Search Results - "Almuhaideb, Abdullah M"
-
1
Applications of Big Data Analytics to Control COVID-19 Pandemic
Published in Sensors (Basel, Switzerland) (24-03-2021)“…The COVID-19 epidemic has caused a large number of human losses and havoc in the economic, social, societal, and health systems around the world. Controlling…”
Get full text
Journal Article -
2
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
Published in Sensors (Basel, Switzerland) (30-11-2020)“…Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems…”
Get full text
Journal Article -
3
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
Published in Sensors (Basel, Switzerland) (01-08-2023)“…Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI)…”
Get full text
Journal Article -
4
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine
Published in Sensors (Basel, Switzerland) (11-06-2022)“…Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis,…”
Get full text
Journal Article -
5
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
Published in Applied sciences (01-02-2022)“…The Internet of Things (IoT) is an emerging field consisting of Internet-based globally connected network architecture. A subset of IoT is the Internet of…”
Get full text
Journal Article -
6
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs
Published in IEEE access (2022)“…Internet of Things (IoT) is a system of interconnected devices that have the ability to monitor and transfer data to peers without human intervention…”
Get full text
Journal Article -
7
A Lightweight and Secure Anonymity Preserving Protocol for WBAN
Published in IEEE access (2020)“…In the medical fields, wearable body area sensors network (WBAN) is playing a major role in maintaining user health by providing convenience service for the…”
Get full text
Journal Article -
8
Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier
Published in Journal of sensor and actuator networks (01-09-2022)“…Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS…”
Get full text
Journal Article -
9
Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV
Published in Journal of sensor and actuator networks (01-06-2022)“…The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the environment and our plant’s long-term sustainability. The…”
Get full text
Journal Article -
10
Applications of Artificial Intelligence to Detect Android Botnets: A Survey
Published in IEEE access (2022)“…From the growing popularity of Android smart devices, and especially with the recent advances brought on by the COVID-19 pandemic on digital adoption and…”
Get full text
Journal Article -
11
Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment
Published in Big data and cognitive computing (01-10-2022)“…The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare…”
Get full text
Journal Article -
12
Advancing Snort IPS to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring
Published in IEEE access (2024)“…Intrusion Prevention Systems (IPS), capable of preventing the organizational network from a cyber-attack in addition to detecting it, are widely adopted by…”
Get full text
Journal Article -
13
ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging
Published in Big data and cognitive computing (01-12-2022)“…In the near future, using electric vehicles will almost certainly be required for the sustainability of nature and our planet. The most significant challenge…”
Get full text
Journal Article -
14
AdamW+: Machine Learning Framework to Detect Domain Generation Algorithms for Malware
Published in IEEE access (2024)“…Advanced Persistent Threats commonly use Domain Generation Algorithms to evade advanced detection methods to establish communication with their command and…”
Get full text
Journal Article -
15
Cough Sound Detection and Diagnosis Using Artificial Intelligence Techniques: Challenges and Opportunities
Published in IEEE access (01-01-2021)“…Coughing is a common symptom of several respiratory diseases. The sound and type of cough are useful features to consider when diagnosing a disease…”
Get full text
Journal Article -
16
Machine learning model for predicting the length of stay in the intensive care unit for Covid-19 patients in the eastern province of Saudi Arabia
Published in Informatics in medicine unlocked (2022)“…The COVID-19 virus has spread rapidally throughout the world. Managing resources is one of the biggest challenges that healthcare providers around the world…”
Get full text
Journal Article -
17
Homoglyph Attack Detection Model Using Machine Learning and Hash Function
Published in Journal of sensor and actuator networks (01-09-2022)“…Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting a spoofing/fake site that…”
Get full text
Journal Article -
18
Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks
Published in Arabian journal for science and engineering (2011) (01-09-2021)“…The development in wireless body area networks (WBANs) has facilitated a growth in electronic health in terms of quality and efficiency. Telemonitoring systems…”
Get full text
Journal Article -
19
Quantum Federated Reinforcement-Learning-Based Joint Mode Selection and Resource Allocation for STAR-RIS-Aided VRCS
Published in IEEE internet of things journal (15-11-2024)“…The vehicle-road cooperation system (VRCS) facilitates vehicle-to-vehicle (V2V) communication for future vehicle usage in sixth generation (6G) networks. The…”
Get full text
Journal Article -
20
A strong smartphone authentication model to control cellular network access using blockchain
Published in Wireless networks (01-05-2021)“…In an era that requests facilitating access to most services by providing the online platforms, the need to own a small electronic device is increasing. The…”
Get full text
Journal Article