Black hole attack in mobile ad hoc networks M Al-Shurman, SM Yoo, S Park Proceedings of the 42nd annual Southeast regional conference, 96-97, 2004 | 626 | 2004 |
Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks A Hamzah, M Shurman, O Al-Jarrah, E Taqieddin Sensors 19 (3), 561, 2019 | 168 | 2019 |
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks KA Darabkh, SS Ismail, M Al-Shurman, IF Jafar, E Alkhader, ... Journal of Network and Computer Applications 35 (6), 2068-2080, 2012 | 93 | 2012 |
Energy-aware and density-based clustering and relaying protocol (EA-DB-CRP) for gathering data in wireless sensor networks KA Darabkh, SM Odetallah, Z Al-qudah, K Ala’F, MM Shurman Applied Soft Computing 80, 154-166, 2019 | 86 | 2019 |
DoS and DDoS attack detection using deep learning and IDS M Shurman, R Khrais, A Yateem Int. Arab J. Inf. Technol 17 (4A), 655-661, 2020 | 80 | 2020 |
Hierarchical clustering using genetic algorithm in wireless sensor networks MM Shurman, MF Al-Mistarihi, AN Mohammad, KA Darabkh, AA Ababnah 2013 36th international convention on information and communication …, 2013 | 67 | 2013 |
IoT denial-of-service attack detection and prevention using hybrid IDS MM Shurman, RM Khrais, AA Yateem 2019 International Arab Conference on Information Technology (ACIT), 252-254, 2019 | 56 | 2019 |
LEACH enhancements for wireless sensor networks based on energy model M Shurman, N Awad, MF Al-Mistarihi, KA Darabkh 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices …, 2014 | 56 | 2014 |
Tree based dynamic address autoconfiguration in mobile ad hoc networks MF Al-Mistarihi, M Al-Shurman, A Qudaimat Computer Networks 55 (8), 1894-1908, 2011 | 52 | 2011 |
Performance evaluation of multiuser diversity in multiuser two‐hop cooperative multi‐relay wireless networks using maximal ratio combining over Rayleigh fading channels MF Al‐Mistarihi, R Mohaisen, A Sharaqa, MM Shurman, KA Darabkh International Journal of Communication Systems 28 (1), 71-90, 2015 | 44 | 2015 |
Collaborative execution of distributed mobile and IoT applications running at the edge MM Shurman, MK Aljarah 2017 International Conference on Electrical and Computing Technologies and …, 2017 | 31 | 2017 |
Merging dynamic address autoconfiguration and security key protocols in mobile ad hoc networks MM Shurman, MF Al-Mistarihi, KA Darabkh 2013 36th International Convention on Information and Communication …, 2013 | 30 | 2013 |
Closed-form expression of bit error rate in dual-hop dual-branch mixed relaying cooperative networks with best-path selection over Rayleigh fading channels M Hlayel, AM Hayajneh, MF Al-Mistarihi, M Shurman, KA Darabkh 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices …, 2014 | 28 | 2014 |
Dynamic distribution of security keys and IP addresses coalition protocol for mobile ad hoc networks MM Shurman, MF Al-Mistarihi, KA Darabkh Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i …, 2016 | 25 | 2016 |
Zero-day attack detection and prevention in software-defined networks H Al-Rushdan, M Shurman, SH Alnabelsi, Q Althebyan 2019 international arab conference on information technology (acit), 278-282, 2019 | 24 | 2019 |
A performance simulation for route maintenance in wireless ad hoc networks M Al-Shurman, SM Yoo, S Park Proceedings of the 42nd annual Southeast regional conference, 25-30, 2004 | 23 | 2004 |
N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol M Shurman, B Al-Shua'b, M Alsaedeen, MF Al-Mistarihi, KA Darabkh 2014 37th International Convention on Information and Communication …, 2014 | 22 | 2014 |
Key pre-distribution using mds codes in mobile ad hoc networks M Al-Shurman, SM Yoo Third International Conference on Information Technology: New Generations …, 2006 | 20 | 2006 |
A quantum no-key protocol for secure data communication Y Kanamori, SM Yoo, M Al-Shurman Proceedings of the 43rd annual Southeast regional conference-Volume 2, 92-93, 2005 | 18 | 2005 |
Performance analysis of amplify‐and‐forward cognitive relay networks with interference power constraints over Nakagami‐m fading channels MM Shurman, MF Al‐Mistarihi, MM Alhulayil IET Communications 10 (5), 594-605, 2016 | 17 | 2016 |