Novel hybrid schemes employing packet marking and logging for IP traceback B Al-Duwairi, M Govindarasu IEEE Transactions on Parallel and Distributed Systems 17 (5), 403-418, 2006 | 159 | 2006 |
SIEM-based detection and mitigation of IoT-botnet DDoS attacks B Al-Duwairi, W Al-Kahla, MA AlRefai, Y Abedalqader, A Rawash, ... International Journal of Electrical and Computer Engineering 10 (2), 2182, 2020 | 47 | 2020 |
Identifying potentially useful email header features for email spam filtering O Al-Jarrah, I Khater, B Al-Duwairi The sixth international conference on digital society (ICDS) 30, 140, 2012 | 39 | 2012 |
Topology based packet marking B Al-Duwairi, TE Daniels Proceedings. 13th International Conference on Computer Communications and …, 2004 | 35 | 2004 |
A novel packet marking scheme for IP traceback B Al-Duwairi, G Manimaran Proceedings. Tenth International Conference on Parallel and Distributed …, 2004 | 34 | 2004 |
Detecting image spam using image texture features B Al-Duwairi, I Khater, O Al-Jarrah International Journal for Information Security Research (IJISR) 2 (3/4), 344-353, 2012 | 33 | 2012 |
BotDigger: a fuzzy inference system for botnet detection B Al-Duwairi, L Al-Ebbini 2010 Fifth international conference on internet monitoring and protection, 16-21, 2010 | 33 | 2010 |
Distributed packet pairing for reflector based DDoS attack mitigation B Al-Duwairi, G Manimaran Computer communications 29 (12), 2269-2280, 2006 | 29 | 2006 |
Fast Flux Watch: A mechanism for online detection of fast flux networks BN Al-Duwairi, AT Al-Hammouri Journal of advanced research 5 (4), 473-479, 2014 | 28 | 2014 |
Intentional dropping: a novel scheme for SYN flooding mitigation B Al-Duwairi, G Manimaran Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 27 | 2005 |
Just-google: A search engine-based defense against botnet-based ddos attacks B Al-Duwairi, G Manimaran 2009 IEEE International Conference on Communications, 1-5, 2009 | 21 | 2009 |
A re-organizing biosurveillance framework based on fog and mobile edge computing M Al-Zinati, R Alrashdan, B Al-Duwairi, M Aloqaily Multimedia Tools and Applications 80 (11), 16805-16825, 2021 | 19 | 2021 |
ReCAP: a distributed CAPTCHA service at the edge of the network to handle server overload AT Al‐Hammouri, Z Al‐Ali, B Al‐Duwairi Transactions on Emerging Telecommunications Technologies 29 (4), e3187, 2018 | 17 | 2018 |
DDoS protection as a service: hiding behind the giants Z Al-Qudah, B Al-Duwairi, O Al-Khaleel International Journal of Computational Science and Engineering 9 (4), 292-300, 2014 | 17 | 2014 |
ISDSDN: mitigating SYN flood attacks in software defined networks B Al-Duwairi, E Al-Quraan, Y AbdelQader Journal of Network and Systems Management 28 (4), 1366-1390, 2020 | 16 | 2020 |
Mitigation and traceback countermeasures for DoS attacks BN Al-Duwairi Iowa State University, 2005 | 15 | 2005 |
GFlux: A google-based system for Fast Flux detection B Al-Duwairi, A Al-Hammouri, M Aldwairi, V Paxson 2015 IEEE Conference on Communications and Network Security (CNS), 755-756, 2015 | 14 | 2015 |
LogDoS: A Novel logging-based DDoS prevention mechanism in path identifier-Based information centric networks B Al-Duwairi, Ö Özkasap, A Uysal, C Kocaoğullar, K Yildirim Computers & Security 99, 102071, 2020 | 13 | 2020 |
On the security of SDN-enabled smartgrid systems D Ibdah, M Kanani, N Lachtar, N Allan, B Al-Duwairi 2017 International Conference on Electrical and Computing Technologies and …, 2017 | 13 | 2017 |
A novel scheme for mitigating botnet-based DDoS attacks B Al-Duwairi, Z Al-Qudah, M Govindarasu Journal of Networks 8 (2), 297, 2013 | 13 | 2013 |