- BGP anomaly detection techniques: A survey
B Al-Musawi, P Branch, G Armitage
IEEE Communications Surveys & Tutorials 19 (1), 377-396 2016
Citations: 177
- Mitigating DoS/DDoS attacks using iptables
BQM AL-Musawi
International Journal of Engineering & Technology 12 (3), 101-111 2012
Citations: 48
- Detecting BGP instability using recurrence quantification analysis (RQA)
B Al-Musawi, P Branch, G Armitage
2015 IEEE 34th International Performance Computing and Communications 2015
Citations: 40
- Using BGP features towards identifying type of BGP anomaly
NH Hammood, B Al-Musawi
2021 International Congress of Advanced Technology and Engineering (ICOTEN 2021
Citations: 15
- Recurrence behaviour of BGP traffic
B Al-Musawi, P Branch, G Armitage
2017 27th International Telecommunication Networks and Applications 2017
Citations: 15
- Identifying OSPF LSA falsification attacks through non-linear analysis
B Al-Musawi, P Branch, MF Hassan, SR Pokhrel
Computer Networks 167, 107031 2020
Citations: 12
- A new intrusion detection system based on using non-linear statistical analysis and features selection techniques
A Al-Bakaa, B Al-Musawi
Computers & Security 122, 102906 2022
Citations: 11
- Detecting BGP anomalies using recurrence quantification analysis
B Al-Musawi
Swinburne 2018
Citations: 11
- BGP Replay Tool (BRT) v0.2
B Al-Musawi, R Al-Saadi, P Branch, G Armitage
http://i4t.swin.edu.au/reports/I4TRL-TR-170606A.pdf 2017
Citations: 10
- A survey of BGP anomaly detection using machine learning techniques
NH Hammood, B Al-Musawi, AH Alhilali
International Conference on Applications and Techniques in Information 2021
Citations: 8
- Internet of Things security techniques: A survey
SM Alturfi, HA Marhoon, B Al-Musawi
AIP Conference Proceedings 2290 (1) 2020
Citations: 6
- Energy-balanced and distributed clustering protocol for IoT wireless sensors
MF Hassan, SR Pokhrel, B Al-Musawi
2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW 2020
Citations: 6
- Preventing brute force attack through the analyzing log
ALM Bahaa
Iraqi Journal of Science 53 (3), 663-667 2012
Citations: 6
- Anomaly detection in cloud network: A review
A Al-Mazrawe, B Al-Musawi
BIO Web of Conferences 97, 00019 2024
Citations: 5
- Flow-based intrusion detection systems: A survey
A Al-Bakaa, B Al-Musawi
International Conference on Applications and Techniques in Information 2021
Citations: 5
- Improving the performance of intrusion detection system through finding the most effective features
A Al-Bakaa, B Al-Musawi
2021 International Congress of Advanced Technology and Engineering (ICOTEN), 1-9 2021
Citations: 4
- An advanced classification of cloud computing security techniques: A survey
SM Alturfi, B Al-Musawi, HA Marhoon
AIP Conference Proceedings 2290 (1) 2020
Citations: 4
- Design and implementation of fast floating point units for FPGAs
MF Hassan, KF Hussein, B Al-Musawi
Indonesian Journal of Electrical Engineering and Computer Science 19 (3 2020
Citations: 4
- Innovative fitness functions for robust energy management in WSNs
MF Hassan, B Al-Musawi, AK Al-Janabi
Journal of Network and Systems Management 31 (4), 76 2023
Citations: 3
- RDTD: A tool for detecting internet routing disruptions at AS-level
B Al-Musawi, MF Hassan, SM Alturfi
Journal of Telecommunications and the Digital Economy 8 (2), 18-30 2020
Citations: 3