An efficient dynamic addressing based routing protocol for underwater wireless sensor networks YB Muhammad Ayaz, Azween Abdullah, Ibrahima Faye Science Direct 35 (4), 475-486, 2012 | 114* | 2012 |
Immune inspired framework for ad hoc network security YA Mohamed, AB Abdullah 2009 IEEE International Conference on Control and Automation, 297-302, 2009 | 17 | 2009 |
Immune inspired approach for securing wireless ad hoc networks M Yasir Abdelgadir, A Azween IJCSNS International Journal of Computer Science and Network Security 6 (1 …, 2009 | 17 | 2009 |
Security mechanism for MANETs YA Mohamed, AB Abdullah Journal of Engineering Science and Technology 4 (2), 231-242, 2009 | 15 | 2009 |
An enhancement of data encryption standards algorithm (DES) NMM Alhag, YA Mohamed 2018 International Conference on Computer, Control, Electrical, and …, 2018 | 12 | 2018 |
Implementation of IDS with response for securing MANETs YA Mohamed, AB Abdullah 2010 International Symposium on Information Technology 2, 660-665, 2010 | 11 | 2010 |
Immune-inspired framework for securing hybrid MANET YA Mohamed, AB Abdullah 2009 IEEE Symposium on Industrial Electronics & Applications 1, 301-306, 2009 | 10 | 2009 |
Adaptive immune-based system for network security RAA Farah, YA Mohamed 2018 International Conference on Computer, Control, Electrical, and …, 2018 | 9 | 2018 |
Enhancing intrusion detection using statistical functions MA Ahmed, YA Mohamed 2018 International Conference on Computer, Control, Electrical, and …, 2018 | 8 | 2018 |
I2MANET Security Logical Specification Framework. YA Mohamed, A Abdullah Int. Arab J. Inf. Technol. 9 (6), 495-503, 2012 | 7 | 2012 |
Biologically inspired model for securing hybrid mobile ad hoc networks Y Abdelgadir, A Abdullah 2008 International Symposium on Information Technology 2, 1-6, 2008 | 7 | 2008 |
An approach for software-defined networks security SB Ahmed, YA Mohamed 2023 Second International Conference on Electrical, Electronics, Information …, 2023 | 3 | 2023 |
A two-stage assessment approach for QoS in internet of things based on fuzzy logic ME Adam, YAA Hamid International Journal of Advanced Computer Science and Applications 13 (4), 2022 | 3 | 2022 |
The impact of coupling signaling protocols and codecs scheme in achieving VoIP Quality HAS Mekki, YA Mohammed American Scientific Research Journal for Engineering, Technology, and …, 2017 | 3 | 2017 |
A novel Mechanism for Securing Cloud Computing YA Mohamed The International Arab Conference on Information Technology (ACIT’2013), 2013 | 3 | 2013 |
Biologically inspired Model for Securing Hybrid Mobile Ad hoc Networks Y abdelgadir Mohamed, AB Abdullah 2008 International Symposium on High Capacity Optical Networks and Enabling …, 2008 | 3 | 2008 |
An Approach to Improving Intrusion Detection System Performance Against Low Frequent Attacks AK Yasir Mohame, Dina Abasher Journal of Advances in Information Technology 14 (3), 472-478, 2023 | 2 | 2023 |
An Approach to Enhance Quality of Services Aware Resource Allocation in Cloud Computing AO Mohamed, Y.A., Mohamed Lecture Notes in Networks and Systems 550, 623-637, 2022 | 2* | 2022 |
The Impact of Artificial Intelligence on Language Translation: A Review YA Mohamed, A Khanan, M Bashir, AHHM Mohamed, MAE Adiel, ... IEEE Access 12, 25553-25579, 2024 | 1 | 2024 |
ENHANCING INTRUSION DETECTION SYSTEM PERFORMANCE AGAINST LOW FREQUENT ATTACKS USING FC-ANN ALGORITHM DA SALIH, YA MOHAMED, M BASHIR Journal of Engineering Science and Technology 18 (5), 2411-2431, 2023 | 1 | 2023 |