Follow
Amer Aljaedi
Amer Aljaedi
Other namesAmer Omar Aljaedi
Associate Professor of Cybersecurity at University of Tabuk
Verified email at ut.edu.sa
Title
Cited by
Cited by
Year
A survey on MAC protocol approaches for underwater wireless sensor networks
A Al Guqhaiman, O Akanbi, A Aljaedi, CE Chow
IEEE Sensors Journal 21 (3), 3916-3932, 2020
902020
Comparative analysis of volatile memory forensics: live response vs. memory imaging
A Aljaedi, D Lindskog, P Zavarsky, R Ruhl, F Almari
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
792011
Fog big data analysis for IoT sensor application using fusion deep learning
AS Rajawat, P Bedi, SB Goyal, AR Alharbi, A Aljaedi, SS Jamal, ...
Mathematical Problems in Engineering 2021 (1), 6876688, 2021
462021
Tracer of traffic trajectories in data center networks
AO Aljaedi
US Patent 10,200,279, 2019
462019
Construction of s-boxes using different maps over elliptic curves for image encryption
M Ramzan, T Shah, MM Hazzazi, A Aljaedi, AR Alharbi
IEEE Access 9, 157106-157123, 2021
412021
Region of interest-based medical image encryption technique based on chaotic S-boxes
SS Jamal, MM Hazzazi, MF Khan, Z Bassfar, A Aljaedi, Z ul Islam
Expert Systems with Applications 238, 122030, 2024
362024
AES based white box cryptography in digital signature verification
PK Shukla, A Aljaedi, PK Pareek, AR Alharbi, SS Jamal
Sensors 22 (23), 9444, 2022
342022
Cryptanalysis of internet of health things encryption scheme based on chaotic maps
N Munir, M Khan, MM Hazzazi, A Aljaedi, AR Alharbi, I Hussain
IEEE Access 9, 105678-105685, 2021
332021
Securing 5G‐IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation
AS Rajawat, P Bedi, SB Goyal, PK Shukla, SS Jamal, AR Alharbi, ...
Mathematical Problems in Engineering 2021 (1), 2330049, 2021
312021
Website defacement detection and monitoring methods: A review
M Albalawi, R Aloufi, N Alamrani, N Albalawi, A Aljaedi, AR Alharbi
Electronics 11 (21), 3573, 2022
252022
Mapping ERD to knowledge graph
A Elfaki, A Aljaedi, Y Duan
2019 IEEE World Congress on Services (SERVICES) 2642, 110-114, 2019
252019
Enhancing topic clustering for Arabic security news based on k‐means and topic modelling
AR Alharbi, M Hijji, A Aljaedi
Iet Networks 10 (6), 278-294, 2021
232021
An efficient audio encryption scheme based on finite fields
D Shah, T Shah, MM Hazzazi, MI Haider, A Aljaedi, I Hussain
IEEE Access 9, 144385-144394, 2021
222021
Mobile forensics: A review
H Alatawi, K Alenazi, S Alshehri, S Alshamakhi, M Mustafa, A Aljaedi
2020 International Conference on Computing and Information Technology (ICCIT …, 2020
202020
IBOOST: a lightweight provably secure identity-based online/offline signature technique based on FCM for massive devices in 5G wireless sensor networks
C Meshram, AL Imoize, A Elhassouny, A Aljaedi, AR Alharbi, SS Jamal
IEEE Access 9, 131336-131347, 2021
192021
Performance analysis of oracle database in virtual environments
FN Almari, P Zavarsky, R Ruhl, D Lindskog, A Aljaedi
2012 26th International Conference on Advanced Information Networking and …, 2012
162012
Predicting rogue content and Arabic spammers on twitter
AR Alharbi, A Aljaedi
Future Internet 11 (11), 229, 2019
132019
Lightweight multi-factor authentication for underwater wireless sensor networks
A Al Guqhaiman, O Akanbi, A Aljaedi, CE Chow
2020 International Conference on Computational Science and Computational …, 2020
112020
Windows and linux random number generation process: A comparative analysis
K Alzhrani, A Aljaedi
International Journal of Computer Applications 113 (8), 2015
112015
Cyber anonymity based on software-defined networking and Onion Routing (SOR)
A Elgzil, CE Chow, A Aljaedi, N Alamri
2017 IEEE conference on dependable and secure computing, 358-365, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20