An overview of flow-based and packet-based intrusion detection performance in high speed networks H Alaidaros, M Mahmuddin, A Al Mazari Proceedings of the International Arab Conference on Information Technology, 1-9, 2011 | 54 | 2011 |
Forwarding strategies for named data networking based IOT: requirements, taxonomy, and open research challenges NA Askar, A Habbal, FZ Alden, X Wei, H Alaidaros, J Guo, H Yu IEEE access 11, 78363-78383, 2023 | 13 | 2023 |
Enhancing security performance with parallel crypto operations in ssl bulk data transfer phase HM Alaidaros, MFA Rasid, M Othman, RSAR Abdullah 2007 IEEE International Conference on Telecommunications and Malaysia …, 2007 | 12 | 2007 |
Flow-based approach on bro intrusion detection H Alaidaros, M Mahmuddin Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 11 | 2017 |
A secure multifactor-based clustering scheme for internet of vehicles SM Karim, A Habbal, H Hamouda, H Alaidaros Journal of King Saud University-Computer and Information Sciences 35 (10 …, 2023 | 6 | 2023 |
Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies M Raeisi-Varzaneh, O Dakkak, H Alaidaros, İ Avci Journal of Communications 19 (2), 2024 | 5 | 2024 |
From Packet-based Towards Hybrid Packet-based and Flow-based Monitoring for Efficient Intrusion Detection: An overview HM Alaidaros, M Mahmuddin, A Al Mazari Second International Conference on Communication and Information Technology, 2012 | 5 | 2012 |
Caching Strategies for the Metaverse: Taxonomy, Open Challenges, and Future Research Directions. AH Mohammed, H Alaidaros, F Salleh, MS Sajat, N Ramaha, A Habbal International Journal of Interactive Mobile Technologies 18 (14), 2024 | 3 | 2024 |
A new cybersecurity assessment framework for private networks S Alshehri, H Alaidaros, M Arafah, SH Bakry 2022 14th International Conference on Computational Intelligence and …, 2022 | 3 | 2022 |
Improving security performance with parallel crypto operations in ssl bulk data transfer HM Alaidaros, M Othman, MFA Rasid International Journal of Cryptology Research 1 (2), 235-243, 2009 | 3 | 2009 |
Advanced mathematical modeling of mitigating security threats in smart grids through deep ensemble model SA Sharaf, M Ragab, N Albogami, A AL-Malaise AL-Ghamdi, MF Sabir, ... Scientific Reports 14 (1), 23069, 2024 | 2 | 2024 |
Enhancing Secure Sockets Layer Bulk Data Transfer Phase Performance with Parallel Cryptography Algorithm HM Alaidaros Universiti Putra Malaysia, 2007 | 1 | 2007 |
Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT M Ragab, M Basheri, NN Albogami, A Subahi, OA Abdulkader, ... Alexandria Engineering Journal 110, 438-450, 2025 | | 2025 |
Conditional Hybrid Approach for Intrusion Detection H Alaidaros, M Mahmuddin | | 2016 |
Improving Security Performance with Parallel Crypto Operations in SSL Bulk Data Transfer AR and1Mohd Fadlee | | |
CHID: CONDITIONAL HYBRID INTRUSION DETECTION SYSTEM FOR REDUCING FALSE POSITIVES AND RESOURCE CONSUMPTION ON MALICOUS DATASETS HM ALAIDAROS | | |