BGP anomaly detection techniques: A survey B Al-Musawi, P Branch, G Armitage IEEE Communications Surveys & Tutorials 19 (1), 377-396, 2016 | 165 | 2016 |
Mitigating DoS/DDoS attacks using iptables BQM AL-Musawi International Journal of Engineering & Technology 12 (3), 101-111, 2012 | 48* | 2012 |
Detecting BGP instability using recurrence quantification analysis (RQA) B Al-Musawi, P Branch, G Armitage 2015 IEEE 34th International Performance Computing and Communications …, 2015 | 38 | 2015 |
Recurrence behaviour of BGP traffic B Al-Musawi, P Branch, G Armitage 2017 27th International Telecommunication Networks and Applications …, 2017 | 13 | 2017 |
Identifying OSPF LSA falsification attacks through non-linear analysis B Al-Musawi, P Branch, MF Hassan, SR Pokhrel Computer Networks 167, 107031, 2020 | 11 | 2020 |
Detecting BGP anomalies using recurrence quantification analysis B Al-Musawi Ph. D. dissertation, 2018 | 10 | 2018 |
BGP Replay Tool (BRT) v0.2 B Al-Musawi, R Al-Saadi, P Branch, G Armitage http://i4t.swin.edu.au/reports/I4TRL-TR-170606A.pdf, 2017 | 10* | 2017 |
Using BGP features towards identifying type of BGP anomaly NH Hammood, B Al-Musawi 2021 International Congress of Advanced Technology and Engineering (ICOTEN …, 2021 | 9 | 2021 |
A new intrusion detection system based on using non-linear statistical analysis and features selection techniques A Al-Bakaa, B Al-Musawi Computers & Security 122, 102906, 2022 | 7 | 2022 |
Preventing brute force attack through the analyzing log ALM Bahaa Iraqi Journal of Science 53 (3), 663-667, 2012 | 7 | 2012 |
Internet of Things security techniques: A survey SM Alturfi, HA Marhoon, B Al-Musawi AIP Conference Proceedings 2290 (1), 2020 | 6 | 2020 |
A survey of BGP anomaly detection using machine learning techniques NH Hammood, B Al-Musawi, AH Alhilali International Conference on Applications and Techniques in Information …, 2021 | 5 | 2021 |
Energy-balanced and distributed clustering protocol for IoT wireless sensors MF Hassan, SR Pokhrel, B Al-Musawi 2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW …, 2020 | 5 | 2020 |
Improving the performance of intrusion detection system through finding the most effective features A Al-Bakaa, B Al-Musawi 2021 International Congress of Advanced Technology and Engineering (ICOTEN), 1-9, 2021 | 4 | 2021 |
An advanced classification of cloud computing security techniques: A survey SM Alturfi, B Al-Musawi, HA Marhoon AIP Conference Proceedings 2290 (1), 2020 | 4 | 2020 |
Design and implementation of fast floating point units for FPGAs MF Hassan, KF Hussein, B Al-Musawi Indonesian Journal of Electrical Engineering and Computer Science 19 (3 …, 2020 | 4 | 2020 |
Flow-based intrusion detection systems: A survey A Al-Bakaa, B Al-Musawi International Conference on Applications and Techniques in Information …, 2021 | 3 | 2021 |
Innovative fitness functions for robust energy management in WSNs MF Hassan, B Al-Musawi, AK Al-Janabi Journal of Network and Systems Management 31 (4), 76, 2023 | 2 | 2023 |
Identifying recurrence behaviour in the underlying BGP traffic B Al-Musawi, P Branch Int J Inf, Commun Technol Appl 4 (1), 34-47, 2018 | 2 | 2018 |
RTBADT-Real-Time BGP Anomaly Detection Tool V0. 1 B Al-Musawi December, 2017 | 2 | 2017 |