Search Results - "Almotiri, Sultan H"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach by Almotiri, Sultan H.

    Published in IEEE access (2021)
    “…A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become…”
    Get full text
    Journal Article
  2. 2

    Brain Tumor Analysis Empowered with Deep Learning: A Review, Taxonomy, and Future Challenges by Nadeem, Muhammad Waqas, Ghamdi, Mohammed A Al, Hussain, Muzammil, Khan, Muhammad Adnan, Khan, Khalid Masood, Almotiri, Sultan H, Butt, Suhail Ashfaq

    Published in Brain sciences (22-02-2020)
    “…Deep Learning (DL) algorithms enabled computational models consist of multiple processing layers that represent data with multiple levels of abstraction. In…”
    Get full text
    Journal Article
  3. 3

    Intelligent Techniques for Detecting Network Attacks: Review and Research Directions by Aljabri, Malak, Aljameel, Sumayh S., Mohammad, Rami Mustafa A., Almotiri, Sultan H., Mirza, Samiha, Anis, Fatima M., Aboulnour, Menna, Alomari, Dorieh M., Alhamed, Dina H., Altamimi, Hanan S.

    Published in Sensors (Basel, Switzerland) (25-10-2021)
    “…The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks…”
    Get full text
    Journal Article
  4. 4
  5. 5

    DNA Strands Level Scrambling Based Color Image Encryption Scheme by Iqbal, Nadeem, Hanif, Muhammad, Abbas, Sagheer, Khan, Muhammad Adnan, Almotiri, Sultan H., Al Ghamdi, Mohammed A.

    Published in IEEE access (2020)
    “…In the past, many image encryption schemes have been developed through the swapping operations at the different levels of granularity. These levels span bits,…”
    Get full text
    Journal Article
  6. 6

    Healthcare Techniques Through Deep Learning: Issues, Challenges and Opportunities by Nisar, Dur-E-Maknoon, Amin, Rashid, Shah, Noor-Ul-Huda, Ghamdi, Mohammed A. Al, Almotiri, Sultan H., Alruily, Meshrif

    Published in IEEE access (2021)
    “…In artificial intelligence, deep learning (DL) is a process that replicates the working mechanism of the human brain in data processing, and it also creates…”
    Get full text
    Journal Article
  7. 7

    Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media by Qureshi, Shavez Mushtaq, Saeed, Atif, Almotiri, Sultan H, Ahmad, Farooq, Al Ghamdi, Mohammed A

    Published in PeerJ. Computer science (27-05-2024)
    “…The rapid advancement of deepfake technology poses an escalating threat of misinformation and fraud enabled by manipulated media. Despite the risks, a…”
    Get full text
    Journal Article
  8. 8

    Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks by Ali, Kazim, Bhatti, Muhammad Shahid, Saeed, Atif, Athar, Atifa, Al Ghamdi, Mohammed A., Almotiri, Sultan H., Akram, Samina

    Published in IEEE access (2024)
    “…Vision Transformers (ViTs) have proved to be a more powerful substitute for Convolutional Neural Networks (CNNs) in various computer vision tasks, using the…”
    Get full text
    Journal Article
  9. 9

    Racial Identity-Aware Facial Expression Recognition Using Deep Convolutional Neural Networks by Sohail, Muhammad, Ali, Ghulam, Rashid, Javed, Ahmad, Israr, Almotiri, Sultan H., AlGhamdi, Mohammed A., Nagra, Arfan A., Masood, Khalid

    Published in Applied sciences (01-01-2022)
    “…Multi-culture facial expression recognition remains challenging due to cross cultural variations in facial expressions representation, caused by facial…”
    Get full text
    Journal Article
  10. 10

    A Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud by Qaisar, Zahid Hussain, Almotiri, Sultan H., Al Ghamdi, Mohammed A., Nagra, Arfan Ali, Ali, Ghulam

    Published in IEEE access (2021)
    “…Sensitive Data requires encryption before uploading to a public cloud. Access control based on Attribute-Based Encryption (ABE) is an effective technique to…”
    Get full text
    Journal Article
  11. 11

    Hybrid GA-SVM Approach for Postoperative Life Expectancy Prediction in Lung Cancer Patients by Nagra, Arfan Ali, Mubarik, Iqra, Asif, Muhammad Mugees, Masood, Khalid, Ghamdi, Mohammed A. Al, Almotiri, Sultan H.

    Published in Applied sciences (01-11-2022)
    “…Medical outcomes must be tracked in order to enhance quality initiatives, healthcare management, and mass education. Thoracic surgery data have been acquired…”
    Get full text
    Journal Article
  12. 12

    A Reliable Framework for Secure Communication and Health Assessment of Soldiers in the Battlefield by Bin Ahmad, Maaz, Asif, Muhammad, Masood, Khalid, Al Ghamdi, Mohammad A., Almotiri, Sultan H., Nagra, Arfan Ali

    Published in SAGE open (01-10-2022)
    “…Wars against the enemy are mandatory for the integrity of a nation. With the passage of time, the nature of war is being changed, to some extent from a…”
    Get full text
    Journal Article
  13. 13

    A Systematic Review on Monitoring and Advanced Control Strategies in Smart Agriculture by Hassan, Syeda Iqra, Alam, Muhammad Mansoor, Illahi, Usman, Al Ghamdi, Mohammed A., Almotiri, Sultan H., Su'ud, Mazliham Mohd

    Published in IEEE access (2021)
    “…Automation in agriculture nowadays is the main focus and area of development for various countries. The population rate of the world is increasing rapidly and…”
    Get full text
    Journal Article
  14. 14

    A fusion of BERT, machine learning and manual approach for fake news detection by Al Ghamdi, Mohammed A., Bhatti, Muhammad Shahid, Saeed, Atif, Gillani, Zeeshan, Almotiri, Sultan H.

    Published in Multimedia tools and applications (01-03-2024)
    “…A large number of users around the globe have preferred to read news and the latest information from the Internet, especially social media, leaving behind the…”
    Get full text
    Journal Article
  15. 15

    Automatic motion tracking of a human in a surveillance video by AlGhamdi, Mohammed A., Khan, Murtaza A., AlMotiri, Sultan H.

    “…In this paper we describe a method of automatic motion tracking of a person in a sequence of video frames. The method is suitable for tracking a person walking…”
    Get full text
    Conference Proceeding
  16. 16

    Mobile Health (m-Health) System in the Context of IoT by Almotiri, Sultan H., Khan, Murtaza A., Alghamdi, Mohammed A.

    “…In this paper we describe the mobile health (m-health) system in the context of Internet of Things (IoT). We describe the fundamental characteristics of…”
    Get full text
    Conference Proceeding
  17. 17

    Design and evaluation of security mechanism for routing in MANETs by Almotiri, Sultan H

    Published 01-01-2013
    “…Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount…”
    Get full text
    Dissertation
  18. 18

    Design and evaluation of security mechanism for routing in manets: elliptic curve diffie-hellman cryptography mechanism to secure dynamic source routing protocol (dsr) in mobile ad hoc network (manet) by Almotiri, Sultan H

    Published 01-01-2013
    “…Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount…”
    Get full text
    Dissertation
  19. 19

    Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach by Almotiri, Sultan H

    Published in Access, IEEE (2021)
    “…A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become…”
    Get full text
    Standard