Publication

2017

CITATION INDEXED JOURNALS (SCOPUS/ISI/SCI/SSCI)

  1.   Abdullah, N., Al-wesabi, O. A.,  Kadhum, M. M. and Baklizi, M. (2017). Genetic-based Routing Algorithm with Priority Constraints”,  Int. J. Networking and Virtual Organisations, Vol. 17, No. 1, 2017, (Indexed : scopus) DOI: http://dx.doi.org/10.1504/IJNVO.2017.10004175
  2. Shafiq Ul Rehman, Selvakumar Manickam. “Improved Mechanism to Prevent Denial of Service Attack in IPv6 Duplicate Address Detection Process”. International Journal of Advanced Computer Science and Applications, Vol.8, No.2(2017), pp.63-70, [ISI Indexed].
  3. Sima Ahmadpour, Tat-Chee Wan, Zohreh Toghrayee, Fariba HematiGazafi, “Statistic Analysis of Video Frame Size Distribution Originating from Scalable Video Codec (SVC),” Complexity Vol. 2017, pp. 1-12, Mar 2017. ISSN 1076-2787. [ISI 2015 I.F.: 3.514]
  4. Yap Khong Lim, Chong Yung Wey. (2017). Software-Defined Networking Techniques to Improve Mobile Connectivity: Technical Review. IETE Technical Review, 1-13. doi:10.1080/02564602.2017.1293569.  (ISI  Impact Factor: 1.304)

CITATION INDEXED JOURNALS [To appear] (SCOPUS/ISI/SCI/SSCI)

 

BOOK CHAPTERS

1- Abdullah, N., Al-wesabi, O. A., Baklizi, M. and  Kadhum, M. M. (2017), “Intelligent Routing Algorithm using Genetic Algorithm (IRAGA)”, Recent Trends in Information and Communication Technology: Proceedings of the 2nd International Conference of Reliable Information and Communication Technology (IRICT 2017), Springer, Series: Lecture Notes on Data Engineering and Communications Technologies, Vol. 5, ISBN 978-3-319-59426-2 (Indexed : ISI)

INTERNATIONAL REFEREED PROCEEDINGS

1- Navaneethan C. Arjuman , Selvakumar Manickam , Shankar Karuppayah , Shafiq Ul Rehman, “Review of Security Issues in IPv6 Router Discovery.The 4th International Conference on Mathematical Sciences and Computer Engineering (ICMSCE 2017) conference, Langkawi, Malaysia 2017, 4th-5thMay.

2-I. H. Hasbullah, M. M. Kadhum, Y. W. Chong, K. Alieyan, A. Osman and Supriyanto, “Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol,” 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, 2016, pp. 275-281.
doi: 10.1109/PST.2016.7906974

3- Huda Alhalabi, Tat-Chee Wan, Lial Missif, Mohammed Elhalabi, “Performance Analysis of the Constructive Interference Flooding in Wireless Sensor Networks”, 8th International Conference on Information Technology (ICIT 17), Amman, Jordan, 17-19 May 2017

4- Eugene Tan Boon Hong, Yung-Wey Chong, “An Optimized Flow Management Mechanism in OpenFlow Network”, 31st International Conference on Information Networking (ICOIN 2017), Da Nang, Vietnam, 11-3 January 2017.

 

2016

CITATION INDEXED JOURNALS (SCOPUS/ISI/SCI/SSCI)

  1. Lial Raja Missif ; Mohammed. M. Kadhum ; Tat-Chee Wan , ‘On Event Detection and Tracking Systems in Sensor Networks: Classification of Structure and Mechanisms’, Advanced Science Letters” ISSN: 1936-6612, [SCOPUS/ISI Indexed]
  2. Nibras Abdullah ; Ola A. Al-wesabi ; Mohammed. M. Kadhum; Mahmoud Baklizi, “Multipath Routing Selection based on Genetic Algorithm”, Advanced Science Letters, ISSN: 1936-6612, [SCOPUS/ISI Indexed]
  3. Sambath Narayanan, Selvakumar Manickam, Yu-Beng Leau, (2016), DDoS Attacks in VoIP: A Brief Review of Detection and Mitigation Techniques, International Journal of Advanced and Applied Sciences, ISSN: 2313-626X [ISI/Scopus Indexed]
  4. Huda Alhalabi, Tat-Chee Wan, 2016, Communication Protocol for Constructive Interference Flooding in Wireless Sensor Networks, Journal of Theoretical & Applied Information Technology, [Scopus Indexed]
  5. Supriyanto Praptodiyono, Iznan H. Hasbullah, Mohammed M. Kadhum, Raja Kumar Murugesan, Chong Yung Wey, Azlan Osman, “Securing Duplicate Address Detection on IPv6 Using Distributed Trust Mechanism”, International Journal of Simulation- Systems, Science and Technology (IJSSST), Vol. 17, No. 2
  6. Shafiq Ul Rehman, Selvakumar Manickam. “Denial of Service Attack in IPv6 Duplicate Address Detection Process: An Impact Analysis on IPv6 Address Autoconfiguration Mechanism”. International Journal of Advanced Computer Science and Applications, DOI: 10.14569/IJACSA.2016.070630 (2016) (ISI Indexed) ISSN: 2156-5570 Vol.7, No.6 IJACSA (2016), pp.232-238.
  7. Shafiq Ul Rehman, Selvakumar Manickam. “A Study of Smart Home Environment and its security threats.” International Journal of Reliability, Quality and Safety Engineering, DOI: 10.1142/S0218539316400039, (2016) (Scopus Indexed) ISSN: 1793-6446. Vol.23, No. 3(2016), pp.1-9.
  8. Shafiq Ul Rehman, Selvakumar Manickam. “Novel Mechanism to Prevent Denial of Service Attacks in IPv6 Duplicate Address Detection Process”. SERSC International Journal of Security and Its Applications (2016) (Scopus Indexed) ISSN: 1738-9976 IJSIA Vol.10, No.4 (2016), pp.143-154.
  9. Shafiq Ul Rehman, Selvakumar Manickam. “Significance of Duplicate Address Detection Mechanism in IPv6 and its Security Issues: A Survey. Indian Journal of Science and Technology (2015) (Q1 Scopus Indexed) ISSN: 0974-6846 INDJST Vol. 8(30), DOI: IPL0846, pp.1-8, November 2015.
  10. Elejla, O. E., Anbar, M., & Belaton, B. (2016). ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review. IETE Technical Review, 1-18. doi:10.1080/02564602.2016.1192964.  (ISI  Impact Factor: 1.304)
  11. Anbar, M., Abdullah, R., Munther, A., Al-Betar, M. A., & Saad, R. M. (2016). NADTW: new approach for detecting TCP worm. Neural Computing and Applications, 1-14.  (ISI- IF: 1.49)
  12. Elejla, O., Belaton, B., Anbar, M., & Alnajjar, A. (2016). A Reference Dataset for ICMPv6 Flooding Attacks. Journal of Engineering and Applied Sciences, 11(3), 476-481.  (Scopus)
  13. Alnajjar, A. Y., Anbar, M., Manickam, S., El-Taj, O. E., & Homam. (2016). QRphish: An Automated QR Code Phishing Detection Approach. Journal of Engineering and Applied Sciences, 11(3), 553-560. (Scopus)
  14. Alalousi, A., Razif, R., AbuAlhaj, M., Anbar, M., & Nizam, S. (2016). A Preliminary Performance Evaluation of K-means, KNN and EM Unsupervised Machine Learning Methods for Network Flow Classification. International Journal of Electrical and Computer Engineering (IJECE), 6(2), 778-784. (Scopus)
  15. Way-Chuang Ang, Muhammad-Imran Sarwar, and Tat-Chee Wan, 2016, Performance Characterization of ROHC for Satellite-based Unidirectional Links Using Error-Free Channels, Journal of Theoretical & Applied Information Technology, [Scopus Index] URL: http://www.jatit.org/volumes/eightyseven2.php
  16. Mohammad Ali Sarvghadi, Tat-Chee Wan, “Message Passing Based Time Synchronization in Wireless Sensor Network: A Survey,” International Journal of Distributed Sensor Networks, Volume 2016 (2016), Article ID 1280904, pp. 1-21. ISSN 1550-1329 [Link] [ISI 2014 I.F.: 0.665]
  17. Sabri M. Hanshi, Mohammed M Kadhum,  Tat-Chee Wan, 2016, “Efficient Approximated Q-Function Form for Error Probability over Rayleigh Fading Channels”, Wireless Personal Communication, Springer US, Vol 89, No.2, PP: 467-478, ISSN: 0929-6212 [ISI Index] [Impact Factor 0.701]
  18. Leau  Yu  Beng,  Selvakumar  Manickam. (2016), A Novel Adaptive Grey Verhulst Model for Network Security Situation Prediction. International Journal of Advanced Computer Science and Applications, 7(1): 90-95, 2016. [ISI Indexed] URL: http://www.journals.indexcopernicus.com/issue.php?id=1184&id_issue=882843

CITATION INDEXED JOURNALS [To appear] (SCOPUS/ISI/SCI/SSCI)

  1. Missif, L. R.; Kadhum, M. M., “Mathematical Modeling of Optimal Node Deployment for Indoor Wireless Sensor Networks”, International Journal of Electrical and Computer Engineering (IJECE), ISSN: 2088-8708, Scopus Indexed Journal, 201
  2. Nibras Abdullah ; Ola A. Al-wesabi ; Mohammed. M. Kadhum; Mahmoud Baklizi, “Genetic-based Routing Algorithm with Priority Constraints,” International Journal of Networking and Virtual Organizations. [Scopus Indexed]

BOOK CHAPTERS

  1. Anbar, M., Abdullah, R., Saad, R. M., Alomari, E., & Alsaleem, S. (2016). Review of Security Vulnerabilities in the IPv6 Neighbor Discovery Protocol Information Science and Applications (ICISA) 2016 (pp. 603-612): Springer Singapore.
  2. Munther, A., Othman, R. R., Alsaadi, A. S., & Anbar, M. (2016). A Performance Study of Hidden Markov Model and Random Forest in Internet Traffic Classification Information Science and Applications (ICISA) 2016 (pp. 319-329): Springer Singapore.
  3. Alomari, E., Manickam, S., Gupta, B., Anbar, M., Saad, R. M., & Alsaleem, S. (2016). A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (pp. 52-79): IGI Global.
  4. Baidaa Hamza Khudayer, Mohammad M. Kadhum, Tat-Chee Wan, (2016), “Topology-Aware Mechanism to Improve Routing in Mobile Ad Hoc Networks”, Advances in Machine Learning and Signal Processing: Proceedings of MALSIP 2015, Springer International Publishing, pp: 13-24, ISBN: 978-3-319-32213-1
  5. Firas Najjar, Mohammad M Kadhum, and Homam El-Taj, (2016), “Detecting Neighbor Discovery Protocol-Based Flooding Attack Using Machine Learning Techniques”, Advances in Machine Learning and Signal Processing: Proceedings of MALSIP 2015, Springer International Publishing, pp: 129-139, ISBN: 978-3-319-32213-1

INTERNATIONAL REFEREED PROCEEDINGS

  1. Nurulfaizal M.Shukeri, Mohd Azmi Ahamad Rahim, Tat-Chee Wan, “Empirical Testing of Prototype Real-Time Multi-hop MAC for Wireless Sensor Networks,” Proceedings of the 6th IEEE International Conference on Control Systems, Computing and Engineering (ICCSCE 2016), Penang, Malaysia, 25-27 Nov. 2016, pp. 10-15.
  2. Kamal Alieyan, Mohammed M. Kadhum, Mohammed Anbar, Shafiq Ul Rehman, Naser K. A. Alajmi, “An Overview of DDoS attacks based on DNS”, The 7th International Conference on ICT Convergence (ICTC 2016), October 19-21 2016, Jeju Island, South Korea.
  3. Mohammed M. Kadhum, “Analytical Modelling of Communication Overhearing for Route Failure Recovery in Mobile Ad Hoc Networks”, 56th International Conference on Innovative Engineering Technologies (ICIET), 6th-7th June 2016, Sydney, Australia. pages 1-6.
  4. Nathan, B., Chong, Y. W., & Hansi, S. M. (2016). Acoustic Echo Cancellation Technique for VoIP. In Advances in Signal Processing and Intelligent Recognition Systems (pp. 335-344). Springer International Publishing.

2015

CITATION INDEXED JOURNALS (SCOPUS/ISI/SCI/SSCI)

  1. Shafiq Ul Rehman, Selvakumar Manickam.“Integrated Framework to Detect and Mitigate Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication.”SERSC International Journal of Security and Its Applications (2015) (Indexed Scopus) ISSN: 1738-9976 IJSIA Vol.9, No.11 (2015), pp.77-86
  2. Anbar, M., Abdullah, R., Manasrah, A., Munther, A., & Manickam, S. (2015). BADUW: Behavioural based Approach for Detecting UDP Worm. Indian Journal of Science and Technology, 8(35).  (ISI)
  3. Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Esraa Alomari “An Intelligent ICMPv6 DDoS Flooding Attack Detection Framework (v6IIDS) Using Back-propagation Neural Network”. IETE Technical Review, 2015, (ISI, IF :0.925)
  4. Shafiq Ul Rehman, Selvakumar Manickam. “Significance of Duplicate Address Detection Mechanism in IPv6 and its Security Issues: A Survey. Indian Journal of Science and Technology (2015) (Indexed ISI) ISSN: 0974-5645 INDJST Vol. 8(30), DOI: IPL0846, pp.1-8, November 2015.
  5. Kamal Alieyan, Ammar ALmomani, Ahmad Manasrah, and Mohammed M. Kadhum. “A survey of botnet detection based on DNS”, Neural Computing and Applications (2015), Springer London, Page: 1-18, ISSN: 1433-3058 [ISI Index] [IF: 1.569]
  6. Ahmadpour, Sima and Toghrayee, Zohreh and Wan, Tat-Chee, 2015, “An extended discrete autoregressive model for variable bit rate video traffic encoded by scalable video codec”, International Journal of Communication Systems, John Wiley & Sons. ISSN: 1099-1131 [ISI Index] [IF: 1.106]
  7. Hanshi, S. M., Chong, Y. W., and Naeem, A. N. (2015). “Review of Acoustic Echo Cancellation Techniques for Voice Over IP”. Journal of Theoretical & Applied Information Technology, Vol. 77. No. 1, ISSN: 1992-8645 [Indexed Scopus]
  8. Hala Albaroodi, Selvakumar Manickam and Mohammed Anbar, 2015, A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift), Journal of Computer Science, Volume 11 No 3, pp: 590.597 ISSN:  1549-3636 [Scopus Indexed]
  9. Supriyanto, Iznan H. Hasbullah, Mohamed Anbar, Raja Kumar Murugesan, Azlan Osman, (2015), “Improvement of Address Resolution Security in IPv6 Local Network using Trust-ND”, TELKOMNIKA Indonesian Journal of Electrical Engineering, Volume 13, Number 1, pp. 195-202, ISSN: 2302-4046 [Indexed Ei]
  10. Kadhum, M. & Hassanein, H., Congestion-aware TCP-friendly system for multimedia transmission based on UDP, Cluster Computing: Volume 18, Issue 2 (2015), Springer US, Page 693-705. ISI Indexed [IF:0.949]
  11. Hadi Asharioun, Hassan Asadollahi, Tat-Chee Wan, Niyayesh Gharaei, (2015), A Survey on Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Corona-Based Wireless Sensor Network, Wireless Personal Communications, Volume 81, Number 1, pp. 161-187, ISSN: 0929-6212, Springer US [Impact Factor 0.979] [ISI Index]

CITATION INDEXED JOURNALS [To appear] (SCOPUS/ISI/SCI/SSCI)

  1. Parminder Singh and Selvakumar Manickam, 2015, Critical Review of Economical Denial of Sustainability (EDoS) Mitigation, Journal of Computer Science (Scopus Index)

BOOK CHAPTERS

  1. Leau, Yu-Beng and Manickam, Selvakumar and Chong, Yung-Wey, 2015, “Network Security Situation Assessment: A Review and Discussion”, Information Science and Applications, Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg, Volume 339, 2015 pp: 407-414, ISBN: 978-3-662-46577-6
  2. Leau, Yu-Beng and Manickam, Selvakumar, 2015, Network Security Situation Prediction: A Review and Discussion, Intelligence in the Era of Big Data, Communications in Computer and Information Science, Volume 516, pp: 424-435, 2015, ISBN: 978-3-662-46741-1
  3. Kadhum, Mohammed M., and Selvakumar Manickam. “Operational Analysis of Interarrival Rate-based Queuing Management Mechanism for High-speed Networks.” In Information Science and Applications, pp. 111-124. Springer Berlin Heidelberg, 2015.
  4. Khudayer, Baidaa Hamza, Mohammed M. Kadhum, and Wan Tat Chee. “Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks.” In Information Science and Applications, pp. 189-204. Springer Berlin Heidelberg, 2015.

INTERNATIONAL REFEREED PROCEEDINGS

  1. Khudayer, B. H.; Kadhum, M. M. & Wan, T.-C. Feasible Progressive Source Routing-based Strategy for Mobile Ad-hoc Networks 2015 International Conference on Control Theory and Its Application (CNTIA’2015), 15 – 17 December 2015, Melaka, Malaysia.
  2. Khudayer, B. H.; Kadhum, M. M. & Wan, T.-C. Topology-aware Mechanism to Improve Routing in Mobile Ad-hoc Networks 2015 International Conference on Machine learning and Signal Processing (MALSIP’2015), 15 – 17 December 2015, Melaka, Malaysia.
  3. Lial Raja Missif, Mohammed. M. Kadhum and Tat-Chee Wan , ‘On Event Detection and Tracking Systems in Sensor Networks: Classification of Structure and Mechanisms’, 2015 International Conference on Control Theory and Its Application (CNTIA),15 – 17 December 2015, Melaka, Malaysia
  4. Nibras Abdullah and Ola A. Al-wesabi and Mohammed. M. Kadhum, and Mahmoud Baklizi, “Multipath Routing Selection based on Genetic Algorithm”, 2015 International Conference on Control Theory and Its Application (CNTIA),15 – 17 December 2015, Melaka, Malaysia.
  5. Ali Abdulqader Bin Salem, Tat-Chee Wan, Yung-Wey Chong, Sabri M. Hanshi, On the Optimizing of LTE System Performance for SISO and MIMO Modes, IEEE Third International Conference on Artificial Intelligence, Modelling and Simulation, PP 412-416, Kota Kinabalu, Malaysia, Dec 2015.
  6. Firas Najjar, Mohammad Kadhum, and Homam El-Taj, “Neighbor Discovery Protocol Anomaly Detection using Finite State Machine and Strict Anomaly Detection” The 4th International Conference on Internet Applications, Protocols and Services (NETAPPS2015), 1-3 December 2015, Cyberjaya, Malaysia, pages 251-256
  7. Sabri M. Hanshi and Mohammed M. Kadhum and Tat-Chee Wan, “On Connectivity Analysis of Vehicular Ad hoc Networks in Presence of Channel Randomness”, 2015 4th International Conference on Internet Applications, Protocols and Services (NETAPPS2015),1-3 December 2015, Cyberjaya, Malaysia, pages 94-99
  8. Sabri M. Hanshi and Mohammed M. Kadhum and Tat-Chee Wan, “Density-aware Directional Forwarding Strategy for Vehicular Ad hoc Networks”, 2015 IEEE 12th Malaysia International Conference on Communications (MICC’15),23-25 November 2015, Kuching, Malaysia, pages 129-134. [IEEE/Scopus]
  9. Mohammed M. Kadhum, Innovative Route Maintenance Based on Link Failure Prediction for Mobile Ad Hoc Networks, International Telecommunication Networks and Applications Conference (ITNAC) 2015, Sydney, Australia, 18-20 November 2015 ISSN: 978-1-4673-9347-8
  10. Supriyanto Praptodiyono, Iznan H. Hasbullah, Mohammed M. Kadhum, Raja Kumar Murugesan, Chong Yung Wey, Azlan Osman, “Security Mechanism for IPv6 Address Autoconfiguration”, International Conference on Automation, Cognitive Science, Optics, Micro Electro-Mechanical System, and Information Technology (ICACOMIT 2015), 29-30 October 2015, Bandung, Indonesia, IT-13, ISBN: 978-1-4673-7408-8
  11. Supriyanto Praptodiyono, Iznan H. Hasbullah, Mohammed M. Kadhum, Raja Kumar Murugesan, Chong Yung Wey, Azlan Osman, “Improving Security of Duplicate Address Detection on IPv6 Local Network in Public Area”, 2015 9th Asia Modelling Symposium (AMS2015), 7-8 September 2015, Kuala Lumpur, Malaysia, pages 123-128
  12. Shafiq Ul Rehman and Selvakumar Manickam, “Rule-Based Mechanism to Detect Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication”, 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’201 5), Noida, UP, India, 2–4 Sep 2015 ISBN: 978-1-4673-7231-2
  13. Parminder Singh and Selvakumar Manickam, 2015, Design and Deployment of OpenStack-SDN based Test-bed for EDoS, 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’201 5) (Trends and Future Directions), Noida, UP, India, 2–4 Sep 2015 ISBN: 978-1-4673-7231-2
  14. Parminder Singh, Selvakumar Manickam and Shafiq Ul Rehman, 2015, A Survey of Mitigation Techniques Against Economic Denial of Sustainability (EDOS) Attack On Cloud Computing Architecture, 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’201 5) (Trends and Future Directions),  Noida, UP, India, 2–4 Sep 2015 ISBN: 978-1-4673-7231-2
  15. Firas Najjar and Mohammad Kadhum, “Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation,” 5th International Conference on IT Convergence and Security (ICITCS), 2015 , vol., no., pp.1-5, 24-27 Aug. 2015
  16. Nibras. Abdullah, Ola. A. Al-wesabi and Mohammed. M. Kadhum, “Genetic Routing Algorithm based on Adjacencyconstraint Matrix,” International Conference on Software Engineering and Computer Systems (ICSECS’15), IEEE, pp. 207-212, 2015
  17. Shafiq Ul Rehman;Selvakumar Manickam,”Significance of Duplicate Address Detection Mechanism in IPv6 and its Security Issues: A Survey, 4th International Conference on Computer Science and Computational Mathematics (ICCSCM 2015), 7-8 May 2015, Langkawi, Malaysia, ISBN: 978-967-114-14-9-6, Pages:294-299
  18. Sabri M. Hanshi, Mohammad M. Kadhum, Tat-Chee Wan”Theoretical Framework of Forwarding Strategy in Vehicular Ad Hoc Networks”. International Workshop on Graph Algorithms (IWGA2015), 13 May 2015, Penang-Malaysia, eISBN : 978-967-394-214-5, Pages. 130– 139
  19. Nibras Abdullah; Ola A. AL-Wesabi; Mohammed. M. Kadhum; Mahmoud Baklizi, “Efficient Path Selection with Priority Constraints using Genetic Algorithm,” International Workshop on Graph Algorithms (IWGA2015),13 May 2015, eISBN : 978-967-394-214-5, Pages : 231 – 241
  20. Hanshi, S. M.; Kadhum, M. M. & Wan, T.-C. Conceptual Approach for Routing in Vehicular Ad Hoc Networks 2014 IAES International Conference on Electrical Engineering, Computer Science and Informatics (EECSI 2014), Yogyakarta, Indonesia, 2014, pp.172-177.
  21. Mohammed M. Kadhum, Selvakumar Manickam, “Dynamic Queue Velocity-based Probability Function for Congestion Avoidance in High-speed Networks,” 2015 IEEE International Broadband and Photonics Conference – IBP 2014, pp.24-28, Bali, Indonesia, 23-25 April 2015.

2014

CITATION INDEXED JOURNALS (SCOPUS/ISI/SCI/SSCI)

  1. Mahmoud Baklizi, Hussein Abdel-jaber Ahmad Adel Abu-Shareha, Mosleh M. Abualhaj and Sureswaran Ramadass, “Fuzzy Logic Controller of Gentle Random Early Detection Based on Average Queue Length and Delay Rate”,International Journal of Fuzzy Systems, ISSN.1562-2479 [Indexed Scopus]
  2. Munther, A., Othman, R. R., Abualhaj, M. M., & Anbar, M. (2014). P2P-MCS-S: A New Technique to Improve MCS Conferencing System Bandwidth Utilization. Journal of Convergence Technology 9(4), 1. [Scopus]
  3. Asharioun, H., & Wan, T. C., A Multi Transmission Range Scheme to maximizing lifetime in the Corona-Based Wireless Sensor Networks. International Journal of Digital Content Technology and its application (JDCTA), Volume 8, Number 2, April 2014 [Indexed Ei]
  4. Mohammed Anbar, Sureswaran Ramadass, Selvakumar Manickam, Alhamza Al-Wardi, Connection Failure Message-based Approach for Detecting Sequential and Random TCP Scanning, Indian Journal of Science and Technology, Vol 7(5), 628–636, ISSN (Print) : 0974-6846, May 2014 [Indexed ISI]
  5. Redhwan M. A. Saad, Ammar Almomani, Altyeb Altaher, B. B. Gupta, Selvakumar Manickam, ICMPv6 Flood Attack Detection using DENFIS Algorithms, Indian Journal of Science and Technology, Vol 7(2), 168–173, ISSN (Print): 0974-6846, February 2014 [Indexed ISI]
  6. Salah Noori Saleh, Maryam Feily, Sureswaran Ramadass, Alireza Shahrestani: Semi-Fluid content distribution model for fast data dissemination in heterogeneous overlay networks. Peer-to-Peer Networking and Applications 7(2): 159-174 (2014) [Indexed ISI]
  7. Sabri M. Hanshi, Mohammed M. Kadhum, Tat-Chee Wan, 2014, “Relative Velocity-based Forwarding Strategy for Vehicular Ad Hoc Networks”, Information-An International Interdisciplinary Journal, ISSN 1343-4500 [Indexed ISI]
  8. Mohammed Anbar, Sureswaran Ramadass, Selvakumar Manickam, Alhamza Munther and Esraa Alomari, 2013, Propose approach for UDP random and sequential scanning detection based on the connection failure messages, International Review on Computers and Software (IRECOS), November 2013 [Indexed Scopus]
  9. Mohammed Anbar, Sureswaran Ramadass, Selvakumar Manickam, Syazwina Binti Alias, Alhamza Alalousi, and Mohammed Elhalabi, 2013, Review Study on Techniques for Network worm Signatures Automation, Advances in Information Sciences and Service Sciences (AISS), November 2013 [Indexed Scopus]
  10. Firas Najjar, Homam El-Taj, Ahmad Y. Alnajjar, 2014, The Existence of IPv4 Attacks in IPv6 : Proof Study, Sylwan Journal [Indexed ISI]
  11. Leau Yu Beng, Sureswaran Ramadass, Selvakumar Manickam, Tan Soo Fun, 2014, A Survey of Intrusion Alert Correlation and Its Design Considerations, IETE Technical Review,  Taylor & Francis, Vol 31, No. 3, May-June 2014 [Indexed ISI]
  12. Ali Abdulqader Bin Salem, Tat-Chee Wan, Yung-Wey Chong,  Adel Nadhem Naeem, Sima Ahmadpour, and Nibras Abdullah Faqera, Review of Cross-layer solution for packet loss, International Journal of Advancements in Computing Technology (IJACT), Vol. 5, No. 10, pp. 88-97, June 2013 [Citation Indexed by SCOPUS].
  13. Redhwan M. A. Saad, Selvakumar Manickam, Esraa Alomari, Mohammed Anbar And Parminder Singh, Design & Deployment Of Testbed Based On Icmpv6 Flooding Attack, Journal Of Theoretical And Applied Information Technology, Vol. 64 No.3,  30th June 2014. [Indexed Scopus]
  14. Hadi Asharioun, Hassan Asadollahi, Tat-Chee Wan, Niyayesh Gharaei, A Survey on Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Corona-Based Wireless Sensor Network, Wireless Personal Communications, Springer US, 2014 [Indexed ISI]
  15. Leau Yu Beng, Selvakumar Manickam, Tan Soo Fun, A Framework for Analytic Hierarchy Process-Entropy Network Security Situation Assessment and Adaptive Grey Verhulst-Kalman Prediction in Intrusion Prevention System, Australian Journal of Basic and Applied Sciences,  8(14) Special 2014, Pages: 34-39 [Indexed ISI]
  16. Alhamza Munther, Rozmie Razif, Shahrul Nizam, Naseer Sabri, Mohammed Anbar, Active Build-Model Random Fo

Comments are closed