |
A Static Approach Towards Mobile Botnet Detection S Anwar, JM Zain, Z Inayat, RU Haq, A Karim, AN Jaber 3rd International Conference on Electronic Design (ICED), 2016, 563-567, 2016 | 55 | 2016 |
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing AN Jaber, MF Zolkipli, HA Shakir Lecture Notes on Data Engineering and Communications Technologies book …, 2017 | 38 | 2017 |
Response Option for Attacks Detected by Intrusion Detection System S Anwar, JM Zain, MF Zolkipli, Z Inayat, AN Jabir, JB Odili 2015 4th International Conference on Software Engineering and Computer …, 2015 | 35 | 2015 |
Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators A Jaber, L Fritsch International Conference on P2P, Parallel, Grid, Cloud and Internet …, 2022 | 26 | 2022 |
An overview of artificial intelligence used in malware L Fritsch, A Jaber, A Yazidi Symposium of the Norwegian AI Society, 41-51, 2022 | 23 | 2022 |
Data Security Analysis for DDoS Defense of Cloud Based Networks ANJ Mohammed Khudhur Hussein, Nasharuddin Bin Zainal IEEE Student Conference on Research and Development (SCOReD), 305-310, 2015 | 23 | 2015 |
A Short Review for Ransomware: Pros and Cons HA Shakir, AN Jaber International Conference on P2P, Parallel, Grid, Cloud and Internet …, 2017 | 19 | 2017 |
Missing-Values Imputation Algorithms for Microarray Gene Expression Data SD Kohbalan Moorthy, Aws Naser Jaber, Mohd Arfian Ismail, Ferda Ernawan ... Microarray Bioinformatics, 255-266, 2019 | 17 | 2019 |
Trusting Cloud Computing for Personal Files AN Jaber, MA Majid, MF Zolkipli, S Anwar International Conference on Information and Communication Technology …, 2014 | 17 | 2014 |
COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks AN Jaber, L Fritsch 2021 25th International Computer Science and Engineering Conference (ICSEC …, 2021 | 15 | 2021 |
Agent-Based Big Data Analytics In Retailing: A Case Study FD Ahmed, AN Jaber, MS Ahmad, MBA Majid 2015 4th International Conference on Software Engineering and Computer …, 2015 | 14 | 2015 |
Software Agent and Cloud Computing: A Brief Review FD Ahmed, MA Majid, M Sharifuddin, AN Jaber Int. J. Softw. Eng. Comput. Syst. 2 (1), 108-113, 2016 | 13 | 2016 |
Methods for preventing distributed denial of service attacks in cloud computing AN Jaber, MF Zolkipli, MA Majid, S Anwar Advanced Science Letters 23 (6), 5282-5285, 2017 | 12 | 2017 |
A Study in Data Security in Cloud Computing AN Jaber, MF Zolkipli, MBA Majid Computer, Communications, and Control Technology (I4CT), 2014 International …, 2014 | 11 | 2014 |
Present Status and Challenges in Cloud Monitoring Framework: A Survey AN Jaber, MF Zolkipli, S Anwar European Intelligence and Security Informatics Conference (EISIC), 201-201, 2016 | 10 | 2016 |
Session initiation protocol security: A brief review AN Jaber, CW Tan, S Manickam, AA Khudher Journal of Computer Science 8 (3), 348, 2012 | 10 | 2012 |
A study of SIP Trunk Security and Challenges AN Jaber, S Manickam, S Ramdas 2012 IEEE International Conference on Electronics Design, Systems and …, 2012 | 9 | 2012 |
Improving Phishing Detection with the Grey Wolf Optimizer AN Jaber, L Fritsch, H Haugerud 2022 International Conference on Electronics, Information, and Communication …, 2022 | 6 | 2022 |