A survey on detecting black hole attack in AODV-based mobile ad hoc networks RAR Mahmood, AI Khan 2007 International Symposium on High Capacity Optical Networks and Enabling …, 2007 | 71 | 2007 |
Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime OA Amodu, RAR Mahmood Wireless Networks 22 (November), 1-24, 2016 | 44 | 2016 |
Feature selection based on genetic algorithm and SupportVector machine for intrusion detection system A Dastanpour, RAR Mahmood The second international conference on informatics engineering & information …, 2013 | 34 | 2013 |
A method for analyzing text using VOSviewer UA Bukar, MS Sayeed, SFA Razak, S Yogarayan, OA Amodu, ... MethodsX 11, 102339, 2023 | 23 | 2023 |
Analysis of pattern recognition algorithms using associative memory approach: a comparative study between the hopfield network and distributed hierarchical graph neuron (DHGN) AHM Amin, RAR Mahmood, AI Khan 2008 IEEE 8th International Conference on Computer and Information …, 2008 | 17 | 2008 |
Performance evaluation of intrusion detection system using selected features and machine learning classifiers RAR Mahmood, AH Abdi, M Hussin Baghdad Science Journal 18 (2 (Suppl.)), 0884-0884, 2021 | 14 | 2021 |
Age of Information minimization in UAV-aided data collection for WSN and IoT applications: A systematic review OA Amodu, UA Bukar, RAR Mahmood, C Jarray, M Othman Journal of Network and Computer Applications 216, 103652, 2023 | 11 | 2023 |
A survey on the design aspects and opportunities in age-aware uav-aided data collection for sensor networks and internet of things applications OA Amodu, R Nordin, C Jarray, UA Bukar, RA Raja Mahmood, M Othman Drones 7 (4), 260, 2023 | 9 | 2023 |
Malware classification framework for dynamic analysis using information theory E Moshiri, AB Abdullah, R Azlina, B Raja, Z Muda Indian Journal of Science and Technology 10 (21), 1-10, 2017 | 8 | 2017 |
An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks AI Khan, AHM Amin, RAR Mahmood Mobile Intelligence, 380-411, 2010 | 8 | 2010 |
Sentiment evaluation of public transport in social media using naïve bayes method N Othman, M Hussin, RAR Mahmood Int J Eng Adv Technol 9, 2305-2308, 2019 | 5 | 2019 |
An experimental ipv6 testbed system with mobile ipv6 RAR Mahmood, M Othman, A Muhammed Proceedings of Information Technology Colloquium, 122-128, 2004 | 5 | 2004 |
IPv6 Translator: Makes IPv6 Migration Much Easier K Anuttullah, MKM Supian, RAR Mahmood Proceedings of 4th MIMOS R&D Symposium on ICT and Microelectronics, 25-40, 2002 | 4 | 2002 |
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks RAR Mahmood, M Hussin, N Manshor, AI Khan 2014 International Conference on Computational Science and Technology (ICCST …, 2014 | 3 | 2014 |
A distributed hierarchical graph neuron-based classifier: An efficient, low-computational classifier RAR Mahmood, AHM Amin, AI Khan 2008 First International Conference on Intelligent Networks and Intelligent …, 2008 | 3 | 2008 |
Effective black hole attacks in MANETS RAR Mahmood, ZM Hanapi, S Hasan, AI Khan Journal of Computer Science 9 (12), 1722-1733, 2013 | 2 | 2013 |
Lightweight and distributed attack detection scheme in mobile ad hoc networks RAR Mahmood, AHM Amin, A Amir, AI Khan Proceedings of the 7th International Conference on Advances in Mobile …, 2009 | 2 | 2009 |
IPv6: Measuring the Challenges MM Fadzil, RAR Mahmood Proceedings of 2nd MIMOS R&D Symposium on ICT and Microelectronics, 151-163, 2000 | 2 | 2000 |
Distributed Defense Scheme for Managing DNS Reflection Attack in Network Communication Systems DH Ahmed, M Hussin, A Abdullah, RAR Mahmood Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 …, 2016 | 1 | 2016 |
Performance Modeling Framework for Energy-based Scheduling in Cloud M Hussin, RA Raja Mahmood, NA Husin, N Mohd. Norowi The Third International Conference on Green Computing, Technology and …, 2015 | 1 | 2015 |