The internet of things security: A survey encompassing unexplored areas and new insights AE Omolara, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ... Computers & Security 112, 102494, 2022 | 242 | 2022 |
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities EO Abiodun, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ... Neural Computing and Applications 33 (22), 15091-15118, 2021 | 119 | 2021 |
Internet of nano-things (iont): A comprehensive review from architecture to security and privacy challenges A Alabdulatif, NN Thilakarathne, ZK Lawal, KE Fahim, RY Zakari Sensors 23 (5), 2807, 2023 | 33 | 2023 |
A novel cloud enabled access control model for preserving the security and privacy of medical big data A Alabdulatif, NN Thilakarathne, K Kalinaki Electronics 12 (12), 2646, 2023 | 25 | 2023 |
Bio-inspired internet of things: current status, benefits, challenges, and future directions A Alabdulatif, NN Thilakarathne Biomimetics 8 (4), 373, 2023 | 24 | 2023 |
Design and implementation: An iot-framework-based automated wastewater irrigation system S Habib, S Alyahya, M Islam, AM Alnajim, A Alabdulatif, A Alabdulatif Electronics 12 (1), 28, 2022 | 22 | 2022 |
A Survey on Privacy Vulnerabilities in Permissionless Blockchains AZ Junejo, MA Hashmani, AA Alabdulatif International Journal of Advanced Computer Science and Applications(IJACSA …, 2020 | 21 | 2020 |
Analysing and attacking the 4-way handshake of IEEE 802.11 i standard A Alabdulatif, X Ma, L Nolle 8th International Conference for Internet Technology and Secured …, 2013 | 16 | 2013 |
Blockchain in education–track ability and traceability MA Hashmani, AZ Junejo, AA Alabdulatif, SH Adil 2020 International Conference on Computational Intelligence (ICCI), 40-44, 2020 | 14 | 2020 |
Optimal machine learning models for kitsune to detect mirai botnet malware attack A Alabdulatif, SSH Rizvi, MA Hashmani Journal of Hunan University Natural Sciences 48 (6), 2021 | 9 | 2021 |
A Novel Robust Geolocation-Based Multi-Factor Authentication Method for Securing ATM Payment Transactions A Alabdulatif, R Samarasinghe, NN Thilakarathne Applied Sciences 13 (19), 10743, 2023 | 8 | 2023 |
RZee: Cryptographic and statistical model for adversary detection and filtration to preserve blockchain privacy AZ Junejo, MA Hashmani, AA Alabdulatif, MM Memon, SR Jaffari, ... Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 6 | 2022 |
Machine Learning Approach for Improvement in Kitsune NID. A Alabdulatif, SSH Rizvi Intelligent Automation & Soft Computing 32 (2), 2022 | 6 | 2022 |
Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11i Standard A Alabdulatif, X Me International Journal for Information Security Research (IJISR) 3 (3/4), 439 …, 2013 | 5 | 2013 |
Optimal Routing Protocol for Wireless Sensor Network Using Genetic Fuzzy Logic System. SZ Beevi, A Alabdulatif Computers, Materials & Continua 70 (2), 2022 | 4 | 2022 |
Blockchain-based transparent and traceable halal food supply chain management systems AZ Junejo, MA Hashmani, AA Alabdulatif Handbook of Research on Disruptive Innovation and Digital Transformation in …, 2021 | 4 | 2021 |
A framework for proving the correctness of cryptographic protocol properties by linear temporal logic X Ma International Journal of Digital Society (IJDS) 41 (12), 749-757, 2013 | 3 | 2013 |
A novel cloud-enabled cyber threat hunting platform for evaluating the cyber risks associated with smart health ecosystems A Alabdulatif, NN Thilakarathne Applied Sciences 14 (20), 9567, 2024 | 2 | 2024 |
Awareness of data privacy on social networks by students at Qassim University A Alabdulatif, F Alturise International Journal of Advanced Computer Research 10 (50), 194-205, 2020 | 2 | 2020 |
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard AA Alabdulatif International Journal of Computer Science and Information Security, 91-98, 2020 | 2 | 2020 |