Evaluation of machine learning algorithms for intrusion detection system M Almseidin, M Alzubi, S Kovacs, M Alkasassbeh 2017 IEEE 15th international symposium on intelligent systems and …, 2017 | 328 | 2017 |
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques M Alkasassbeh, G Al-Naymat, ABA Hassanat, M Almseidin International Journal of Advanced Computer Science and Applications 7 (1 …, 2016 | 253 | 2016 |
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques MIAZ Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-Kasassbeh, Mohammad Almseidin International Journal of Interactive Mobile Technologies 13 (1), 70-84, 2019 | 59* | 2019 |
Phishing detection based on machine learning and feature selection methods M Almseidin, AMA Zuraiq, M Al-Kasassbeh, N Alnidami International Association of Online Engineering, 2019 | 57 | 2019 |
Detection of IoT-botnet attacks using fuzzy rule interpolation M Al-Kasassbeh, M Almseidin, K Alrfou, S Kovacs Journal of Intelligent & Fuzzy Systems 39 (1), 421-431, 2020 | 49 | 2020 |
Machine Learning Methods for Network Intrusion Detection MA Mouhammd Al-Kasassbeh ICCCNT 2018 - THE 20th INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION …, 2018 | 49* | 2018 |
Intelligent methods for accurately detecting phishing websites A Abuzuraiq, M Alkasassbeh, M Almseidin 2020 11th International Conference on Information and Communication Systems …, 2020 | 34 | 2020 |
Detecting slow port scan using fuzzy rule interpolation M Almseidin, M Al-Kasassbeh, S Kovacs 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019 | 31 | 2019 |
A Comparative Study of Agile Methods: XP versus SCRUM AT Mohammad Almseidin , Khaled Alrfou , Nidal Alnidami (International Journal of Computer Science and Software Engineering (IJCSSE …, 2015 | 29 | 2015 |
Fuzzy automaton as a detection mechanism for the multi-step attack M Almseidin, I Piller, M Al-Kasassbeh, S Kovacs International Journal on Advanced Science, Engineering and Information …, 2019 | 28 | 2019 |
Anomaly-based intrusion detection system using fuzzy logic M Almseidin, J Al-Sawwa, M Alkasassbeh 2021 International Conference on Information Technology (ICIT), 290-295, 2021 | 22 | 2021 |
Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality M Almseidin, M Alkasassbeh, S Kovacs International Journal on Advanced Science, Engineering and Information …, 2018 | 22 | 2018 |
Generating a benchmark cyber multi-step attacks dataset for intrusion detection M Almseidin, J Al-Sawwa, M Alkasassbeh Journal of Intelligent & Fuzzy Systems 43 (3), 1-15, 2022 | 20 | 2022 |
Intrusion detection mechanism using fuzzy rule interpolation M Almseidin, S Kovacs Journal of Theoretical and Applied Information Technology 96 (16), 2018 | 20 | 2018 |
An efficient hybrid mine blast algorithm for tackling software fault prediction problem M Alweshah, S Kassaymeh, S Alkhalaileh, M Almseidin, I Altarawni Neural Processing Letters 55 (8), 10925-10950, 2023 | 10 | 2023 |
Applying intrusion detection algorithms on the kdd-99 dataset M Almseidin, M Alzubi, M Alkasassbeh, S Kovacs Production Systems and Information Engineering 8, 51-67, 2019 | 10 | 2019 |
An early detection model for kerberoasting attacks and dataset labeling R Younisse, M Alkasassbeh, M Almseidin, H Abdi Jordanian Journal of Computers and Information Technology 9 (1), 2023 | 7 | 2023 |
Cyber-phishing website detection using fuzzy rule interpolation M Almseidin, M Alkasassbeh, M Alzubi, J Al-Sawwa Cryptography 6 (2), 24, 2022 | 6 | 2022 |
On detecting distributed denial of service attacks using fuzzy inference system M Almseidin, J Al-Sawwa, M Alkasassbeh, M Alweshah Cluster Computing 26 (2), 1337-1351, 2023 | 5 | 2023 |
An accurate detection approach for IoT botnet attacks using interpolation reasoning method M Almseidin, M Alkasassbeh Information 13 (6), 300, 2022 | 5 | 2022 |