no code implementations • 18 Jan 2020 • Abdalrahman Hwoij, Mouhammd Al-kasassbeh, Mustafa Al-Fayoumi
In addition, PART classifier has succeeded in classifying normal traffic from different DOS attacks at 100%.
no code implementations • 21 Nov 2018 • Mohammad Almseidin, Mouhammd Al-kasassbeh, Szilveszter Kovacs
In this paper, we introduce a novel idea capable of supporting the proper data source while avoiding the issues associated with the binary decision.
Networking and Internet Architecture Cryptography and Security
no code implementations • 26 May 2018 • Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin
Network security engineers work to keep services available all the time by handling intruder attacks.
no code implementations • 8 Jan 2018 • Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Al-kasassbeh
The focus was on false negative and false positive performance metrics in order to enhance the detection rate of the intrusion detection system.
no code implementations • 27 Dec 2017 • Mouhammd Al-kasassbeh
IDS is a set of software and/or hardware techniques used to detect hacker's activities in computer systems.
no code implementations • 26 Feb 2016 • Ahmad B. A. Hassanat, Esra'a Alkafaween, Nedal A. Al-Nawaiseh, Mohammad A. Abbadi, Mouhammd Al-kasassbeh, Mahmoud B. Alhasanat
Mutation is one of the most important stages of the genetic algorithm because of its impact on the exploration of global optima, and to overcome premature convergence.
no code implementations • 4 Jan 2015 • Mouhammd Al-kasassbeh, Ghada A. Altarawneh, Ahmad B. A. Hassanat
We showed in this work how the Hassanat distance metric enhances the performance of the nearest neighbour classifiers.