Black hole attack in mobile ad hoc networks M Al-Shurman, SM Yoo, S Park Proceedings of the 42nd annual Southeast regional conference, 96-97, 2004 | 620 | 2004 |
Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks A Hamzah, M Shurman, O Al-Jarrah, E Taqieddin Sensors 19 (3), 561, 2019 | 159 | 2019 |
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks KA Darabkh, SS Ismail, M Al-Shurman, IF Jafar, E Alkhader, ... Journal of Network and Computer Applications 35 (6), 2068-2080, 2012 | 92 | 2012 |
Energy-aware and density-based clustering and relaying protocol (EA-DB-CRP) for gathering data in wireless sensor networks KA Darabkh, SM Odetallah, Z Al-qudah, K Ala’F, MM Shurman Applied Soft Computing 80, 154-166, 2019 | 84 | 2019 |
DoS and DDoS attack detection using deep learning and IDS M Shurman, R Khrais, A Yateem Int. Arab J. Inf. Technol 17 (4A), 655-661, 2020 | 70 | 2020 |
Hierarchical clustering using genetic algorithm in wireless sensor networks MM Shurman, MF Al-Mistarihi, AN Mohammad, KA Darabkh, AA Ababnah 2013 36th international convention on information and communication …, 2013 | 65 | 2013 |
LEACH enhancements for wireless sensor networks based on energy model M Shurman, N Awad, MF Al-Mistarihi, KA Darabkh 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices …, 2014 | 56 | 2014 |
IoT denial-of-service attack detection and prevention using hybrid IDS MM Shurman, RM Khrais, AA Yateem 2019 International Arab Conference on Information Technology (ACIT), 252-254, 2019 | 52 | 2019 |
Tree based dynamic address autoconfiguration in mobile ad hoc networks MF Al-Mistarihi, M Al-Shurman, A Qudaimat Computer Networks 55 (8), 1894-1908, 2011 | 52 | 2011 |
Performance evaluation of multiuser diversity in multiuser two‐hop cooperative multi‐relay wireless networks using maximal ratio combining over Rayleigh fading channels MF Al‐Mistarihi, R Mohaisen, A Sharaqa, MM Shurman, KA Darabkh International Journal of Communication Systems 28 (1), 71-90, 2015 | 43 | 2015 |
Merging dynamic address autoconfiguration and security key protocols in mobile ad hoc networks MM Shurman, MF Al-Mistarihi, KA Darabkh 2013 36th International Convention on Information and Communication …, 2013 | 30 | 2013 |
Collaborative execution of distributed mobile and IoT applications running at the edge MM Shurman, MK Aljarah 2017 International Conference on Electrical and Computing Technologies and …, 2017 | 27 | 2017 |
Closed-form expression of bit error rate in dual-hop dual-branch mixed relaying cooperative networks with best-path selection over Rayleigh fading channels M Hlayel, AM Hayajneh, MF Al-Mistarihi, M Shurman, KA Darabkh 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices …, 2014 | 27 | 2014 |
Dynamic distribution of security keys and IP addresses coalition protocol for mobile ad hoc networks MM Shurman, MF Al-Mistarihi, KA Darabkh Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i …, 2016 | 25 | 2016 |
A performance simulation for route maintenance in wireless ad hoc networks M Al-Shurman, SM Yoo, S Park Proceedings of the 42nd annual Southeast regional conference, 25-30, 2004 | 23 | 2004 |
Zero-day attack detection and prevention in software-defined networks H Al-Rushdan, M Shurman, SH Alnabelsi, Q Althebyan 2019 international arab conference on information technology (acit), 278-282, 2019 | 21 | 2019 |
N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol M Shurman, B Al-Shua'b, M Alsaedeen, MF Al-Mistarihi, KA Darabkh 2014 37th International Convention on Information and Communication …, 2014 | 21 | 2014 |
Key pre-distribution using mds codes in mobile ad hoc networks M Al-Shurman, SM Yoo Third International Conference on Information Technology: New Generations …, 2006 | 20 | 2006 |
A quantum no-key protocol for secure data communication Y Kanamori, SM Yoo, M Al-Shurman Proceedings of the 43rd annual Southeast regional conference-Volume 2, 92-93, 2005 | 18 | 2005 |
Cooperative hierarchical based edge-computing approach for resources allocation of distributed mobile and IoT applications M Aljarah, M Shurman, SH Alnabelsi International Journal of Electrical and Computer Engineering (IJECE) 10 (1 …, 2020 | 15 | 2020 |