الأبحاث العلمية المنشورة في عام 2022
| عنوان البحث | المؤلفون | المجلة العلمية | تاريخ النشر | رقم الصفحة والعدد | الرابط | |
| 1 | Network Anomaly Detection in 5G Networks | Atta-ur Rahman, Maqsood Mahmud, Tahir Iqbal, Linah Saraireh, Hisham Kholidy, Mohammed Gollapalli, Dhiaa Musleh, Fahd Alhaidari, Dakheel Almoqbil, Mohammed Imran Basheer Ahmed | Mathematical Modelling of Engineering Problems | 2022 | 9(2)-8 | رابط الورقة |
| 2 | Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments | Najla Al-Taleb and Nazar Abbas Saqib | Applied Sciences | 2022 | 12(4)-16 | رابط الورقة |
| 3 | A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network | Attique Ur Rehman, Muhammad Sajid Mahmood, Shoaib Zafar,Muhammad Ahsan Raza,Fahad Qaswar, Sumayh S. Aljameel, IrfanUllah Khan and Nida Aslam | Electronics | 2022 | 11(16)-19 | رابط الورقة |
| 4 | Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms | Iman Almomani, Walid El-Shafai, Aala AlKhayer , Albandari Alsumayt, Sumayh S.Aljameel and Khalid Alissa | Computers, Materials & Continua | 2022 | 74(2)-13 | رابط الورقة |
| 5 | An Empirical Study of Mobile Commerce and Customer Security Perception in Saudi Arabia | Hina Gull, Saqib Saeed, Sardar Zafar Iqbal, Yasser A. Bamarouf,Mohammed Alqahtani, Dina A. Alabbad, Madeeha Saqib, Saeed Hussein Al-Qahtani, Albandary Mohammad Alamer | Electronics | 2022 | 11(3)-20 | رابط الورقة |
| 6 | Data Protection and Privacy in the Internet of Healthcare Things (IoHTs) | Jahanzeb Shahid, Rizwan Ahmad, Adnan K Kiani, Tahir Ahmad, Saqib Saeed, Abdullah Almuhaideb | Applied Sciences | 2022 | 12(4)-22 | رابط الورقة |
| 7 | FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs | Zeeshan Zulkifl, Fawad Khan, Shahzaib Tahir, Mehreen Afzal, Waseem Iqbal, AbdulRehman, Saqib Saeed, Abdullah M Almuhaideb | IEEE | 2022 | 10–13 | رابط الورقة |
| 8 | AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Models | Ilham Elaalami, Sunday Olatunji, Rachid Zagrouba | Applied Sciences | 2022 | 12(4)-23 | رابط الورقة |
| 9 | ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques | Fahd A. Alhaidari, Nouran S. Abu Shaib, Maram A. Alsafi, Haneen A. Alharbi, Majd R. Alawami, Reem M. Aljindan,Rachid Zagrouba, and Atta-ur-Rahman | Computational Intelligence and Neuroscience | 2022 | 2022-15 | رابط الورقة |
| 10 | Spam and Sentiment Detection in Arabic Tweets Using MarBert Model | Abrar Alotaibi, Atta-ur Rahman, Raheel Alhaza, Wala Alkhalifa, Narjes Alhajjaj,Atheer Alharthi, Dhai Abushoumi, Maryam Alqahtani, Dania Alkhulaifi | Mathematical Modelling of Engineering Problems | 2022 | 9(6)-9 | رابط الورقة |
| 11 | Getting smarter about smart cities: Improving data security and privacy through legal compliance | Mudassar Aslam; Muhammad Abbas Khan Abbasi; Tauqeer Khalid; Rafi us Shan; Subhan Ullah; Tahir Ahmad; Saqib Saeed; Dina A. Alabbad; Rizwan Ahmad | Sensors | 2022 | 22(23)-24 | رابط الورقة |
| 12 | Classification of Firewall Log Data Using Multiclass Machine Learning Models | Malak Aljabri , Amal A. Alahmadi, Rami Mustafa A. Mohammad, Menna Aboulnour, Dorieh M. Alomari and Sultan H. Almotiri | Electronics | 2022 | 11(12)-17 | رابط الورقة |
| 13 | An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models | Malak Aljabri, Fahd Alhaidari, Rami Mustafa A. Mohammad, Samiha Mirza, Dina H. Alhamed, Hanan S. Altamimi, and Sara Mhd. Bachar Chrouf | Computational Intelligence and Neuroscience | 2022 | 2022-14 | رابط الورقة |
| 14 | Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions | Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, Maimunah AL-Harbi, Haya T.Alhuraib, Najd K. Alotaibi, Amal A. Alahmadi, Fahd Alhaidari, Rami Mustafa A.Mohammad, and Khaled Salah | IEEE | 2022 | 10-23 | رابط الورقة |
| 15 | AI-based Techniques for Ad Click Fraud Detection and Prevention: Review and Research Directions | Reem A. Alzahran and Malak Aljabri | Journal of Sensor and Actuator Networks | 2022 | 12(1)-50 | رابط الورقة |
| 16 | A Proactive Attack Detection for Heating, Ventilation, and Air Conditioning (HVAC) System Using Explainable Extreme Gradient Boosting Model (XGBoost) | Irfan Ullah Khan, Nida Aslam, Alhawra Al Safwan, Noura A AlShuail, Dina AlFrayan, Rana AlShedayed, Rand AlEssa | Sensors | 2022 | 22(23)-19 | رابط الورقة |
| 17 | Interpretable Machine Learning Models for Malicious Domains Detection Using Explainable Artificial Intelligence (XAI) | Nida Aslam, Irfan Ullah Khan Samiha Mirza, Alanoud AlOwayed, Fatima M. Anis, Reef M. Aljuaid and Reham Baageel | Sustainability | 2022 | 14(12)-22 | رابط الورقة |
| 18 | AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks | Maria Hanif, Humaira Ashraf, Zakia Jalil, Noor Zaman Jhanjhi, Mamoona Humayun, Saqib Saeed and Abdullah M. Almuhaideb | Electronics | 2022 | 11(15)-28 | رابط الورقة |
| 19 | A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine | Yasir Iqbal, Shahzaib Tahir, Hasan Tahir, Fawad Khan, Saqib Saeed, Abdullah M. Almuhaideb and Adeel M. Syed | Sensors | 2022 | 22(12)-19 | رابط الورقة |
| 20 | Applications of Artificial Intelligence to Detect Android Botnets: A Survey | Abdullah M. Almuhaideb and Dalal Y. Alynanbaawi | IEEE | 2022 | 45576 | رابط الورقة |
| 21 | Profile aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces | Mohib Ullah, Rafi Ullah Khan, Irfan Ullah Khan, Nida Aslam, Sumayh S. Aljameel, Muhammad Inam Ul Haq, Muhammad Arshad Islam | Security and Communication Networks | 2022 | 2022-13 | رابط الورقة |
| 22 | Applications of Artificial Intelligence to Detect Android Botnets | Abdullah M. Almuhaideb and Dalal Y. Alyanbaawi | IEEE | 2022 | 10-12 | رابط الورقة |
| 23 | Efficient privacy-preserving and secure authentication for electric vehicle charging system based on blockchain | Abdullah M. Almuhaideb and Sammar S. Algothami | Journal of Sensor and Actuator Networks | 2022 | 11(2)-26 | رابط الورقة |
| 24 | Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment | Abdullah M. Almuhaideb and Huda Alghamdi | Big Data and Cognitive Computin | 2022 | 6(4)-30 | رابط الورقة |
| 25 | Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems | Fatma S Alrayes, Saud S Alotaibi, Khalid A Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen, Abdelwahed Motwakel | Drones | 2022 | 6(9)-18 | رابط الورقة |
| 26 | Homoglyph Attack Detection Model Using Machine Learning and Hash Function | Abdullah M. Almuhaideb, Nida Aslam, Almaha Alabdullatif, Sarah Altamimi, Shooq Alothman, Amnah Alhussain, Waad Aldosari, Shikah J. Alsunaidi and Khalid A. Alissa | Journal of Sensor and Actuator Networks | 2022 | 11(3)-18 | رابط الورقة |
| 27 | Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms | Iman Almomani, Walid El-Shafai, Aala AlKhayer, Albandari Alsumayt, Sumayh S. Aljameel, and Khalid Alissa | Computers, Materials & Continua | 2022 | 74(2)-23 | رابط الورقة |
| 28 | Efficient Privacy-Preserving and Secure Authentication for Electric- Vehicle-to-Electric-Vehicle-Charging System Based on ECQV | Abdullah M. Almuhaideb and Sammar S. Algothami | Journal of Sensor and Actuator Networks | 2022 | 11(2)-26 | رابط الورقة |
| 29 | Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier | Abdullah Almuhaideb and Huda Alghamdi | Journal of Sensor and Actuator Networks | 2022 | 11(3)-27 | رابط الورقة |
| 30 | Quantum Image Steganography Schemes for Data Hiding: A Survey | Nasro Min Allah, Naya Nagy, Malak Aljabri, Mariam Alkharraa, Mashael | Applied Sciences | 2022 | 12(20)-18 | رابط الورقة |
تبحث عن شيء؟
Explore Researches
إكتشف أكثر