Follow
Haitham Noman
Title
Cited by
Cited by
Year
An automated approach to detect deauthentication and disassociation dos attacks on wireless 802.11 networks
HA Noman, SM Abdullah, HI Mohammed
International Journal of Computer Science Issues (IJCSI) 12 (4), 107, 2015
312015
Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations
HA Noman, OMF Abu-Sharkh
Sensors 23 (13), 6067, 2023
92023
WIRELESS SECURITY IN MALAYSIA: A SURVEY PAPER
HA Noman, SA Noman, Q Al-Maatouk
Journal of Critical Reviews 7 (4), 2020, 2020
62020
Mitigating evil twin attacks in wireless 802.11 networks at jordan
SA Noman, M Qasaimeh, R Al-Qassas, HA Noman
International Journal of Computer Science Issues (IJCSI) 14 (1), 60, 2017
62017
Design and implementation of a security analysis tool that detects and eliminates code caves in windows applications
HA Noman, Q Al-Maatouk, SA Noman
2021 International Conference on Data Analytics for Business and Industry …, 2021
42021
A Static Analysis Tool for Malware Detection
QAMSAN Haitham Ameen Noman
Conference on Data Analytics for Business and Industry (ICDABI), 661-665, 2021
4*2021
Designing And Implementing A Secured Smart Network That Can Resist Next-generation State Surveillance
HA NOMAN, SIS AL SATARY, OSW AL-QURAINI, MA YOUSFI, ...
32021
A zero-day attack exploiting a yahoo messenger vulnerability
M Aldwairi, H Noman
International Journal of Scientific & Engineering Research 3 (8), 1-4, 2012
22012
Internet of Things Communication, Networking, and Security: A Survey
SA Noman, HA Noman, Q Al-Maatouk, T Atkison
International Journal of Computing and Digital Systems, 2023
12023
A Robust Scheme to Defend Against Disassociation and Deauthentication DoS Attacks in WLAN Networks.
HA Noman, SM Abdullah, SA Noman
Journal of Theoretical & Applied Information Technology 93 (2), 2016
12016
Log Poisoning Attacks in Internet of Things (IoT)
HA Noman, OMF Abu-Sharkh, SA Noman
2023
A Survey of IEEE 802.15. 6: Body Area Networks
SA Noman, HA Noman, Q Al-Maatouk, T Atkison
International Journal of Computing and Digital Systems 14 (1), 1-xx, 2023
2023
Introducing IJam Wireless De-authentication Attack Tool
H Al-Ani, A Al-Zubidy
Proceedings of the SouthEast Conference, 199-202, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–13