References
- T. Penttinen, "Distributed Denial-of-Service Attacks in the Internet," 2005.
- M. Bogdanoski, T. Shuminoski, and A. Risteski, "Analysis of the SYN Flood DoS Attack," Computer Network and Information Security, vol. 8, pp. 1-11, 2013, doi: 10.5815/ijcnis.2013.08.01.
- R. Tandon, "A Survey of Distributed Denial of Service Attacks and Defenses," Aug. 2020, Accessed: May 18, 2022. [Online]. Available: http://arxiv.org/abs/2008.01345
- J. W. Branch, "EXTENDED AUTOMATA-BASED APPROACHES TO INTRUSION DETECTION," 2003.
- A. A. Sharipbay, Z. S. Saukhanova, G. B. Shakhmetova, and N. S. Saukhanov, "Application of finite automata in cryptography," Jun. 2019. doi: 10.1145/3330431.3330452.
- Z. F. Han, J. P. Zou, H. Jin, Y. P. Yang, and J. H. Sun, "Intrusion detection using adaptive time-dependent finite automata," in Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 2004, vol. 5, pp. 3040-3045. doi: 10.1109/icmlc.2004.1378554.
- J. W. Branch, A. Bivens, C. Y. Chan, T. K. Lee, and B. K. Szymanski, "Denial of Service Intrusion Detection Using Time Dependent Deterministic Finite Automata," 2002.
- P. M. Rathod, N. Marathe, and A. v. Vidhate, "A survey on Finite Automata based pattern matching techniques for network Intrusion Detection System (NIDS)," Jan. 2015. doi: 10.1109/ICAECC.2014.7002456.
- X. Yu, W. C. Feng, D. Yao, and M. Becchi, "O3FA: A scalable finite automata-based pattern-matching engine for out-of-order deep packet inspection," in ANCS 2016 - Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, Mar. 2016, pp. 1-11. doi: 10.1145/2881025.2881034.
- Q. W. Shang, K. Cao, and F. Wang, "The study on network attacks based on automaton theory," in Procedia Engineering, 2011, vol. 23, pp. 653-658. doi: 10.1016/j.proeng.2011.11.2561.
- N. David et al., "Modelling social-technical attacks with timed automata," in MIST 2015 - Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, co-located with CCS 2015, Oct. 2015, pp. 21-28. doi: 10.1145/2808783.2808787.
- M. Almseidin, I. Piller, M. Al-Kasassbeh, and S. Kovacs, "Fuzzy automaton as a detection mechanism for the multistep attack," International Journal on Advanced Science, Engineering and Information Technology, vol. 9, no. 2, pp. 575-586, 2019, doi: 10.18517/ijaseit.9.2.7591.
- G. Kim, "the Relationship Between the Chomsky Hierarchy and Automata," pp. 1-10, 2019.
- P. Grachev, I. Lobanov, I. Smetannikov, and A. Filchenkov, "Neural network for synthesizing deterministic finite automata," Procedia Computer Science, vol. 119, pp. 73-82, 2017, doi: 10.1016/j.procs.2017.11.162.
- K. M. Elleithy, D. Blagovic, W. K. Cheng, P. Sideleau, A. " Et, and W. Cheng, "Denial of Service Attack Techniques: Analysis, Implementation and Comparison," 2005. [Online]. Available: http://digitalcommons.sacredheart.edu/computersci_fac
- F. H. Hsu, Y. L. Hwang, C. Y. Tsai, W. T. Cai, C. H. Lee, and K. W. Chang, "TRAP: A Three-way handshake server for TCP connection establishment," Applied Sciences (Switzerland), vol. 6, no. 11, Nov. 2016, doi: 10.3390/app6110358.
- S. Deore and A. Patil, "Survey Denial of Service classification and attack with Protect Mechanism for TCP SYN Flooding Attacks Atul Patil," International Research Journal of Engineering and Technology, 2016, doi: 10.1109/TC.2003.1176986.
- M. W. Jeter, Network Programming, vol. 1. 2018. doi: 10.1201/9780203749333-6.
- "tcpdump(1) man page | TCPDUMP & LIBPCAP." https://www.tcpdump.org/manpages/tcpdump.1.html (accessed May 18, 2022).
- Fahd Alhaidari, Nouran Abu Shaib, Maram Alsafi, Haneen Alharbi, Majd Alawami, Reem Aljindan, Atta-ur Rahman, Rachid Zagrouba, "ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques", Computational Intelligence and Neuroscience, vol. 2022, Article ID 1615528, 15 pages, 2022. https://doi.org/10.1155/2022/1615528.
- M. Jamal, N.A. Zafar, A. Rahman, D. Musleh, M. Gollapalli, S. Chabani, "Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets," Computers, Materials and Continua, vol. 72, no. 2, pp. 3331-3348, 2022. https://doi.org/10.32604/cmc.2022.025205
- A. Rahman, M. Mahmud, T. Iqbal, L. Saraireh, H. Kholidy et al., "Network Anomaly Detection in 5G Networks," Mathematical Modelling of Engineering Problems, vol. 9, No. 2, pp. 397-404, 2022. https://doi.org/10.18280/mmep.090213
- F. Al-Jawad, R. Alessa, S. Alhammad, B. Ali, M. Al-Qanbar, A. Rahman, "Applications of 5G and 6G in Smart Health Services," International Journal of Computer Science and Network Security, vol. 22, no. 3, pp. 173-182, 2022.
- S.U. Rehman, M. Mahmud, A. Rahman, I.U. Haq, M. Safdar, "Information Security in Business: A Bibliometric Analysis of the 100 Top Cited Articles," Library Philosophy and Practice (e-journal), 5354,
- R. Zagrouba, A. AlAbdullatif, K. AlAjaji, N. Al-Serhani, F. Alhaidari, A. Almuhaideb, A. Rahman, "Authenblue: a new authentication protocol for the industrial internet of things," Computers, Materials & Continua, vol. 67, no.1, pp. 1103-1119,
- A. Rahman, S. Dash, A.K. Luhach, N. Chilamkurti, S. Baek, Y. Nam, "A Neuro-Fuzzy Approach for User Behavior Classification and Prediction", Journal of Cloud Computing, 8(17), 2019.
- A. Rahman, "Memetic Computing based Numerical Solution to Troesch Problem", Journal of Intelligent and Fuzzy Systems, 37(1):1545-1554, 2019. https://doi.org/10.3233/JIFS-18579
- A. Rahman, "Optimum Information Embedding in Digital Watermarking", Journal of Intelligent and Fuzzy Systems, 37(1):553-564, 2019. https://doi.org/10.3233/JIFS-162405
- A. Rahman, S. Abbas, M. Gollapalli, R. Ahmed, S. Aftab et al., "Rainfall Prediction System Using Machine Learning Fusion for Smart Cities," Sensors, vol. 22, no. 9, pp. 1-15, 2022. https://doi.org/10.3390/s22093504.
- N. M. Ibrahim, D. G. I. Gabr, A. Rahman, S. Dash, A. Nayyar, "A deep learning approach to intelligent fruit identification and family classification," Multimedia Tools and Applications, 2022. https://doi.org/10.1007/s11042-022-12942-9.
- M Gollapalli, A. Rahman, D. Musleh, N. Ibrahim et al., "A Neuro-Fuzzy Approach to Road Traffic Congestion Prediction," Computers, Materials and Continua, vol. 72, no. 3, pp. 295-310, 2022. https://doi.org/10.32604/cmc.2022.027925
- A. Rahman, K. Sultan, I. Naseer, R. Majeed, D. Musleh et.al., "Supervised Machine Learning-based Prediction of COVID19," Computers, Materials & Continua, vol. 69, no.1, pp. 21- 34, 2021. DOI: 10.32604/cmc.2021.013453.
- S. M. Alotaibi, A. Rahman, M. I. Basheer and M. A. Khan, "Ensemble machine learning based identification of pediatric epilepsy," Computers, Materials & Continua, vol. 68, no.1, pp. 149-165,
- G. Zaman, H. Mahdin, K. Hussain, A. Rahman, J. Abawajy and S. A. Mostafa, "An Ontological Framework for Information Extraction from Diverse Scientific Sources," IEEE Access, vol. 9, pp. 42111-42124, 2021. doi: 10.1109/ACCESS.2021.3063181.
- A. Rahman, S. Dash, M. Ahmad, T. Iqbal, "Mobile Cloud Computing: A Green Perspective," Intelligent Systems, Lecture Notes in Networks and Systems book series (LNNS, volume 185), pp. 523-533,
- A. Rahman, "GRBF-NN based ambient aware realtime adaptive communication in DVB-S2." J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02174-w.
- F. Alhaidari, A. Rahman, & R. Zagrouba, "Cloud of Things: architecture, applications and challenges." J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02448-3.
- A. Rahman, S. Dash, & A.K. Luhach, "Dynamic MODCOD and power allocation in DVB-S2: a hybrid intelligent approach." Telecommun Syst, vol. 76, pp. 49-61, 2021. https://doi.org/10.1007/s11235-020-00700-x.
- M. Ahmad, M.A. Qadir, A. Rahman et al., "Enhanced query processing over semantic cache for cloud based relational databases." J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-01943-x
- M. Mahmud, A. Rahman, M. Lee, J. Choi, "Evolutionary-based image encryption using RNA codons truth table", Optics & Laser Technology, vol. 121:1-8, 2020.
- G. Zaman, H. Mahdin, K. Hussain, A. Rahman, N. Ibrahim, N.Z.M. Safar, "Digital Library of Online PDF Sources: An ETL Approach," IJCSNS, vol. 20 (11), pp. 172-181, 2020.
- M. Ahmad, U. Farooq, A. Rahman, A. Alqatari, S. Dash & A.K. Luhach, "Investigating TYPE constraint for frequent pattern mining", Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 605-626, 2019. https://doi.org/10.1080/09720529.2019.1637158
- K. Sultan, I.M. Qureshi, A. Rahman, B.A. Zafar, M. Zaheer, "CSI Based Multiple Relay Selection and Transmit Power Saving Scheme for Underlay CRNs Using FRBS and Swarm Intelligence," International Journal of Applied Metaheuristic Computing (IJAMC) 10 (3), 1-18, 2019. https://doi.org/10.4018/IJAMC.2019070101
- A. Rahman, M.I.B. Ahmed, "Virtual Clinic: A CDSS Assisted Telemedicine Framework", Chapter 15, Telemedicine Technologies, 1st Edition. Elsevier, 2019.
- L. Ajmi, Hadeel, N. Alqahtani, A. Rahman and M. Mahmud, "A Novel Cybersecurity Framework for Countermeasure of SME's in Saudi Arabia," 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019, pp. 1-9, doi: 10.1109/CAIS.2019.8769470.
- A. Rahman, Maqsood Mahmud, Kiran Sultan, Nahier Aldhafferi, Abdullah Alqahtani, Dhiaa Abdullah, "Medical Image Watermarking for Fragility and Robustness: A Chaos, ECC and RRNS Based Approach", Journal of Medical Imaging and Health Informatics, vol. 8(6), pp. 1192-1200, July 2018. https://doi.org/10.1166/jmihi.2018.2431
- A. Rahman, "Efficient Decision Based Spectrum Mobility Scheme for Cognitive Radio Based V2V Communication System," Journal of Communications, vol. 13, no. 9, pp. 498- 504, 2018. Doi: 10.12720/jcm.13.9.498-504.
- A. Rahman, F.A. Alhaidari, "Querying RDF Data", Journal of Theoretical and Applied Information Technology 26(22):7599-7614, 2018.
- M.Z. Muzaffar, I.M. Qureshi, A. Rahman, F.A. Alhaidari, M.A.A. Khan, "Compressed Sensing for Security and Payload Enhancement in Digital Audio Steganography", Journal of Information Hiding and Multimedia Signal Processing, 15(6):1506-1517, Nov. 2018.
- A. Rahman, S.A. Alrashed, A. Abraham, "User Behavior Classification and Prediction using FRBS and Linear Regression" Journal of Information Assurance and Security, vol. 12, no. 3, pp. 86-93, 2017.