Machine learning approaches for combating distributed denial of service attacks in modern networking environments A Aljuhani IEEE Access 9, 42236-42264, 2021 | 149 | 2021 |
Digital twins for healthcare 4.0—Recent advances, architecture, and open challenges M Alazab, LU Khan, S Koppu, SP Ramu, M Iyapparaja, P Boobalan, ... IEEE Consumer Electronics Magazine 12 (6), 29-37, 2022 | 80 | 2022 |
Chatgpt for cybersecurity: practical applications, challenges, and future directions M Al-Hawawreh, A Aljuhani, Y Jararweh Cluster Computing 26 (6), 3421-3436, 2023 | 76 | 2023 |
Holistic DDoS mitigation using NFV T Alharbi, A Aljuhani, H Liu 2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 | 65 | 2017 |
Deep learning-based intrusion detection approach for securing industrial Internet of Things S Soliman, W Oudah, A Aljuhani Alexandria Engineering Journal 81, 371-383, 2023 | 56 | 2023 |
Virtualized network functions security attacks and vulnerabilities A Aljuhani, T Alharbi 2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 | 56 | 2017 |
Deep learning and smart contract-assisted secure data sharing for IoT-based intelligent agriculture R Kumar, P Kumar, A Aljuhani, AKMN Islam, A Jolfaei, S Garg IEEE Intelligent Systems 38 (4), 42-51, 2022 | 36 | 2022 |
Anomaly Detection for Internet of Things Cyberattacks. M Alanazi, A Aljuhani Computers, Materials & Continua 72 (1), 2022 | 33 | 2022 |
Digital twin-driven SDN for smart grid: A deep learning integrated blockchain for cybersecurity P Kumar, R Kumar, A Aljuhani, D Javeed, A Jolfaei, AKMN Islam Solar Energy 263, 111921, 2023 | 32 | 2023 |
Anomaly Detection for Industrial Internet of Things Cyberattacks. R Alanazi, A Aljuhani Computer Systems Science & Engineering 44 (3), 2023 | 32 | 2023 |
Deep-learning-based blockchain for secure zero touch networks R Kumar, P Kumar, M Aloqaily, A Aljuhani IEEE Communications Magazine 61 (2), 96-102, 2022 | 29 | 2022 |
Blockchain-based authentication and explainable AI for securing consumer IoT applications R Kumar, D Javeed, A Aljuhani, A Jolfaei, P Kumar, AKMN Islam IEEE Transactions on Consumer Electronics, 2023 | 26 | 2023 |
Smart and lightweight DDoS detection using NFV T Alharbi, A Aljuhani, H Liu, C Hu Proceedings of the International Conference on Compute and Data Analysis …, 2017 | 25 | 2017 |
Anomaly-based intrusion detection system in IoT using kernel extreme learning machine S Bacha, A Aljuhani, KB Abdellafou, O Taouali, N Liouane, M Alazab Journal of Ambient Intelligence and Humanized Computing 15 (1), 231-242, 2024 | 23 | 2024 |
Detection of man in the middle attack using machine learning M Saed, A Aljuhani 2022 2nd International Conference on Computing and Information Technology …, 2022 | 23 | 2022 |
Fog intelligence for secure smart villages: Architecture and future challenges A Aljuhani, P Kumar, R Kumar, A Jolfaei, AKMN Islam IEEE Consumer Electronics Magazine 12 (5), 12-21, 2022 | 18 | 2022 |
Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks R Kumar, A Aljuhani, P Kumar, A Kumar, A Franklin, A Jolfaei Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted …, 2022 | 16 | 2022 |
Mitigation of application layer DDoS flood attack against web servers A Aljuhani, T Alharbi, B Taylor Journal of Information Security and Cybercrimes Research 2 (1), 83-95, 2019 | 14 | 2019 |
Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things. T Alatawi, A Aljuhani Computers, Materials & Continua 73 (1), 2022 | 13 | 2022 |
A deep learning integrated blockchain framework for securing industrial IoT A Aljuhani, P Kumar, R Alanazi, T Albalawi, O Taouali, AKMN Islam, ... IEEE Internet of Things Journal, 2023 | 11 | 2023 |