Dr. Ammar AlMomani

Professor, Head of Research and Innovation This email address is being protected from spambots. You need JavaScript enabled to view it.

Educational Background

  • Ph.D. (internet security) Universiti Sains Malaysia (USM), Malaysia. 2013
  • Master of Science (M.S.), Computer Information Systems: The Arab Academy for Banking and Financial Sciences (AABFS), Jordan ,2005
  • Bachelor of Science (B.Sc.), Computer Science, Mutah University, Jordan,2003

 

Work Experience

  • A Professor and ahead of the research and innovation department at Skyline university college-Sharjah-UAE, From june-2022
  • A head of IT department, at Al-Balqa Applied University (BAU), 2018-2022
  • Associate professor and senior lecturer at Al-Balqa Applied University (BAU), 2019-Sep.
  • Assistant professor and senior lecturer at Al-Balqa Applied University, Jordan. 2016-Sep.
  • Assistant professor and senior lecturer at the College of Computer and Information Sciences- Al-Imam Muhammad Ibn Saud Islamic University -Kingdom of Saudi Arabia, 2015-Sep.
  • Two years as Assistant professor and senior lecturer at Al-Balqa Applied University, Jordan, 2013-Sep .
  • Four years and two months working as a lecturer in Saudi Arabia - king Khalid University - department of computer science, 2010-Sep.
  • Trainer in the National Information technology Centre (NITC) in an electronic government network project as a trainer in the information technology field, 2006-Aug.
  • Publications

    • Kwok Tai,Tanveer singh, Amit Chhabra, Amit Chhabra; Sunil K. Singh, Deepinder Singh, Dragan Peraković, Ammar Almomani, “Traffic Accidents Prevention in Low Visibility Conditions using VANETS Cloud Environment International”, Journal of Cloud Applications and Computing (IJCAC). IGI, (IJCAC) 12.1 (2022): 1-21 Scopus (Q4).

    • Ammar Almomani (2022),” Darknet Traffic analysis and Classification system based on stacking ensemble learning”, Information Systems and e-Business Management, Springer, WOS(ISI&IF(3.9)-Scopus(Q2).

    • Jain, A. K., Gupta, B. B., Kaur, K., Bhutani, P., Alhalabi, W., & Ammar Almomani. (2022). A Content and URL analysis based Efficient Approach to Detect Smishing SMS in Intelligent Systems. International Journal of Intelligent Systems, 1-25 Botnets Detecting. john Wiley and Sons Ltd, WOS(ISI&IF(9.34)-Scopus(Q1).

    • Khalid M.O. Nahar, Mohammad Alauthman, Saud Yonbawi ,Ammar Almomani . (2022), “Cyberbullying Detection and Recognition with Type Determination Based on Machine Learning”, Computers, Materials & Continua, Tech Science Press. WOS(ISI&IF(3.77)-Scopus(Q1).

    • Ammar Almomani, Mohammed Alweshah, Waleed Alomoush, Mohammad Alauthman Aseel Jabai, Anwar Abbass, Ghufran Hamad, Meral Abdallah,” A system of Classifying Voice Gender, Accent, and Age based on Adaptive Backpropagation and Bagging Algorithms”, Computers, Materials & Continua, Tech Science Press. WOS(ISI&IF(3.77)-Scopus(Q1).

    • Al Issa, H. A., Al-Jarah, M. H., Ammar Almomani, & Al-Nawasrah, A. (2022). Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm. International Journal of Cloud Applications and Computing (IJCAC), 12(1), 1-10.IGI, Scopus(Q4).

    • Ammar Almomani. (2022). Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms. Egyptian Informatics Journal, 1-12. Elsiver, WOS(ISI&IF(4.1)-Scopus(Q1).

    • Ammar Almomani., Alauthman, M., Taib' shatnawi, M., Alweshah, M., Alrosan, A., omosh, w., & Gupta, B. B. (2022). Phishing Website Detection with semantic features Based on Machine learning models: A Comparison Study. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-24. WOS(ISI&IF(1.5)-Scopus(Q1).

    • Ammar Almomani., Alweshah, M., Alomoush, W., Alauthman, M., Jabai, A., Abbass, A., Gupta, B. B. (2022). Age and Gender Classification Using Backpropagation and Bagging Algorithms. Computers, Materials & Continua, 1-19. Tech Science Press.WOS(ISI&IF(3.7)-Scopus(Q1).

    • Alweshah, M., Rababa, L., Ryalat, M. H., Al Momani, A., & Ababneh, M. F. (2022). African Buffalo algorithm: training the probabilistic neural network to solve classification problems. Journal of King Saud University-Computer and Information Sciences, 34(5), 1808-1818. Elsevier, WOS(ISI&IF(13.47)-Scopus(Q1).

    • Hu, B., Gaurav, A., Choi, C., & Ammar Almomani. (2022). evaluation and Comparative Analysis of Semantic Web-Based Strategies for enhancing educational System development. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-14. IGI – Global, WOS(ISI&IF(1.48)-Scopus(Q1).

    • Alieyan, K., Ammar Almomani., Abdullah, R., Almutairi, B., & Alauthman, M. (2021). Botnet and Internet of Things (IoTs): a definition, taxonomy, “challenges, and future directions. In Research Anthology on Combating Denial-of-Service Attacks (pp. 138-150): IGI Global.

    • Alieyan, K., Ammar Almomani., Anbar, M., Alauthman, M., Abdullah, R., & Gupta, B. B. (2021). DNS rule-based schema to botnet detection. Enterprise Information Systems, 15(4), 545-564. Taylor & Franceis Online, WOS(ISI&IF(2.2)-Scopus(Q1).

    • Ammar Almomani., Al-Nawasrah, A., Al-Abweh, M., & Gupta, B. B. (2021). Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems. Journal of Global Information Management (JGIM), 29(6). WOS(ISI&IF(3)-Scopus(Q1).

    • Ammar Almomani., Al-Nawasrah, A., Alauthman, M., Al-Betar, M. A., & Mezian, F. (2021). “Botnet Detection Used Fast-Flux Technique, Based on Adaptive Dynamic Evolving Spiking Neural Network Algorithm”. International Journal of Ad Hoc and Ubiquitous Computing. WOS(ISI&IF(0.7)-Scopus(Q3).

    • Al-Nawasrah, A., Ammar Almomani., Al_Issa, H. A., Almania, M. A., Alrosan, A., & gupta. (2021). Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System. Journal of Web Engineering, 21(2), 1-24. River Publishers, WOS(ISI&IF(0.7)-Scopus(Q3).

    • Alomoush, W., Alrosan, A., Ammar Almomani., Alissa, K., Khashan, O. A., & Al-Nawasrah., A. (2021). “Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation”. Int J Electr Comput Eng (IJECE), 11(5), 4050-4058. Scopus(Q2).

    • Alomoush, W., Alrosan, A., Alomari, Yazan M., Alomoush, Alaa A., Ammar Almomani., & Alamri, Hammoudeh S. (2021). Fully automatic grayscale image segmentation based fuzzy C means with firefly mate algorithm. Journal of Ambient Intelligence and Humanized Computing, 1-24. WOS(ISI&IF(7.1)-Scopus(Q1).

    • Al-Nawasrah, A., Ammar Almomani. A., Atawneh, S., & Alauthman, M. (2020). A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. International Journal of Cloud Applications and Computing, 10(3), 1-37. Scopus(Q4).

    • Alomoush, W., Omar, K., Alrosan, A., Alomari, Y. M., Albashish, D., & Ammar Almomani. (2020). Firefly photinus search algorithm. Journal of King Saud University-Computer and Information Sciences, 32(5), 599-607. Elsiver ,WOS(ISI&IF(13.6)-Scopus(Q1).

    • al-Qerem, A., Abutahoun, B., Nashwan, S., Shakhatreh, S., Alauthman, M., & Ammar Almomani. (2020). Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods. In Multimedia Cyber Security (pp. 1-14): IGI global.USA

    • Alrawashdeh, T. A., Elbes, M. W., Ammar Almomani., ElQirem, F., & Tamimi, A. (2020). User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT. Journal of Ambient Intelligence and Humanized Computing, 11(8), 3315-3327.

    • Alweshah, M., Al-Sendah, M., Dorgham, O. M., Ammar Almomani, & Tedmori2, S. (2020). “Improved water cycle algorithm with probabilistic neural network to solve classification problems”. Cluster Computing "The Journal of Networks, Software Tools and Applications, 1-16. WOS(ISI&IF(1.85)-Scopus(Q2).

    • Abutahoun, B. M., Nashwan, S. I., Shakhatreh, S., Alauthman, M., & Ammar Almomani(2020), “Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods”,IN Handbook of Research on Multimedia Cyber Security , IGI global

    • Alweshah, M., Khalaileh, S. A., Gupta, B. B., Ammar Almomani, Hammouri, A. I., & Al-Betar, M. A. (2020). “The monarch butterfly optimization algorithm for solving feature selection problems”. Neural Computing and Applications, 1-15. Springer-Verlag London, WOS(ISI&IF(4.2)-Scopus(Q1).

    • Ahmad, A.-Q., Mohammad, A., Ammar Almomani, , & B. B, G. (2019). “IoT transaction processing through cooperative concurrency control on fog–cloud computing environment”. Soft Computing, 1-17. Springer Nature, WOS(ISI&IF(2.4)-Scopus(Q2).

    • Alauthman, M., Ammar Almomani, A., Alweshah, M., Alomoush, W., & Alieyan, K. (2019). “Machine learning for phishing detection and mitigation”. In Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices (Vol. 1, pp. 275): CRC press Taylor and Frances group.

    • Ammar Almomani, Alauthman, M., Alweshah, M., Dorgham, O., & Albalas, F. (2019). A comparative study on spiking neural network encoding schema: implemented with cloud computing. Cluster Computing The Journal of Networks, Software Tools and Applications, 1-15. Springer, WOS(ISI&IF(1.6)-Scopus(Q2).

    • Ammar Almomani., ALAUTHMAN, M., ASLAM, N., DORGHAM, O., & AL-REFAI, M. (2019). “Botnet Behavior and Detection Techniques: A Review”. In Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives (Vol. 1, pp. 666): CRC press Taylor and Frances group.

    • Ammar Almomani., Al-Weshah, M., Al Khalayleh, S., Al-Refai, Mohammed, & Qashi, R. (2019). “Metaheuristic Algorithms Based Feature Selection Approach for Intrusion Detection”. In Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices (Vol. 1, pp. 275): CRC press Taylor and Frances group.

    • Alrawashed, T. A., Ammar Almomani., Althunibat, A., & Tamimi, A. (2019). “An automated approach to generate test cases from use case description model”. Computer Modeling in Engineering & Sciences, 119(3), 409-425. Tech Science Press WOS(ISI&IF(0.79)-Scopus(Q3).

    • Mohammed, A., Aram, A.-D., Azmi, A.-B. M., Ammar Almomani., & Saleh., O. (2019). “β -Hill climbing algorithm with probabilistic neural network for classification problems”. Journal of Ambient Intelligence and Humanized Computing, 3405–3416. Springer, WOS(ISI&IF(4.59)-Scopus(Q1).

    • Mohammed Al-Refai, Y. A. N., Mohammed Alauthman, Ammar Almomani, Mouhammd Al-Kasassbeh, & Alweshah, M. (2019). “A Novel Leader Election Algorithm For Honeycomb Meshnetworks”. Journal of Theoretical and Applied Information Technology, 97(14), 3783-3795. Scopus(Q3).

    • Mouhammd alkasassbeh , m. S., Mohammad Alauthman, Ammar Almomani. (2019). Feature Selection using a Machine Learning to Classify a Malware. In Computer Networks and Cyber Security: Principles and Paradigms: Springer Nature. Scopus.

    • Al-Betar, M. A., Awadallah, M. A., Khader, A. T., Bolaji, A. L. a., & Ammar Almomani, (2018). “Economic load dispatch problems with valve-point loading using natural updated harmony search”. Neural Computing and Applications, 29(10), 767-781. Springer, WOS(ISI&IF(5.6)-Scopus(Q1).

    • Ammar Almomani. (2018). “Fast-flux hunter: a system for filtering online fast-flux botnet”. Neural Computing and Applications, 29(7), 483-493. Springer, WOS(ISI&IF(5.6)-Scopus(Q1).

    • Ammar Almomani. (2018). An online intrusion detection system to cloud computing based on NeuCube algorithms. International Journal of Cloud Applications and Computing (IJCAC), 8(2), 96–112. IGI, Scopus(Q3).

    • Dorgham, O., Al-Rahamneh, B., Ammar Almomani., & Khatatneh, K. F. (2018). Enhancing the security of exchanging and storing DICOM medical images on the cloud. International Journal of Cloud Applications and Computing (IJCAC), 8(1), 154-172. IGI, Scopus(Q3).

    • Firas Albalas, M. A.-S., Omar Almomani, Ammar Almomani. (2018). Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-curve cryptography. The International Arab Journal of Information Technology, 15(3A), 550-558. WOS(ISI&IF(0.76)-Scopus(Q2).

    • Waleed Alomoush, A. A., Norita Norwawi, Yazan Alomari, Dheeb Albashish, Ammar Almomani, Mohammed Alqahtani. (2018). A Survey: Challenges Of Image Segmentation Based Fuzzy C-Means Clustering Algorithm. Journal Of Theoretical And Applied Information Technology, 96(16), 1817-3195. Scopus(Q3).

    • Alieyan, K., Ammar Almomani, Manasrah, A., & Kadhum, M. M. (2017). “A survey of botnet detection based on DNS”. Neural Computing and Applications, 28(7), 1541-1558. Springer, WOS(ISI&IF(5.5)-Scopus(Q1).

    • Atawneh, S., Ammar Almomani., Bazar, H. A., Sumar, P., & Gupta ., B. (2017). Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimedia Tools and Applications, 76(18), 18451–18472, springer, WOS(ISI&IF(1.5)-Scopus(Q1).

    • Manasrah, A. M., Smadi, T., & Ammar Almomani. (2017). A variable service broker routing policy for data center selection in cloud analyst. Journal of King Saud University-Computer and Information Sciences, 29(3), 365-377, Elsiver, WOS(ISI&IF(16.65)-Scopus(Q1).

    • Ammar Almomani, A. O., Karim Alsaedi. (2015). “Spam E-mail Filtering using ECOS Algorithms”. Indian Journal of Science and Technology, 8(s9), 256-268. Scopus(Q1).

    • Al-Hazaimeh, O. M., Alhindawi, N., Hayajneh, S. M. A., & Ammar Almomani. (2014). HANON Chaotic Map -Based New Digital Image Encryption Algorithm. MAGNT Research Report, 2(4), 261-266. WOS(ISI)

    • Ammar Almomani. (2014). Dynamic Evolving Neural Fuzzy Framework for phishing E-mail detection. In: Scholars' Press. ISBN-13:978-3-639-66970-1,ISBN-10:3639669703, pages: 180,ACM,BOOK

    • Ammar Almomani, E. A., & et al. (2014). A Framework of Childhood Obesity Intervention Using Persuasive Mobile Game Technology. Australian Journal of Basic and Applied Sciences, 8(7), 499-509. WOS(ISI)

    • Kwafha, M. M., Al-Betar, M. A., Ammar Almomani., Alkoffash, M., & Jaradat, A. (2014). A Novel Model for Global Schema Integration and Optimization. MAGNT Research Report, 2(4), 470-475. WOS(ISI) .

    • Saad, R. M., Ammar Almomani., Altaher, A., Gupta, B., & Manickam, S. (2014). ICMPv6 flood attack detection using DENFIS algorithms. Indian Journal of Science and Technology, 7(2), 168. Scopus(Q1).

    • Ammar Almomani., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). “A survey of phishing email filtering techniques”. IEEE Communications Surveys & Tutorials, 15(4), 2070-2090. WOS(ISI&IF(25.5)-Scopus(Q1).

    • Ammar Almomani., Gupta, B. B., Wan, T.-C., Altaher, A., & Manickam, S. (2013). “Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email”. arXiv preprint arXiv:1302.0629. WOS(ISI)-Scopus(Q4).

    • Al-Saedi, K., Manickam, S., Ramadass, S., Al-Salihy, W., & Ammar Almomani. (2013). Research proposal: an intrusion detection system alert reduction and assessment framework based on data mining. Journal of Computer Science, 9(4), 421. Scopus (Q3).

    • Ammar Almomani, & et al. (2013). An enhanced online phishing e-mail detection framework based on “Evolving connectionist system". International Journal of Innovative Computing, Information and Control (IJICIC), 9(3). Scopus(Q4).

    • Anbar, M., Manasrah, A., Ramadass, S., Altaher, A., Aljmmal, A., & Ammar Almomani. (2013). Investigating study on network scanning techniques. International Journal of Digital Content Technology and its Applications, 7(9), 312. Scopus(Q4).

    • Atawneh, S., Ammar Almomani., & Sumari, P. (2013). Steganography in digital images: Common approaches and tools. IETE Technical Review, 30(4), 344-358. TAYLOR & FRANCIS LTD, WOS(ISI&IF(1.5)-Scopus(Q2).

    • Baklizi, M., Abdel-Jaber, H., Abu-Alhaj, M. M., Abdullah, N., Ramadass, S., & Ammar Almomani. (2013). Dynamic stochastic early discovery: a new congestion control technique to improve networks performance. International Journal of Innovative Computing, Information and Control, 9(3), 1118-1126. WOS(ISI&IF(1.7)-Scopus(Q2).

    • Chhabra, M., Gupta, B., & Ammar Almomani. (2013). A novel solution to handle DDOS attack in MANET.

    • Tripathi, S., Gupta, B., Ammar Almomani., Mishra, A., & Veluru, S. (2013). Hadoop based defense solution to handle distributed denial of service (ddos) attacks. EBESCO, CiteSeerX

    • Ammar Almomani, Wan, T.-C., Altaher, A., Manasrah, A., ALmomani, E., Anbar, M., Ramadass, S. (2012). Evolving fuzzy neural network for phishing emails detection. Journal of Computer Science, 8(7), 1099. Scopus(Q3).

    • Ammar Almomani., Wan, T.-C., Manasrah, A., Altaher, A., Almomani, E., Al-Saedi, K., Ramadass, S. (2012). A survey of learning based techniques of phishing email filtering. International Journal of Digital Content Technology and its Applications, 6(18), 119. Scopus(Q3).

    • Al-Saedi, K. H., Ramadass, S., Ammar Almomani., Manickam, S., & Alsalihy, W. (2012). Collection mechanism and reduction of IDS alert. International Journal of Computer Applications, 975, 8887. EBSCO, ProQuest.

    • Altaher, A., Ammar Almomani., & Ramadass, S. (2012). Application of adaptive neuro-fuzzy inference system for information secuirty. Journal of Computer Science, 8(6), 983. Scopus(Q3).

    • Altaher, A., Ramadass, S., & Ammar Almomani. (2012). An intelligent soft approach for malware detection in dual stack IPV4/IPv6 networks. International Journal of Physical Sciences, 7(10), 1607 - 1612. WOS(ISI&IF(0.45)

    • Altaher, A., Ramadass, S., Meulenberg, A., Abdat, M., & Ammar Almomani. (2012). Combined Behavior-and Signature-Based Internet Worm Detection System. International Information Institute (Tokyo). Information, 15(10), 4213. WOS(ISI&IF(0.06)-Scopus(Q3).

    • Altyeb Altaher, S., Ammar Almomani, Mohammed Anbar, & Ramadass, S. (2012). Malware Detection Based on Evolving Clustering Method for Classification. Scientific Research and Essays, 7(22), 2031-2036. WOS(ISI&IF(0.45)-Scopus(Q4).

    • Altaher, A., Ramadass, S., Ammar Almomani. (2011). Computer virus detection using features ranking and machine learning. Australian Journal of Basic and Applied Sciences, 5(9), 1482-1486. WOS(ISI)-Scopus(Q3).

    • Ammar Almomani, & et al. (2011). An Online Model on Evolving Phishing E-mail Detection and Classification Method. journal of applied science, 11(11), 3301-3307. WOS(ISI)-Scopus(Q2).

    • Anbar, M., Manickam, S., Hosam, A.-S., Chai, K.-S., Baklizi, M., & Ammar Almomani. (2011). “Behaviour based worm detection and signature automation”. Journal of Computer Science, 7(11), 1724. Scopus(Q3).

    • Ramadass, S. Ammar Almomani (2011). An approach to assessment of network worm detection using threatening-database mining. Australian Journal of Basic and Applied Sciences, 5(12), 2676-2683. WOS(ISI)-Scopus(Q3).

     

     

  • Conferences

    • Bashar Igried, Ayoub Alsarhan, Mohammad Alauthman, Ammar Almomani , Machine learning scheme for Managing Virtual Computing Resources in Cloud Market, International Arab Conference on Information Technology (ACIT'2022), Al- Ain University, UAE, November 22-24, 2022.IEEE,
    • A shraf mashaleh, Noor Farizah, mohammed Alauthman,Ammar Almomani, A proposed framework for early detection IOT botnet, International Arab Conference on Information Technology (ACIT'2022),AL-AIN university.UAE NOV 22-24, SCOPUS, ACIT'2022 will be held in Al Ain University – Abu Dhabi Campus in the period of 22nd - 24th November 2022.
    • Ghassan samara,Ammar Almomani, Mohammad Alauthman,Mohammad alkasassbeh,Energy efficiency wireless sensor network protocol: A survey,ACIT 2022,AL-AIN university.UAE NOV 22-24,

    ACIT'2022 will be held in Al Ain University – Abu Dhabi Campus in the period of 22nd - 24th November 2022

    • Ammar Almomani, Alauthman, M., Alkasassbeh, M., Samara, G., & Liu, R. W. (2022). A proposed Darknet Traffic Classification System Based on Max Voting algorithms. Paper presented at the ICSPN-2022: International Conference on Cyber Security, Privacy and Networking.
    • Dorgham, O., Abu Nasser, M., Ryalat, M., & Ammar Almomani.. Proposed Method for an Automatic Segmentation of Medical Images. Paper presented at the The 19th International Arab Conference on Information Technology (ACIT'2018).
    • Alieyan, K., Anbar, M., Ammar Almomani., Abdullah, R., & Alauthman, M. (2018). “Botnets Detecting attack based on DNS features. Paper presented at the The 19th International Arab Conference on Information Technology (ACIT'2018).
    • Alieyan, K., Ammar Almomani, Abdullah, R., & Anbar, M. (2018). A rule-based approach to detect botnets based on DNS. Paper presented at the 2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE).
    • Ammar Almomani, M. A., Omar almomani, Firas Albalas. (2017). A proposed framework for Botnet Spam-email Filtering using Neucube. Paper presented at the The International Arab Conference on Information Technology (ACIT) publisher; IEEE.
    • Fi rasAlbalas, A., Omar, Al-Soud, M., & Ammar Almomani. (2017). Secure and Energy-effictive CoAP Application Layer Protocol for the Internet of Things. Power (mw), 1333, 151.
    • Ammar Almomani, E., Husain, W., San, O. Y., Almomani, A., & Al-Betar, M. (2014). Mobile game approach to prevent childhood obesity using persuasive technology. Paper presented at the 2014 International Conference on Computer and Information Sciences (ICCOINS).
    • Altaher, A., Ramadass, S., & Ammar Almomani. (2011). A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks. Paper presented at the 2011 IEEE International Conference on Control System, Computing and Engineering.
    • Altaher, A., Ramadass, S., & Ammar Almomani. (2011). Real time network anomaly detection using relative entropy. Paper presented at the 8th International Conference on High-capacity Optical Networks and Emerging Technologies.

Latest Updates

Image
Image
Image
Image
Image
Image

Main campus

Open on location Google Map