MOST CITED SCHOLAR PUBLICATIONS
- An efficient dynamic addressing based routing protocol for underwater wireless sensor networksYB Muhammad Ayaz, Azween Abdullah, Ibrahima FayeScience Direct 35 (4), 475-486 2012Citations: 119
- The impact of artificial intelligence on language translation: a reviewYA Mohamed, A Khanan, M Bashir, AHHM Mohamed, MAE Adiel, ...Ieee Access 12, 25553-25579 2024Citations: 36
- Immune inspired approach for securing wireless ad hoc networksM Yasir Abdelgadir, A AzweenIJCSNS International Journal of Computer Science and Network Security 6 (1 2009Citations: 18
- Immune inspired framework for ad hoc network securityYA Mohamed, AB Abdullah2009 IEEE International Conference on Control and Automation, 297-302 2009Citations: 17
- Security mechanism for MANETsYA Mohamed, AB AbdullahJournal of Engineering Science and Technology 4 (2), 231-242 2009Citations: 15
- An enhancement of data encryption standards algorithm (DES)NMM Alhag, YA Mohamed2018 International Conference on Computer, Control, Electrical, and 2018Citations: 14
- Implementation of IDS with response for securing MANETsYA Mohamed, AB Abdullah2010 International Symposium on Information Technology 2, 660-665 2010Citations: 11
- Immune-inspired framework for securing hybrid MANETYA Mohamed, AB Abdullah2009 IEEE Symposium on Industrial Electronics & Applications 1, 301-306 2009Citations: 10
- Adaptive Immune-based system for network securityRAA Farah, YA Mohamed2018 International Conference on Computer, Control, Electrical, and 2018Citations: 9
- Enhancing intrusion detection using statistical functionsMA Ahmed, YA Mohamed2018 International Conference on Computer, Control, Electrical, and 2018Citations: 8
- I2MANET Security Logical Specification Framework.YA Mohamed, A AbdullahInt. Arab J. Inf. Technol. 9 (6), 495-503 2012Citations: 7
- Biologically inspired model for securing hybrid mobile ad hoc networksY Abdelgadir, A Abdullah2008 International Symposium on Information Technology 2, 1-6 2008Citations: 7
- The impact of coupling signaling protocols and codecs scheme in achieving VoIP QualityHAS Mekki, YA MohammedAmerican Scientific Research Journal for Engineering, Technology, and 2017Citations: 4
- From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity UnderstandingA Khanan, YA Mohamed, AH Mohamed, M BashirIEEE Access 2024Citations: 3
- Accuracy and problems of machine-based translation in contrast to human-based translation when rendering health awareness texts versus poetry textsMAE Adiel, MA Elsadig, A Altigani, YA Mohamed, BES Ahmed, ...Academic J. Interdiscipl. Stud. 12 (4), 223-231 2023Citations: 3
- An approach for software-defined networks securitySB Ahmed, YA Mohamed2023 Second International Conference on Electrical, Electronics, Information 2023Citations: 3
- A two-stage assessment approach for QoS in internet of things based on fuzzy logicME Adam, YAA HamidInternational Journal of Advanced Computer Science and Applications 13 (4) 2022Citations: 3
- A novel Mechanism for Securing Cloud ComputingYA MohamedThe International Arab Conference on Information Technology (ACIT’2013) 2013Citations: 3
- Biologically inspired Model for Securing Hybrid Mobile Ad hoc NetworksY abdelgadir Mohamed, AB Abdullah2008 International Symposium on High Capacity Optical Networks and Enabling 2008Citations: 3
- A Model for Enhancing Nested Mobile Nodes PerformanceYM Sawsan Ibrahim2023 International Conference in Advances in Power, Signal, and Information 2023Citations: 2