Reliable behavioral dataset for IPv6 neighbor discovery protocol investigation
F Najjar, MM Kadhum
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5
|
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study
H El-Taj, F Najjar, H Alsenawi, M Najjar
International Journal of Computer Science and Information Security 10 (6), 50
|
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detection
F Najjar, M Kadhum, H El-Taj
Proceedings of the 4th International Conference on Internet Applications …
|
Detecting neighbor discovery protocol-based flooding attack using machine learning techniques
F Najjar, MM Kadhum, H El-Taj
Advances in Machine Learning and Signal Processing, 129-139
|
IPv6 change threats behavior
F Najjar, H El-Taj
International Journal of Advanced Computer Science and Applications 6 (1)
|
d-HMAC Dynamic HMAC function
M Najjar, F Najjar
2006 International Conference on Dependability of Computer Systems, 119-126
|
Detecting Neighbor Discovery Protocol Flooding Attack using Machine Learning Techniques
F Najjar, M Kadum, H El-Taj
|
A Study to investigate the possibility of using a decision-making model with IPS
F Najjar
|