NEWS
New Feature!!!! University Subject Rankings in 12 branches
FOR SCIENTIST REGISTRATION FOR INSTITUTIONAL BULK REGISTRATION
FOR EDIT YOUR UNIVERSITY / INSTITUTION PAGE
Some differences of the AD Scientific Index
New Feature!!!! University Subject Rankings in 12 branches
List without CERN, Statistical Data etc. Only in AD Scientific Index
New Feature!!!! University Subject Rankings in 12 branches
AD
Scientific Index 2024
About Us
Methodology
Compare & Choose
Contact - FAQ
login
Login
person_add
Register
school
University Rankings
subject
University Subject Rankings
place
Country Rankings
insights
i10 Productivity Rankings
insights
Subject Rankings
format_list_numbered
Top 100 Scientists
format_list_numbered
Citation Rankings
format_quote
Top 100 Institutions
local_fire_department
Country Top Lists
Homam El-Taj
AD Scientific Index 2024
Engineering & Technology / Computer Science
Dar Al Hekma University - / Saudi Arabia
Edit Form
Registration, Add Profile,
Premium Membership
Ranking &
Analysis
Job
Experiences (0)
Education
Information (0)
Published Books (0)
Book Chapters (0)
Articles (0)
Presentations (0)
Lessons (0)
Projects (0)
Congresses (0)
Editorship, Referee &
Scientific Board (0 )
Patents /
Designs (0)
Academic Grants
& Awards (0)
Artistic
Activities (0)
Certificate / Course
/ Trainings (0)
Association &
Society Memberships (0)
Contact, Office
& Social Media
person_outline
Homam El-Taj's MOST POPULAR ARTICLES
1-)
Active e-mail system SMTP protocol monitoring algorithmR Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009262009
2-)
False positive reduction in intrusion detection system: A surveyO Abouabdalla, H El-Taj, A Manasrah, S Ramadass2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009232009
3-)
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detectionF Najjar, M Kadhum, H El-TajProceedings of the 4th International Conference on Internet Applications …, 2015132015
4-)
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation studyH El-Taj, F Najjar, H Alsenawi, M NajjarInternational Journal of Computer Science and Information Security 10 (6), 50, 2012132012
5-)
Detecting neighbor discovery protocol-based flooding attack using machine learning techniquesF Najjar, MM Kadhum, H El-TajAdvances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016122016
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept