DCA for bot detection Y Al-Hammadi, U Aickelin, J Greensmith 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on …, 2008 | 93 | 2008 |
The evolution of distributed systems towards microservices architecture T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi 2016 11th International Conference for Internet Technology and Secured …, 2016 | 50 | 2016 |
Multiple access for visible light communications: Research challenges and future trends SS Bawazir, PC Sofotasios, S Muhaidat, Y Al-Hammadi, ... Ieee Access 6, 26167-26174, 2018 | 48 | 2018 |
Deep-structured machine learning model for the recognition of mixed-defect patterns in semiconductor fabrication processes G Tello, OY Al-Jarrah, PD Yoo, Y Al-Hammadi, S Muhaidat, U Lee IEEE Transactions on Semiconductor Manufacturing 31 (2), 315-322, 2018 | 43 | 2018 |
Simplified subspaced regression network for identification of defect patterns in semiconductor wafer maps F Adly, O Alhussein, PD Yoo, Y Al-Hammadi, K Taha, S Muhaidat, ... IEEE Transactions on Industrial Informatics 11 (6), 1267-1276, 2015 | 39 | 2015 |
Detecting bots based on keylogging activities Y Al-Hammadi, U Aickelin 2008 Third International Conference on Availability, Reliability and …, 2008 | 36 | 2008 |
Randomized general regression network for identification of defect patterns in semiconductor wafer maps F Adly, PD Yoo, S Muhaidat, Y Al-Hammadi, U Lee, M Ismail IEEE Transactions on Semiconductor Manufacturing 28 (2), 145-152, 2015 | 34 | 2015 |
Popularity-based video caching techniques for cache-enabled networks: a survey HS Goian, OY Al-Jarrah, S Muhaidat, Y Al-Hammadi, P Yoo, M Dianati IEEE Access 7, 27699-27719, 2019 | 32 | 2019 |
Performance comparison between container-based and VM-based services T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN …, 2017 | 32 | 2017 |
Detecting botnets through log correlation Y Al-Hammadi, U Aickelin Available at SSRN 2831379, 2006 | 28 | 2006 |
Multi-layered clustering for power consumption profiling in smart grids OY Al-Jarrah, Y Al-Hammadi, PD Yoo, S Muhaidat IEEE Access 5, 18459-18468, 2017 | 27 | 2017 |
Semi-supervised multi-layered clustering model for intrusion detection OY Al-Jarrah, Y Al-Hammdi, PD Yoo, S Muhaidat, M Al-Qutayri Digital Communications and Networks 4 (4), 277-286, 2018 | 22 | 2018 |
Behavioural correlation for malicious bot detection Y Al-Hammadi, A Abdulla University of Nottingham, 2010 | 19 | 2010 |
Behavioural correlation for detecting P2P bots Y Al-Hammadi, U Aickelin 2010 Second International Conference on Future Networks, 323-327, 2010 | 17 | 2010 |
Blockchain-based ownership management for medical IoT (MIoT) devices M Alblooshi, K Salah, Y Alhammadi 2018 International Conference on Innovations in Information Technology (IIT …, 2018 | 16 | 2018 |
Secure lightweight ECC-based protocol for multi-agent IoT systems H Hasan, T Salah, D Shehada, MJ Zemerly, CY Yeun, M Al-Qutayri, ... 2017 IEEE 13th international conference on wireless and mobile computing …, 2017 | 15 | 2017 |
BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications D Shehada, CY Yeun, MJ Zemerly, M Al Qutayri, Y Al Hammadi, ... Security and Communication Networks 2017, 2017 | 15 | 2017 |
Anomaly detection for Internet worms Y Al-Hammadi, C Leckie 2005 9th IFIP/IEEE International Symposium on Integrated Network Management …, 2005 | 15 | 2005 |
Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs D Al-Terri, H Otrok, H Barada, M Al-Qutayri, Y Al Hammadi Computer Communications 104, 108-118, 2017 | 14 | 2017 |
Cache-aided non-orthogonal multiple access for 5G-enabled vehicular networks S Gurugopinath, PC Sofotasios, Y Al-Hammadi, S Muhaidat IEEE Transactions on Vehicular Technology 68 (9), 8359-8371, 2019 | 13 | 2019 |