A method for analyzing text using VOSviewer UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ... MethodsX 11, 102339, 2023 | 135 | 2023 |
A survey on detecting black hole attack in AODV-based mobile ad hoc networks RAR Mahmood, AI Khan 2007 International Symposium on High Capacity Optical Networks and Enabling …, 2007 | 72 | 2007 |
Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime OA Amodu, RAR Mahmood Wireless Networks 22 (November), 1-24, 2016 | 47 | 2016 |
Feature selection based on genetic algorithm and SupportVector machine for intrusion detection system A Dastanpour, RAR Mahmood The second international conference on informatics engineering & information …, 2013 | 35 | 2013 |
Age of Information minimization in UAV-aided data collection for WSN and IoT applications: A systematic review OA Amodu, UA Bukar, RAR Mahmood, C Jarray, M Othman Journal of Network and Computer Applications 216, 103652, 2023 | 28 | 2023 |
A method for analyzing text using VOSviewer. MethodsX, 11, 102339 UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ... | 25 | 2023 |
Performance evaluation of intrusion detection system using selected features and machine learning classifiers RAR Mahmood, AH Abdi, M Hussin Baghdad Science Journal 18 (2 (Suppl.)), 0884-0884, 2021 | 25 | 2021 |
Analysis of pattern recognition algorithms using associative memory approach: a comparative study between the hopfield network and distributed hierarchical graph neuron (DHGN) AHM Amin, RAR Mahmood, AI Khan 2008 IEEE 8th International Conference on Computer and Information …, 2008 | 18 | 2008 |
A survey on the design aspects and opportunities in age-aware uav-aided data collection for sensor networks and internet of things applications OA Amodu, R Nordin, C Jarray, UA Bukar, RA Raja Mahmood, M Othman Drones 7 (4), 260, 2023 | 17 | 2023 |
Malware classification framework for dynamic analysis using information theory E Moshiri, AB Abdullah, R Azlina, B Raja, Z Muda Indian Journal of Science and Technology 10 (21), 1-10, 2017 | 9 | 2017 |
An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks AI Khan, AHM Amin, RAR Mahmood Mobile Intelligence, 380-411, 2010 | 8 | 2010 |
R.(2023). A method for analyzing text using VOSviewer UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ... MethodsX 11, 102339, 0 | 8 | |
Text Analysis on Early Reactions to ChatGPT as a Tool for Academic Progress or Exploitation UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ... SN Computer Science 5 (4), 366, 2024 | 6 | 2024 |
A Method for Analyzing Text Using VOSviewer. MethodsX. 2023; 11: 102339 UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ... | 5 | 2023 |
Sentiment evaluation of public transport in social media using naïve bayes method N Othman, M Hussin, RAR Mahmood Int J Eng Adv Technol 9, 2305-2308, 2019 | 5 | 2019 |
An experimental ipv6 testbed system with mobile ipv6 RAR Mahmood, M Othman, A Muhammed Proceedings of Information Technology Colloquium, 122-128, 2004 | 5 | 2004 |
Performance evaluation of intrusion detection system using selected features and machine learning classifiers. Baghdad Sci. J. 2021; 18 (2 (Suppl.)): 0884 RAR Mahmood, A Abdi, M Hussin | 5 | |
IPv6 Translator: Makes IPv6 Migration Much Easier K Anuttullah, MKM Supian, RAR Mahmood Proceedings of 4th MIMOS R&D Symposium on ICT and Microelectronics, 25-40, 2002 | 4 | 2002 |
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks RAR Mahmood, M Hussin, N Manshor, AI Khan 2014 International Conference on Computational Science and Technology (ICCST …, 2014 | 3 | 2014 |
Effective black hole attacks in MANETS RAR Mahmood, ZM Hanapi, S Hasan, AI Khan Journal of Computer Science 9 (12), 1722-1733, 2013 | 3 | 2013 |