Follow
Muna M. T. Jawhar
Muna M. T. Jawhar
University of Mosul, College of Computer Science and Mathematics
Verified email at uomosul.edu.iq
Title
Cited by
Cited by
Year
Design Network Intrusion Detection System using Hybrid Fuzzy-Neural Network
MMT Jawhar, M Mehrotra
International Journal of Computer Science and Security 4 (3), 258-294, 2010
782010
Anomaly Intrusion Detection System using Hamming Network Approach
MMT Jawhar, M Mehrotra
International Journal of Computer Science and Communication 1 (1), 163-167, 2010
152010
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System
NB Ibraheem, MMT Jawhar, HM Osman
AL-Rafidain Journal of Computer Sciences and Mathematics 10 (1), 127-135, 2013
72013
System Design for Packet Sniffer using NDIS Hooking
MMT Jawhar, M Mehrotra
International Journal of Computer Science and Communication ISSN: 0973-7391 …, 2010
6*2010
Proposing a Model for Detecting Intrusion Network Attacks Using Machine Learning Techniques
TAJ Ali, M Jawhar
JOURNAL OF EDUCATION AND SCIENCE, 2022
42022
Intrusion Detection System : A Design Perspective
MM Taher, M Mehrotra
The 2nd International Conference on Data Management, 190-194, 2009
42009
Compare between Particle Swarm optimization Algorithm (PSO) and Artificial Bee Colony optimization Algorithm (ABC) in detecting DoS attacks from network traffic
AA Maha, MMT Jawhar
TELKOMNIKA (Telecommunication Computing Electronics and Control) 20 (4), 2022
2*2022
Quality of Service and Load Balancing in Cloud Computing: A Review
MMT Jawhar, HM Osman
AL-Rafidain Journal of Computer Sciences and Mathematics 16 (1), 15-22, 2022
22022
THE DETECT DOS ATTACK FROM NETWORK TRAFFIC USING GRAY WOLF OPTIMIZATION ALGORITHM
MMT Jawhar, MA Alalah
Journal of Engineering Science and Technology 15 (No. 6), 3639 - 3648, 2020
12020
A Hybrid FCM Clustering- Neural Network Model for Intrusion Detection
MMT Jawhar, M Mehrotra
International Conference on Control, Robotics and Cybernetics (ICCRC 2011 …, 2011
12011
Detect botnet attacks traffic using long shorts term memory technique
MMT Jawhar, MAA Mohammad
Indonesian Journal of Electrical Engineering and Computer Sciencethis link …, 2023
2023
Detecting network attacks model based on a convolutional neural network
MMTJ Teba Ali Jasim Ali
International Journal of Electrical and Computer Engineering (IJECE) 13 (3 …, 2023
2023
Detecting network attacks Model based on a long short-term memory LSTM
TA Jasi, MMT Jawhar
2022
Prevention of Cross-Site Scripting using Hash
MMT Jawhar
International Journal of Computer Science and Information Security (IJCSIS …, 2018
2018
Implementation and Enhancing the design of Signature-based Intrusion Detection Model
MMT Jawhar, M Mehrotra
Journal of Computer Science and Engineering 11 (9), 2012
2012
Protection Of Local Area Network From Internal Intruding: A Design Perspective
MMT Jawhar, M Mehrotra
International Conference on Emerging Trends in Computer Science …, 2010
2010
Real Time Intrusion Detection System based on Neural Network
MMT Jawhar, M Mehrotra
International Conference On Data Management, pp.168-174, 2010
2010
Design And Implementation Of Intrusion Detection System Using Genetic Algorithms
MMT Jawhar, M Mehrotra
International Conference on Emerging Trends in Computer Science …, 2010
2010
Using genetic Algorithm in Task scheduling for Multiprocessing System
AY Hammo, GS Basheer, MMT Jawhar
AL-Rafidain Journal of Computer Sciences and Mathematics 4 (1), 81-98, 2007
2007
استخدام الخوارزمية الجينية في جدولة المهام في الانظمة المتعددة المعالجات
YH Asmaa, GS Basheer, MMT Jawhar
مجلة الرافدين لعلوم الحاسبات والرياضيات 4 (1), 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–20