Review of Data Preprocessing Techniques in Data Mining SAAWS Bhaya Journal of Engineering and Applied Sciences 12 (16), 4102-4107, 2017 | 465 | 2017 |
Text steganography based on font type in ms-word documents. W Bhaya, AMS Rahma, D Al-Nasrawi J. Comput. Sci. 9 (7), 898-904, 2013 | 54 | 2013 |
DDoS attack detection approach using an efficient cluster analysis in large data scale W Bhaya, M EbadyManaa 2017 Annual Conference on New Trends in Information & Communications …, 2017 | 33 | 2017 |
Text steganography based on unicode of characters in multilingual AMS Rahma, WS Bhaya, DA Al-Nasrawi International Journal of Engineering Research and Applications 3 (4), 1153-1165, 2013 | 28 | 2013 |
Review clustering mechanisms of distributed denial of service attacks W Bhaya, ME Manaa Journal of Computer Science 10 (10), 2037, 2014 | 26 | 2014 |
A proactive DDoS attack detection approach using data mining cluster analysis W Bhaya, ME Manaa Journal of Next Generation Information Technology 5 (4), 36, 2014 | 21 | 2014 |
Fake profiles types of online social networks: a survey R Kareem, W Bhaya International Journal of Engineering & Technology 7 (4.19), 919-925, 2018 | 13 | 2018 |
Text hiding in mobile phone simple message service using fonts WS Bhaya Journal of computer science 7 (11), 1626, 2011 | 12 | 2011 |
A reinforcement learning-based routing for real-time multimedia traffic transmission over software-defined networking M Al Jameel, T Kanakis, S Turner, A Al-Sherbaz, WS Bhaya Electronics 11 (15), 2441, 2022 | 11 | 2022 |
Prevention of Spoofing Attacks in the Infrastructure wireless networks WS Bhaya, SA AlAsady Journal of Computer Science 8 (10), 1769-1779, 2012 | 11 | 2012 |
Review of Data Mining Techniques for Malicious Detection NTOW Bhaya Research Journal of Applied Sciences 11 (10), 942-947, 2016 | 10* | 2016 |
Higher education’s certificates model based on blockchain technology MA Ali, WS Bhaya Journal of Physics: Conference Series 1879 (2), 022091, 2021 | 9 | 2021 |
Intrusion detection system for cloud based software-defined networks OJ Ibrahim, WS Bhaya Journal of Physics: Conference Series 1804 (1), 012007, 2021 | 9 | 2021 |
Text Steganography in Excel Documents Using Color and Type of Fonts SAAAW Bhaya Research Journal of Applied Sciences 11 (10), 1054-1059, 2016 | 9 | 2016 |
Security against Spoofing Attack in Mobile Ad Hoc Network W Bhaya, SA Alasadi European Journal of Scientific Research 64 (4), 634-643, 2011 | 9 | 2011 |
Review on Malware and Malware Detection Using Data Mining Techniques WS Bhaya, MA Ali Journal of University of Babylon for Pure and Applied Sciences 25 (5), 1585-1601, 2017 | 8 | 2017 |
Software Defined Network (SDN) Security Against Address Resolution Protocol Poisoning Attack AFAWS Bhaya Journal of Computational and Theoretical Nanoscience 16 (3), 961–968, 2019 | 6 | 2019 |
Blockchain technology's applications and challenges: An overview MA Ali, WS Bhaya AIP Conference Proceedings 2290 (1), 2020 | 5 | 2020 |
Anomaly Detection in Network Traffic Using Stream Data Mining: Review WSBSA Alasadi Research Journal of Applied Sciences 11 (10), 1076-1082, 2016 | 5* | 2016 |
Al-Mamory and Wesam S. Bhaya;“Taxonomy of Packet Classification algorithms,” O Safaa Journal of Babylon University/Pure and Applied, 0 | 5 | |