NEWS
Institutional Subscription: Comprehensive Analyses to Enhance Your Global and Local Impact
New Feature: Compare Your Institution with the Previous Year
Find a Professional: Explore Experts Across 197 Disciplines in 220 Countries!
Find a Professional
Print Your Certificate
New! Young University / Institution Rankings 2025
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
Highly Cited Researchers 2025
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
login
Login
person_add
Register
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
Compare & Choose
local_fire_department
Country Reports
person
Find a Professional
Homam El-Taj
Dar Al Hekma University - Jeddah / Saudi Arabia
Engineering & Technology / Computer Science
AD Scientific Index ID: 4663514
Registration, Add Profile,
Premium Membership
Print Your Certificate
Ranking &
Analysis
Job
Experiences (0)
Education
Information (0)
Published Books (0)
Book Chapters (0)
Articles (0)
Presentations (0)
Lessons (0)
Projects (0)
Subject Leaders
Editorship, Referee &
Scientific Board (0 )
Patents /
Designs (0)
Academic Grants
& Awards (0)
Artistic
Activities (0)
Certificate / Course
/ Trainings (0)
Association &
Society Memberships (0)
Contact, Office
& Social Media
person_outline
Homam El-Taj's MOST POPULAR ARTICLES
1-)
Active e-mail system SMTP protocol monitoring algorithmR Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009262009
2-)
False positive reduction in intrusion detection system: A surveyO Abouabdalla, H El-Taj, A Manasrah, S Ramadass2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009232009
3-)
Detecting neighbor discovery protocol-based flooding attack using machine learning techniquesF Najjar, MM Kadhum, H El-TajAdvances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016142016
4-)
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detectionF Najjar, M Kadhum, H El-TajProceedings of the 4th International Conference on Internet Applications …, 2015142015
5-)
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation studyH El-Taj, F Najjar, H Alsenawi, M NajjarInternational Journal of Computer Science and Information Security 10 (6), 50, 2012132012
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept