|
عنوان البحث |
المؤلفون |
المجلة العلمية |
تاريخ النشر |
رقم الصفحة والعدد |
الرابط |
| 1 |
Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments |
Najla Al-Taleb and Nazar Abbas Saqib |
Applied Sciences |
2022 |
12(4)-16 |
رابط الورقة |
| 2 |
A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network |
Attique Ur Rehman, Muhammad Sajid Mahmood, Shoaib Zafar,Muhammad Ahsan Raza,Fahad Qaswar, Sumayh S. Aljameel, IrfanUllah Khan and Nida Aslam |
Electronics |
2022 |
11(16)-19 |
رابط الورقة |
| 3 |
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms |
Iman Almomani, Walid El-Shafai, Aala AlKhayer , Albandari Alsumayt, Sumayh S.Aljameel and Khalid Alissa |
Computers, Materials & Continua |
2022 |
74(2)-13 |
رابط الورقة |
| 4 |
An Empirical Study of Mobile Commerce and Customer Security Perception in Saudi Arabia |
Hina Gull, Saqib Saeed, Sardar Zafar Iqbal, Yasser A. Bamarouf,Mohammed Alqahtani, Dina A. Alabbad, Madeeha Saqib, Saeed Hussein Al-Qahtani, Albandary Mohammad Alamer |
Electronics |
2022 |
11(3)-20 |
رابط الورقة |
| 5 |
Data Protection and Privacy in the Internet of Healthcare Things (IoHTs) |
Jahanzeb Shahid, Rizwan Ahmad, Adnan K Kiani, Tahir Ahmad, Saqib Saeed, Abdullah Almuhaideb |
Applied Sciences |
2022 |
12(4)-22 |
رابط الورقة |
| 6 |
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs |
Zeeshan Zulkifl, Fawad Khan, Shahzaib Tahir, Mehreen Afzal, Waseem Iqbal, AbdulRehman, Saqib Saeed, Abdullah M Almuhaideb |
IEEE |
2022 |
10–13 |
رابط الورقة |
| 7 |
AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Models |
Ilham Elaalami, Sunday Olatunji, Rachid Zagrouba |
Applied Sciences |
2022 |
12(4)-23 |
رابط الورقة |
| 8 |
ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques |
Fahd A. Alhaidari, Nouran S. Abu Shaib, Maram A. Alsafi, Haneen A. Alharbi, Majd R. Alawami, Reem M. Aljindan,Rachid Zagrouba, and Atta-ur-Rahman |
Computational Intelligence and Neuroscience |
2022 |
2022-15 |
رابط الورقة |
| 9 |
Spam and Sentiment Detection in Arabic Tweets Using MarBert Model |
Abrar Alotaibi, Atta-ur Rahman, Raheel Alhaza, Wala Alkhalifa, Narjes Alhajjaj,Atheer Alharthi, Dhai Abushoumi, Maryam Alqahtani, Dania Alkhulaifi |
Mathematical Modelling of Engineering Problems |
2022 |
9(6)-9 |
رابط الورقة |
| 10 |
Getting smarter about smart cities: Improving data security and privacy through legal compliance |
Mudassar Aslam; Muhammad Abbas Khan Abbasi; Tauqeer Khalid; Rafi us Shan; Subhan Ullah; Tahir Ahmad; Saqib Saeed; Dina A. Alabbad; Rizwan Ahmad |
Sensors |
2022 |
22(23)-24 |
رابط الورقة |
| 11 |
Classification of Firewall Log Data Using Multiclass Machine Learning Models |
Malak Aljabri , Amal A. Alahmadi, Rami Mustafa A. Mohammad, Menna Aboulnour, Dorieh M. Alomari and Sultan H. Almotiri |
Electronics |
2022 |
11(12)-17 |
رابط الورقة |
| 12 |
An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models |
Malak Aljabri, Fahd Alhaidari, Rami Mustafa A. Mohammad, Samiha Mirza, Dina H. Alhamed, Hanan S. Altamimi, and Sara Mhd. Bachar Chrouf |
Computational Intelligence and Neuroscience |
2022 |
2022-14 |
رابط الورقة |
| 13 |
Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions |
Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, Maimunah AL-Harbi, Haya T.Alhuraib, Najd K. Alotaibi, Amal A. Alahmadi, Fahd Alhaidari, Rami Mustafa A.Mohammad, and Khaled Salah |
IEEE |
2022 |
10-23 |
رابط الورقة |
| 14 |
AI-based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions |
Reem A. Alzahran and Malak Aljabri |
Journal of Sensor and Actuator Networks |
2022 |
12(1)-50 |
رابط الورقة |
| 15 |
A Proactive Attack Detection for Heating, Ventilation, and Air Conditioning (HVAC) System Using Explainable Extreme Gradient Boosting Model (XGBoost) |
Irfan Ullah Khan, Nida Aslam, Alhawra Al Safwan, Noura A AlShuail, Dina AlFrayan, Rana AlShedayed, Rand AlEssa |
Sensors |
2022 |
22(23)-19 |
رابط الورقة |
| 16 |
Interpretable Machine Learning Models for Malicious Domains Detection Using Explainable Artificial Intelligence (XAI) |
Nida Aslam, Irfan Ullah Khan Samiha Mirza, Alanoud AlOwayed, Fatima M. Anis, Reef M. Aljuaid and Reham Baageel |
Sustainability |
2022 |
14(12)-22 |
رابط الورقة |
| 17 |
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks |
Maria Hanif, Humaira Ashraf, Zakia Jalil, Noor Zaman Jhanjhi, Mamoona Humayun, Saqib Saeed and Abdullah M. Almuhaideb |
Electronics |
2022 |
11(15)-28 |
رابط الورقة |
| 18 |
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine |
Yasir Iqbal, Shahzaib Tahir, Hasan Tahir, Fawad Khan, Saqib Saeed, Abdullah M. Almuhaideb and Adeel M. Syed |
Sensors |
2022 |
22(12)-19 |
رابط الورقة |
| 19 |
Applications of Artificial Intelligence to Detect Android Botnets: A Survey |
Abdullah M. Almuhaideb and Dalal Y. Alynanbaawi |
IEEE |
2022 |
45576 |
رابط الورقة |
| 20 |
Profile aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces |
Mohib Ullah, Rafi Ullah Khan, Irfan Ullah Khan, Nida Aslam, Sumayh S. Aljameel, Muhammad Inam Ul Haq, Muhammad Arshad Islam |
Security and Communication Networks |
2022 |
2022-13 |
رابط الورقة |
| 21 |
Applications of Artificial Intelligence to Detect Android Botnets |
Abdullah M. Almuhaideb and Dalal Y. Alyanbaawi |
IEEE |
2022 |
10-12 |
رابط الورقة |
| 22 |
Efficient privacy-preserving and secure authentication for electric vehicle charging system based on blockchain |
Abdullah M. Almuhaideb and Sammar S. Algothami |
Journal of Sensor and Actuator Networks |
2022 |
11(2)-26 |
رابط الورقة |
| 23 |
Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment |
Abdullah M. Almuhaideb and Huda Alghamdi |
Big Data and Cognitive Computin |
2022 |
6(4)-30 |
رابط الورقة |
| 24 |
Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems |
Fatma S Alrayes, Saud S Alotaibi, Khalid A Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen, Abdelwahed Motwakel |
Drones |
2022 |
6(9)-18 |
رابط الورقة |
| 25 |
Homoglyph Attack Detection Model Using Machine Learning and Hash Function |
Abdullah M. Almuhaideb, Nida Aslam, Almaha Alabdullatif, Sarah Altamimi, Shooq Alothman, Amnah Alhussain, Waad Aldosari, Shikah J. Alsunaidi and Khalid A. Alissa |
Journal of Sensor and Actuator Networks |
2022 |
11(3)-18 |
رابط الورقة |
| 26 |
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms |
Iman Almomani, Walid El-Shafai, Aala AlKhayer, Albandari Alsumayt, Sumayh S. Aljameel, and Khalid Alissa |
Computers, Materials & Continua |
2022 |
74(2)-23 |
رابط الورقة |
| 27 |
Efficient Privacy-Preserving and Secure Authentication for Electric- Vehicle-to-Electric-Vehicle-Charging System Based on ECQV |
Abdullah M. Almuhaideb and Sammar S. Algothami |
Journal of Sensor and Actuator Networks |
2022 |
11(2)-26 |
رابط الورقة |
| 28 |
Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier |
Abdullah Almuhaideb and Huda Alghamdi |
Journal of Sensor and Actuator Networks |
2022 |
11(3)-27 |
رابط الورقة |
| 29 |
Quantum Image Steganography Schemes for Data Hiding: A Survey |
Nasro Min Allah, Naya Nagy, Malak Aljabri, Mariam Alkharraa, Mashael |
Applied Sciences |
2022 |
12(20)-18 |
رابط الورقة |