Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Alkasassbeh, Mouhammd
add a person with the name Alkasassbeh, Mouhammd
 

Other publications of authors with the same name

Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation., , , and . Cryptogr., 6 (2): 24 (2022)Evaluation of machine learning algorithms for intrusion detection system., , , and . SISY, page 277-282. IEEE, (2017)Classification of malware based on file content and characteristics., and . CoRR, (2018)Towards Generating a Practical SUNBURST Attack Dataset for Network Attack Detection., , and . Comput. Syst. Sci. Eng., 47 (2): 2643-2669 (2023)Multi-Step Cyber-Attack Dataset (MSCAD for Intrusion Detection)., , and . (June 2022)Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques., , , , and . Int. J. Interact. Mob. Technol., 13 (1): 70-84 (2019)An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method., and . Inf., 13 (6): 300 (2022)Enhancing genetic algorithms using multi mutations., , , , , and . PeerJ Prepr., (2016)Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality., , and . CoRR, (2018)Intelligent Methods for Accurately Detecting Phishing Websites., , and . CoRR, (2020)