Iznan H Hasbullah
Universiti Sains Malaysia
H-index: 19
Asia-Malaysia
Top articles of Iznan H Hasbullah
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Secure map-based crypto-stego technique based on mac address | Bulletin of Electrical Engineering and Informatics | Dima S Kasasbeh Bushra M Al-Ja’afreh Mohammed Anbar Iznan H Hasbullah Mahmoud Al Khasawneh | 2024/4/4 |
Neighbor discovery protocol anomaly-based detection system using neural network algorithm | International Journal of Information Security | Redhwan MA Saad Mohammed Anbar Selvakumar Manickam Samir I Shaheen Iznan H Hasbullah | 2024/2/11 |
A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking | Ali Sohail Naeem A Nawaz Asghar Ali Shah Saim Rasheed Sheeba Ilyas | 2022/12/20 | |
Effectiveness of an entropy-based approach for detecting low-and high-rate DDoS attacks against the SDN controller: Experimental analysis | Applied Sciences | Mohammad Adnan Aladaileh Mohammed Anbar Ahmed J Hintaw Iznan H Hasbullah Abdullah Ahmed Bahashwan | 2023/1/5 |
An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher | Computers, Materials & Continua | Ghofran Kh Shraida Hameed A Younis Taief Alaa Al-Amiedy Mohammed Anbar Hussain A Younis | 2023/3 |
Machine and deep learning techniques for detecting internet protocol version six attacks: a review. | Arkan Hammoodi Hasan Kabla Mohammed Anbar Shady Hamouda Abdullah Ahmed Bahashwan Taief Alaa Al-Amiedy | 2023/10/1 | |
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things | Taief Alaa Al-Amiedy Mohammed Anbar Bahari Belaton Abdullah Ahmed Bahashwan Iznan Husainy Hasbullah | 2023/7/1 | |
Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks | Applied Sciences | Mahmood A Al-Shareeda Mohammed Anbar Selvakumar Manickam Iznan H Hasbullah | 2022/1/27 |
Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller. | Computers, Materials & Continua | MohaMohammad Mohammed Adnan Aladaileh Iznan H. Anbar Abdullah Ahmed Hasbullah | 2022/8/18 |
Renyi joint entropy-based dynamic threshold approach to detect DDoS attacks against SDN controller with various traffic rates | Applied Sciences | Mohammad Adnan Aladaileh Mohammed Anbar Ahmed J Hintaw Iznan H Hasbullah Abdullah Ahmed Bahashwan | 2022/6/16 |
Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks | Applied Sciences | Omar E Elejla Mohammed Anbar Shady Hamouda Serri Faisal Abdullah Ahmed Bahashwan | 2022/6/16 |
A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things | Taief Alaa Al-Amiedy Mohammed Anbar Bahari Belaton Arkan Hammoodi Hasan Kabla Iznan H Hasbullah | 2022/4/29 | |
Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy | Ziyad R Alashhab Mohammed Anbar Manmeet Mahinderjit Singh Iznan H Hasbullah Prateek Jain | 2022/12/5 | |
A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks | Sensors | Mahmood A Al-Shareeda Mohammed Anbar Selvakumar Manickam Iznan H Hasbullah | 2022/2/22 |
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection | Symmetry | Omar E Elejla Mohammed Anbar Shady Hamouda Bahari Belaton Taief Alaa Al-Amiedy | 2022/12/3 |
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic | PeerJ Computer Science | Saif Al-Mashhadi Mohammed Anbar Iznan Hasbullah Taief Alaa Alamiedy | 2021/8/13 |
Se-cppa: A secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks | Sensors | Mahmood A Al-Shareeda Mohammed Anbar Selvakumar Manickam Iznan H Hasbullah | 2021/12 |
Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks | Mahmood A Al-Shareeda Mohammed Anbar Selvakumar Manickam Iznan Husainy Hasbullah | 2021/8/11 | |
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP) | Abdullah Ahmed Bahashwan Mohammed Anbar Selvakumar Manickam Iznan Husainy Hasbullah Mohammad A Aladaileh | 2022/1/1 | |
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP) | IEEE Access | Abdullah Ahmed Bahashwan Mohammed Anbar Iznan Husainy Hasbullah Ziyad R Alashhab Ali Bin-Salem | 2021/3/17 |