Enhanced-AODV: A robust three phase priority-based traffic load balancing scheme for internet of things M Adil, H Song, J Ali, MA Jan, M Attique, S Abbas, A Farouk IEEE Internet of Things Journal 9 (16), 14426-14437, 2021 | 85 | 2021 |
Hash-MAC-DSDV: Mutual authentication for intelligent IoT-based cyber–physical systems M Adil, MA Jan, S Mastorakis, H Song, MM Jadoon, S Abbas, A Farouk IEEE Internet of Things Journal 9 (22), 22173-22183, 2021 | 81 | 2021 |
Intelligent cloud algorithms for load balancing problems: A survey AAS Farrag, SA Mahmoud, M El Sayed 2015 IEEE Seventh International Conference on Intelligent Computing and …, 2015 | 51 | 2015 |
Three byte-based mutual authentication scheme for autonomous Internet of Vehicles M Adil, J Ali, M Attique, MM Jadoon, S Abbas, SR Alotaibi, VG Menon, ... IEEE Transactions on Intelligent Transportation Systems 23 (7), 9358-9369, 2021 | 35 | 2021 |
A blind and high-capacity data hiding of DICOM medical images based on fuzzification concepts A Elhadad, A Ghareeb, S Abbas Alexandria engineering journal 60 (2), 2471-2482, 2021 | 32 | 2021 |
Improving the security of multi-party quantum key agreement with five-qubit Brown states A Elhadad, S Abbas, H Abulkasim, S Hamad Computer Communications 159, 155-160, 2020 | 29 | 2020 |
Developing an Argument Learning Environment Using Agent-Based ITS (ALES). S Abbas, H Sawamura International Working Group on Educational Data Mining, 2009 | 29 | 2009 |
Statistical analysis for random bits generation on quantum key distribution OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem 2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014 | 26 | 2014 |
Deposit subscribe prediction using data mining techniques based real marketing dataset S Abbas arXiv preprint arXiv:1503.04344, 2015 | 24 | 2015 |
The PDBO algorithm for discrete time, cost and quality trade-off in software projects with expressing quality by defects A Saif, S Abbas, Z Fayed Procedia computer science 65, 930-939, 2015 | 22 | 2015 |
A comparative study between modern encryption algorithms based on cloud computing environment OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem 8th International Conference for Internet Technology and Secured …, 2013 | 22 | 2013 |
Quantum key distribution: simulation and characterizations OK Jasim, S Abbas, ESM El-Horbaty, ABM Salem Procedia Computer Science 65, 701-710, 2015 | 20 | 2015 |
[Retracted] Lightweight Authenticated Privacy‐Preserving Secure Framework for the Internet of Vehicles M Jamjoom, H Abulkasim, S Abbas Security and Communication Networks 2022 (1), 6573060, 2022 | 19 | 2022 |
Efficiency of modern encryption algorithms in cloud computing OK Jasim, S Abbas, ESM El-Horbaty, ABM Salem International Journal of Emerging Trends & Technology in Computer Science …, 2013 | 19 | 2013 |
A first step towards argument mining and its use in arguing agents S Abbas, H Sawamura Knowledge-Based Intelligent Information and Engineering Systems: 12th …, 2008 | 19* | 2008 |
& Farouk, A.(2021). Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles M Adil, J Ali, M Attique, MM Jadoon, S Abbas, SR Alotaibi IEEE Transactions on Intelligent Transportation Systems, 0 | 17 | |
Improvements on new quantum key agreement protocol with five-qubit Brown states F Karim, H Abulkasim, E Alabdulkreem, N Ahmed, M Jamjoom, S Abbas Modern Physics Letters A 37 (20), 2250128, 2022 | 15 | 2022 |
Evolution of an emerging symmetric quantum cryptographic algorithm OK Jasim, S Abbas, ESM Horbaty, ABM Salem arXiv preprint arXiv:1503.04796, 2015 | 15 | 2015 |
Cryptographic cloud computing environment as a more trusted communication environment OK Jasim, S Abbas, ESM El-Horbaty, ABM Salem International Journal of Grid and High Performance Computing (IJGHPC) 6 (2 …, 2014 | 15 | 2014 |
Securing Copyright Using 3D Objects Blind Watermarking Scheme. H Abulkasim, M Jamjoom, S Abbas Computers, Materials & Continua 72 (3), 2022 | 14 | 2022 |