Search Results - "Almuhaideb, Abdullah M"

Refine Results
  1. 1

    Applications of Big Data Analytics to Control COVID-19 Pandemic by Alsunaidi, Shikah J, Almuhaideb, Abdullah M, Ibrahim, Nehad M, Shaikh, Fatema S, Alqudaihi, Kawther S, Alhaidari, Fahd A, Khan, Irfan Ullah, Aslam, Nida, Alshahrani, Mohammed S

    Published in Sensors (Basel, Switzerland) (24-03-2021)
    “…The COVID-19 epidemic has caused a large number of human losses and havoc in the economic, social, societal, and health systems around the world. Controlling…”
    Get full text
    Journal Article
  2. 2

    A Lightweight Three-Factor Authentication Scheme for WHSN Architecture by Almuhaideb, Abdullah M, Alqudaihi, Kawther

    Published in Sensors (Basel, Switzerland) (30-11-2020)
    “…Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems…”
    Get full text
    Journal Article
  3. 3

    A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience by Saeed, Saqib, Suayyid, Sarah A., Al-Ghamdi, Manal S., Al-Muhaisen, Hayfa, Almuhaideb, Abdullah M.

    Published in Sensors (Basel, Switzerland) (01-08-2023)
    “…Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI)…”
    Get full text
    Journal Article
  4. 4

    A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine by Iqbal, Yasir, Tahir, Shahzaib, Tahir, Hasan, Khan, Fawad, Saeed, Saqib, Almuhaideb, Abdullah M., Syed, Adeel M.

    Published in Sensors (Basel, Switzerland) (11-06-2022)
    “…Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis,…”
    Get full text
    Journal Article
  5. 5

    Data Protection and Privacy of the Internet of Healthcare Things (IoHTs) by Shahid, Jahanzeb, Ahmad, Rizwan, Kiani, Adnan K., Ahmad, Tahir, Saeed, Saqib, Almuhaideb, Abdullah M.

    Published in Applied sciences (01-02-2022)
    “…The Internet of Things (IoT) is an emerging field consisting of Internet-based globally connected network architecture. A subset of IoT is the Internet of…”
    Get full text
    Journal Article
  6. 6

    FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs by Zulkifl, Zeeshan, Khan, Fawad, Tahir, Shahzaib, Afzal, Mehreen, Iqbal, Waseem, Rehman, Abdul, Saeed, Saqib, Almuhaideb, Abdullah M.

    Published in IEEE access (2022)
    “…Internet of Things (IoT) is a system of interconnected devices that have the ability to monitor and transfer data to peers without human intervention…”
    Get full text
    Journal Article
  7. 7

    A Lightweight and Secure Anonymity Preserving Protocol for WBAN by Almuhaideb, Abdullah M., Alqudaihi, Kawther S.

    Published in IEEE access (2020)
    “…In the medical fields, wearable body area sensors network (WBAN) is playing a major role in maintaining user health by providing convenience service for the…”
    Get full text
    Journal Article
  8. 8

    Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier by Almuhaideb, Abdullah M., Alghamdi, Huda A.

    Published in Journal of sensor and actuator networks (01-09-2022)
    “…Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS…”
    Get full text
    Journal Article
  9. 9

    Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV by Almuhaideb, Abdullah M., Algothami, Sammar S.

    Published in Journal of sensor and actuator networks (01-06-2022)
    “…The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the environment and our plant’s long-term sustainability. The…”
    Get full text
    Journal Article
  10. 10

    Applications of Artificial Intelligence to Detect Android Botnets: A Survey by Almuhaideb, Abdullah M., Alynanbaawi, Dalal Y.

    Published in IEEE access (2022)
    “…From the growing popularity of Android smart devices, and especially with the recent advances brought on by the COVID-19 pandemic on digital adoption and…”
    Get full text
    Journal Article
  11. 11

    Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment by Almuhaideb, Abdullah M, Alghamdi, Huda A

    Published in Big data and cognitive computing (01-10-2022)
    “…The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare…”
    Get full text
    Journal Article
  12. 12

    Advancing Snort IPS to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring by Sheeraz, Muhammad, Hanif Durad, Muhammad, Tahir, Shahzaib, Tahir, Hasan, Saeed, Saqib, Almuhaideb, Abdullah M.

    Published in IEEE access (2024)
    “…Intrusion Prevention Systems (IPS), capable of preventing the organizational network from a cyber-attack in addition to detecting it, are widely adopted by…”
    Get full text
    Journal Article
  13. 13

    ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging by Almuhaideb, Abdullah M., Algothami, Sammar S.

    Published in Big data and cognitive computing (01-12-2022)
    “…In the near future, using electric vehicles will almost certainly be required for the sustainability of nature and our planet. The most significant challenge…”
    Get full text
    Journal Article
  14. 14

    AdamW+: Machine Learning Framework to Detect Domain Generation Algorithms for Malware by Javed, Awais, Rashid, Imran, Tahir, Shahzaib, Saeed, Saqib, Almuhaideb, Abdullah M., Alissa, Khalid

    Published in IEEE access (2024)
    “…Advanced Persistent Threats commonly use Domain Generation Algorithms to evade advanced detection methods to establish communication with their command and…”
    Get full text
    Journal Article
  15. 15
  16. 16
  17. 17

    Homoglyph Attack Detection Model Using Machine Learning and Hash Function by Almuhaideb, Abdullah M., Aslam, Nida, Alabdullatif, Almaha, Altamimi, Sarah, Alothman, Shooq, Alhussain, Amnah, Aldosari, Waad, Alsunaidi, Shikah J., Alissa, Khalid A.

    Published in Journal of sensor and actuator networks (01-09-2022)
    “…Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting a spoofing/fake site that…”
    Get full text
    Journal Article
  18. 18

    Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks by Almuhaideb, Abdullah M.

    “…The development in wireless body area networks (WBANs) has facilitated a growth in electronic health in terms of quality and efficiency. Telemonitoring systems…”
    Get full text
    Journal Article
  19. 19

    Quantum Federated Reinforcement-Learning-Based Joint Mode Selection and Resource Allocation for STAR-RIS-Aided VRCS by Chaudhary, Shivam, Budhiraja, Ishan, Chaudhary, Rajat, Kumar, Neeraj, Garg, Deepak, Almuhaideb, Abdullah M.

    Published in IEEE internet of things journal (15-11-2024)
    “…The vehicle-road cooperation system (VRCS) facilitates vehicle-to-vehicle (V2V) communication for future vehicle usage in sixth generation (6G) networks. The…”
    Get full text
    Journal Article
  20. 20

    A strong smartphone authentication model to control cellular network access using blockchain by Alsunaidi, Shikah J., Almuhaideb, Abdullah M.

    Published in Wireless networks (01-05-2021)
    “…In an era that requests facilitating access to most services by providing the online platforms, the need to own a small electronic device is increasing. The…”
    Get full text
    Journal Article