Follow
Dr. Homam El-Taj
Dr. Homam El-Taj
Dar Al-Hekma
Verified email at dah.edu.sa - Homepage
Title
Cited by
Cited by
Year
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
352009
False positive reduction in intrusion detection system: A survey
O Abouabdalla, H El-Taj, A Manasrah, S Ramadass
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
292009
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detection
F Najjar, M Kadhum, H El-Taj
Proceedings of the 4th International Conference on Internet Applications …, 2015
132015
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study
H El-Taj, F Najjar, H Alsenawi, M Najjar
International Journal of Computer Science and Information Security 10 (6), 50, 2012
132012
Detecting neighbor discovery protocol-based flooding attack using machine learning techniques
F Najjar, MM Kadhum, H El-Taj
Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016
102016
IPv6 change threats behavior
F Najjar, H El-Taj
International Journal of Advanced Computer Science and Applications 6 (1), 2015
92015
QRphish: An Automated QR Code Phishing Detection Approach
AY Alnajjar, M Anbar, S Manickam, O Elejla, H El-Taj
Journal Of Engineering And Applied Sciences 11 (3), 553-560, 2016
72016
Applying Mobile Agents on Mobile Grid Computing
HR El-Taj, CH Yong
Computer Science Postgraduate Colloquium, 2007
72007
A Study on Video Conferencing using Overlay Network
A Alalousi, A Osman, S Noori, A Hussain, A Munther, H El-Taj
European Journal of Scientific Research 59 (3), 284-294, 2011
52011
False positive reduction by correlating the intrusion detection system alerts: Investigation study
H El-Taj, O Abouabdalla, A Manasrah
Journal of Communication and Computer 7 (3), 64, 2010
52010
Forthcoming aggregating intrusion detection system alerts framework
H El-Taj, O Abouabdalla, A Manasrah, A Al-Madi, MI Sarwar, S Ramadass
2010 Fourth International Conference on Emerging Security Information …, 2010
42010
Intrusion detection and prevention systems (IDPS) state of art: IDPS challenges
HR El-Taj
International Journal of Computer Science and Information Security 13 (9), 28, 2015
22015
CryptoQR System based on RSA
HR El-Taj, R Alhadhrami
Int. J. Comput. Sci. Inf. Secur 18 (6), 2020
12020
False Positive Reduction using IDS Alert Correlation Method based on the Apriori Algorithm
H El-Taj, O Abouabdalla, A Manasrah, M Anbar, A Al-Madi
International Journal of Computer Science & Information Security, 2010
2010
Detecting Neighbor Discovery Protocol Flooding Attack using Machine Learning Techniques
F Najjar, M Kadum, H El-Taj
CyberSec 2015 Reviewers
A Al Mazari, Y Shang, A Yassin, E Pshehotskaya, B Shanmugam, N Azis, ...
A Study to investigate the possibility of using a decision-making model with IPS
F Najjar
Aggregating IDS Alerts Based on Time Threshold: Testing and Results
HR El-Taj
Journal: INTERNATIONAL JORNAL OF COMPUTERS & TECHNOLOGY 11 (2), 0
Aggregating Intrusion Detection System Alerts Based on Row Echelon Form Concept
H El-Taj, O Abouabdalla, A Manasrah, M Mayeh, M Elhalabi
The system can't perform the operation now. Try again later.
Articles 1–19