default search action
Bahari Belaton
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton:
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things. Clust. Comput. 27(9): 12141-12184 (2024) - 2023
- [j15]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Abdullah Ahmed Bahashwan, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh, Ghada Al-Mukhaini:
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things. Internet Things 22: 100741 (2023) - 2022
- [j14]Muhammad Ubale Kiru, Bahari Belaton, Xinying Chew, Khaled Hatem Almotairi, Ahmad MohdAziz Hussein, Maryam Aminu:
Comparative analysis of some selected generative adversarial network models for image augmentation: a case study of COVID-19 x-ray and CT images. J. Intell. Fuzzy Syst. 43(6): 7153-7172 (2022) - [j13]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Iznan Husainy Hasbullah, Ziyad R. Alashhab:
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things. Sensors 22(9): 3400 (2022) - [j12]Manal Al-rawashdeh, Pantea Keikhosrokiani, Bahari Belaton, Moatsum Alawida, Abdalwhab Zwiri:
IoT Adoption and Application for Smart Healthcare: A Systematic Review. Sensors 22(14): 5377 (2022) - [j11]Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Bahari Belaton, Taief Alaa Alamiedy, Iznan Husainy Hasbullah:
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection. Symmetry 14(12): 2556 (2022) - 2021
- [j10]Nachaat Mohamed, Bahari Belaton:
SBI Model for the Detection of Advanced Persistent Threat Based on Strange Behavior of Using Credential Dumping Technique. IEEE Access 9: 42919-42932 (2021) - [j9]Ali Fawzi, Anusha Achuthan, Bahari Belaton:
Adaptive Clip Limit Tile Size Histogram Equalization for Non-Homogenized Intensity Images. IEEE Access 9: 164466-164492 (2021) - [c31]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer:
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. ACeS 2021: 340-360 - 2020
- [j8]Mohammad Tayyab, Bahari Belaton, Mohammed Anbar:
ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review. IEEE Access 8: 170529-170547 (2020) - [j7]Joi San Tan, Iman Yi Liao, Ibrahim Venkat, Bahari Belaton, P. T. Jayaprakash:
Computer-aided superimposition via reconstructing and matching 3D faces to 3D skulls for forensic craniofacial identifications. Vis. Comput. 36(9): 1739-1753 (2020)
2010 – 2019
- 2019
- [j6]Omar E. Elejla, Mohammed Anbar, Bahari Belaton, Shady Hamouda:
Labeled flow-based dataset of ICMPv6-based DDoS attacks. Neural Comput. Appl. 31(8): 3629-3646 (2019) - 2018
- [j5]Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Ahmad Alnajjar:
Intrusion Detection Systems of ICMPv6-based DDoS attacks. Neural Comput. Appl. 30(1): 45-56 (2018) - [c30]J. Joshua Thomas, Bahari Belaton, Ahamad Tajudin Khader, Justtina:
Visual Analytics Solution for Scheduling Processing Phases. ICO 2018: 395-408 - 2017
- [c29]Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Basem O. Alijla:
IPv6 OS Fingerprinting Methods: Review. IVIC 2017: 661-668 - 2015
- [j4]Junfen Chen, Iman Yi Liao, Bahari Belaton, Munir Zaman:
Division-based large point set registration using coherent point drift (CPD) with automatic parameter tuning. J. Intell. Fuzzy Syst. 28(5): 2297-2308 (2015) - [j3]Junfen Chen, Iman Yi Liao, Bahari Belaton, Munir Zaman:
A neural network-based point registration method for 3D rigid face image. World Wide Web 18(2): 197-214 (2015) - [c28]Joi San Tan, Ibrahim Venkat, Bahari Belaton:
An Analytical Curvature B-Spline Algorithm for Effective Curve Modeling. IVIC 2015: 283-295 - [c27]Ashraf Y. A. Maghari, Iman Yi Liao, Ibrahim Venkat, Bahari Belaton:
Distance-Based 3D Face Reconstruction Using Regularization. IVIC 2015: 476-493 - [c26]J. Joshua Thomas, Ahamad Tajudin Khader, Bahari Belaton:
SpaceViz: Visualization Tool for the Computer Storage Big-Data. SmartCity 2015: 882-885 - [i1]Aymen Hasan Rashid Al Awadi, Bahari Belaton:
Multi-phase IRC Botnet and Botnet Behavior Detection Model. CoRR abs/1501.03241 (2015) - 2014
- [j2]Ashraf Y. A. Maghari, Ibrahim Venkat, Iman Yi Liao, Bahari Belaton:
Adaptive face modelling for reconstructing 3D face shapes from single 2D images. IET Comput. Vis. 8(5): 441-454 (2014) - [c25]Junfen Chen, Munir Zaman, Iman Yi Liao, Bahari Belaton:
Bi-Stage Large Point Set Registration Using Gaussian Mixture Models. ACCV (5) 2014: 210-225 - [c24]Junfen Chen, Bahari Belaton:
An Improved Iterative Closest Point Algorithm for Rigid Point Registration. ICMLC (CCIS volume) 2014: 255-263 - 2013
- [c23]Ashraf Y. A. Maghari, Ibrahim Venkat, Iman Yi Liao, Bahari Belaton:
Effect of Training Sample on Reconstructing 3D Face Shapes from Feature Points. IAIT 2013: 131-140 - [c22]Waheed Ali H. M. Ghanem, Bahari Belaton:
Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework. ICCSCE 2013: 403-407 - [c21]Junfen Chen, Bahari Belaton, Pan Zheng:
A Robust Subset-ICP Method for Point Set Registration. IVIC 2013: 59-69 - [c20]Ashraf Y. A. Maghari, Ibrahim Venkat, Iman Yi Liao, Bahari Belaton:
Reconstructing 3D Face Shapes from Single 2D Images Using an Adaptive Deformation Model. IVIC 2013: 300-310 - 2012
- [c19]Arash Azim Zadeh Irani, Bahari Belaton:
An Automated Adaption of K-means Based Hybrid Segmentation System into Direct Volume Rendering Object Distinction Mode for Enhanced Visualization Effect. CGIV 2012: 62-69 - [c18]Ashraf Y. A. Maghari, Iman Yi Liao, Bahari Belaton:
Quantitative analysis on PCA-based statistical 3D face shape modeling. CompIMAGE 2012: 13-18 - [c17]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton, Choy Chee Ken:
Integrated Problem Solving Steering Framework on Clash Reconciliation Strategies for University Examination Timetabling Problem. ICONIP (4) 2012: 297-304 - [c16]Ashraf Y. A. Maghari, Iman Yi Liao, Bahari Belaton:
Effect of Facial Feature Points Selection on 3D Face Shape Reconstruction Using Regularization. ICONIP (5) 2012: 516-524 - 2011
- [c15]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton:
A Parallel Coordinates Visualization for the Uncapaciated Examination Timetabling Problem. IVIC (1) 2011: 87-98 - [c14]Pan Zheng, Bahari Belaton, Iman Yi Liao, Zainul Ahmad Rajion:
The Gradient of the Maximal Curvature Estimation for Crest Lines Extraction. IVIC (1) 2011: 196-205 - [c13]Wan Mohd Nazmee Wan Zainon, Abdullah Zawawi Talib, Bahari Belaton:
A New Framework for Phylogenetic Tree Visualization. IVIC (2) 2011: 348-359 - [c12]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton, Amy Leow:
Exploration of Rough Sets Analysis in Real-World Examination Timetabling Problem Instances. ICSI (2) 2011: 173-182 - 2010
- [j1]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton, Amy Leow:
VIZSolution: An Interface Tool to Solve Real-world Examination Timetabling Problem. Int. J. Adv. Comp. Techn. 2(5): 80-88 (2010)
2000 – 2009
- 2009
- [c11]Arash Azim Zadeh Irani, Bahari Belaton:
A K-means Based Generic Segmentation System. CGIV 2009: 300-307 - [c10]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton:
Visualization Techniques on the Examination Timetabling Pre-processing Data. CGIV 2009: 454-458 - [c9]Iman Yi Liao, Pan Zheng, Bahari Belaton:
Skull Registration Using Rigid Super-Curves. CGIV 2009: 475-479 - [c8]Pan Zheng, Bahari Belaton, Iman Yi Liao:
Isosurface Extraction of Volumetric Data Using Implicit Surface Polygonization. Asia International Conference on Modelling and Simulation 2009: 555-559 - [c7]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton:
Visualization of Preprocess Data in the Examination Timetabling Problem. CSIE (3) 2009: 264-268 - [c6]Ding Choo Sheong, Bahari Belaton:
Estimating Extremal Planes to Extract Crest Lines from Volumetric Data. IVIC 2009: 748-758 - [c5]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton:
Information visualization Approach on the University Examination Timetabling Problem. VINCI 2009: 255-264 - 2008
- [c4]J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton:
A Visual Analytics Framework for the Examination Timetabling Problem. CGIV 2008: 305-310 - 2006
- [c3]Nordin Zakaria, Bahari Belaton, Abdullah Zawawi Talib:
Simple and fast ray tracing of point-based geometry. GRAPP 2006: 293-298 - 2005
- [c2]Najwa A. Bakar, Bahari Belaton:
Towards Implementing Intrusion Alert Quality Framework. DFMA 2005: 198-205 - [c1]Mohd Bazli Ab Karim, Abdullah Zawawi Talib, Ahmad Izani Md. Ismail, Bahari Belaton:
A Crowd Model for Emergency and Panic Situations: Structure, Characteristics and Behaviours. PRIMA 2005: 178-191
Coauthor Index
aka: Ahamad Tajudin Khader
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint