Follow
Wesam S. Bhaya
Wesam S. Bhaya
University of Babylon. College of Information Technology
Verified email at uobabylon.edu.iq - Homepage
Title
Cited by
Cited by
Year
Review of Data Preprocessing Techniques in Data Mining
SAAWS Bhaya
Journal of Engineering and Applied Sciences 12 (16), 4102-4107, 2017
4632017
Text steganography based on font type in ms-word documents.
W Bhaya, AMS Rahma, D Al-Nasrawi
J. Comput. Sci. 9 (7), 898-904, 2013
542013
DDoS attack detection approach using an efficient cluster analysis in large data scale
W Bhaya, M EbadyManaa
2017 Annual Conference on New Trends in Information & Communications …, 2017
332017
Text steganography based on unicode of characters in multilingual
AMS Rahma, WS Bhaya, DA Al-Nasrawi
International Journal of Engineering Research and Applications 3 (4), 1153-1165, 2013
282013
Review clustering mechanisms of distributed denial of service attacks
W Bhaya, ME Manaa
Journal of Computer Science 10 (10), 2037, 2014
262014
A proactive DDoS attack detection approach using data mining cluster analysis
W Bhaya, ME Manaa
Journal of Next Generation Information Technology 5 (4), 36, 2014
212014
Fake profiles types of online social networks: a survey
R Kareem, W Bhaya
International Journal of Engineering & Technology 7 (4.19), 919-925, 2018
132018
Text hiding in mobile phone simple message service using fonts
WS Bhaya
Journal of computer science 7 (11), 1626, 2011
122011
A reinforcement learning-based routing for real-time multimedia traffic transmission over software-defined networking
M Al Jameel, T Kanakis, S Turner, A Al-Sherbaz, WS Bhaya
Electronics 11 (15), 2441, 2022
112022
Prevention of Spoofing Attacks in the Infrastructure wireless networks
WS Bhaya, SA AlAsady
Journal of Computer Science 8 (10), 1769-1779, 2012
112012
Review of Data Mining Techniques for Malicious Detection
NTOW Bhaya
Research Journal of Applied Sciences 11 (10), 942-947, 2016
10*2016
Higher education’s certificates model based on blockchain technology
MA Ali, WS Bhaya
Journal of Physics: Conference Series 1879 (2), 022091, 2021
92021
Intrusion detection system for cloud based software-defined networks
OJ Ibrahim, WS Bhaya
Journal of Physics: Conference Series 1804 (1), 012007, 2021
92021
Text Steganography in Excel Documents Using Color and Type of Fonts
SAAAW Bhaya
Research Journal of Applied Sciences 11 (10), 1054-1059, 2016
92016
Security against Spoofing Attack in Mobile Ad Hoc Network
W Bhaya, SA Alasadi
European Journal of Scientific Research 64 (4), 634-643, 2011
92011
Review on Malware and Malware Detection‎ Using Data Mining Techniques
WS Bhaya, MA Ali
Journal of University of Babylon for Pure and Applied Sciences 25 (5), 1585-1601, 2017
82017
Software Defined Network (SDN) Security Against Address Resolution Protocol Poisoning Attack
AFAWS Bhaya
Journal of Computational and Theoretical Nanoscience 16 (3), 961–968, 2019
62019
Blockchain technology's applications and challenges: An overview
MA Ali, WS Bhaya
AIP Conference Proceedings 2290 (1), 2020
52020
Anomaly Detection in Network Traffic Using Stream Data Mining: Review
WSBSA Alasadi
Research Journal of Applied Sciences 11 (10), 1076-1082, 2016
5*2016
Al-Mamory and Wesam S. Bhaya;“Taxonomy of Packet Classification algorithms,”
O Safaa
Journal of Babylon University/Pure and Applied, 0
5
The system can't perform the operation now. Try again later.
Articles 1–20