An efficient dynamic addressing based routing protocol for underwater wireless sensor networks YB Muhammad Ayaz, Azween Abdullah, Ibrahima Faye Science Direct 35 (4), 475-486, 2012 | 123* | 2012 |
The impact of artificial intelligence on language translation: a review YA Mohamed, A Khanan, M Bashir, AHHM Mohamed, MAE Adiel, ... Ieee Access 12, 25553-25579, 2024 | 66 | 2024 |
Immune inspired framework for ad hoc network security YA Mohamed, AB Abdullah 2009 IEEE International Conference on Control and Automation, 297-302, 2009 | 17 | 2009 |
An enhancement of data encryption standards algorithm (DES) NMM Alhag, YA Mohamed 2018 International Conference on Computer, Control, Electrical, and …, 2018 | 16 | 2018 |
Immune inspired approach for securing wireless ad hoc networks M Yasir Abdelgadir, A Azween IJCSNS International Journal of Computer Science and Network Security 9 (7 …, 2009 | 13 | 2009 |
Implementation of IDS with response for securing MANETs YA Mohamed, AB Abdullah 2010 International Symposium on Information Technology 2, 660-665, 2010 | 11 | 2010 |
Immune-inspired framework for securing hybrid MANET YA Mohamed, AB Abdullah 2009 IEEE Symposium on Industrial Electronics & Applications 1, 301-306, 2009 | 11 | 2009 |
Security mechanism for MANETs YA Mohamed, AB Abdullah Journal of Engineering Science and Technology 4 (2), 231-242, 2009 | 11 | 2009 |
Adaptive Immune-based system for network security RAA Farah, YA Mohamed 2018 International Conference on Computer, Control, Electrical, and …, 2018 | 9 | 2018 |
Enhancing intrusion detection using statistical functions MA Ahmed, YA Mohamed 2018 International Conference on Computer, Control, Electrical, and …, 2018 | 8 | 2018 |
I2MANET Security Logical Specification Framework. YA Mohamed, A Abdullah Int. Arab J. Inf. Technol. 9 (6), 495-503, 2012 | 7 | 2012 |
Improving the operation and maintenance for better sediment and water management in Gezira Scheme, Sudan IS Osman, B Schultz, FX Suryadi, Y Mohamed, AK Osman Proceedings of the ICID 21st International Congress on Irrigation and …, 2011 | 6 | 2011 |
Biologically inspired model for securing hybrid mobile ad hoc networks Y Abdelgadir, A Abdullah 2008 International Symposium on Information Technology 2, 1-6, 2008 | 6 | 2008 |
From bytes to insights: a systematic literature review on unraveling IDS datasets for enhanced cybersecurity understanding A Khanan, YA Mohamed, AH Mohamed, M Bashir IEEE Access, 2024 | 5 | 2024 |
Accuracy and problems of machine-based translation in contrast to human-based translation when rendering health awareness texts versus poetry texts MAE Adiel, MA Elsadig, A Altigani, YA Mohamed, BES Ahmed, ... Academic Journal of Interdisciplinary Studies 12 (4), 223-231, 2023 | 5 | 2023 |
A Comparative Study of Leadership Perceptions in Government and Education Sectors: Insights from the UAE and Oman YM Raed Awashreh The International Journal of Organizational Diversity 24 (2), 109-123, 2024 | 4 | 2024 |
An approach for software-defined networks security SB Ahmed, YA Mohamed 2023 Second International Conference on Electrical, Electronics, Information …, 2023 | 4 | 2023 |
The impact of coupling signaling protocols and codecs scheme in achieving VoIP Quality HAS Mekki, YA Mohammed American Scientific Research Journal for Engineering, Technology, and …, 2017 | 4 | 2017 |
A two-stage assessment approach for QoS in internet of things based on fuzzy logic ME Adam, YAA Hamid International Journal of Advanced Computer Science and Applications 13 (4), 2022 | 3 | 2022 |
A novel Mechanism for Securing Cloud Computing YA Mohamed The International Arab Conference on Information Technology (ACIT’2013), 2013 | 3 | 2013 |