A survey on MAC protocol approaches for underwater wireless sensor networks A Al Guqhaiman, O Akanbi, A Aljaedi, CE Chow IEEE Sensors Journal 21 (3), 3916-3932, 2020 | 90 | 2020 |
Comparative analysis of volatile memory forensics: live response vs. memory imaging A Aljaedi, D Lindskog, P Zavarsky, R Ruhl, F Almari 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 79 | 2011 |
Fog big data analysis for IoT sensor application using fusion deep learning AS Rajawat, P Bedi, SB Goyal, AR Alharbi, A Aljaedi, SS Jamal, ... Mathematical Problems in Engineering 2021 (1), 6876688, 2021 | 46 | 2021 |
Tracer of traffic trajectories in data center networks AO Aljaedi US Patent 10,200,279, 2019 | 46 | 2019 |
Construction of s-boxes using different maps over elliptic curves for image encryption M Ramzan, T Shah, MM Hazzazi, A Aljaedi, AR Alharbi IEEE Access 9, 157106-157123, 2021 | 41 | 2021 |
Region of interest-based medical image encryption technique based on chaotic S-boxes SS Jamal, MM Hazzazi, MF Khan, Z Bassfar, A Aljaedi, Z ul Islam Expert Systems with Applications 238, 122030, 2024 | 36 | 2024 |
AES based white box cryptography in digital signature verification PK Shukla, A Aljaedi, PK Pareek, AR Alharbi, SS Jamal Sensors 22 (23), 9444, 2022 | 34 | 2022 |
Cryptanalysis of internet of health things encryption scheme based on chaotic maps N Munir, M Khan, MM Hazzazi, A Aljaedi, AR Alharbi, I Hussain IEEE Access 9, 105678-105685, 2021 | 33 | 2021 |
Securing 5G‐IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation AS Rajawat, P Bedi, SB Goyal, PK Shukla, SS Jamal, AR Alharbi, ... Mathematical Problems in Engineering 2021 (1), 2330049, 2021 | 31 | 2021 |
Website defacement detection and monitoring methods: A review M Albalawi, R Aloufi, N Alamrani, N Albalawi, A Aljaedi, AR Alharbi Electronics 11 (21), 3573, 2022 | 25 | 2022 |
Mapping ERD to knowledge graph A Elfaki, A Aljaedi, Y Duan 2019 IEEE World Congress on Services (SERVICES) 2642, 110-114, 2019 | 25 | 2019 |
Enhancing topic clustering for Arabic security news based on k‐means and topic modelling AR Alharbi, M Hijji, A Aljaedi Iet Networks 10 (6), 278-294, 2021 | 23 | 2021 |
An efficient audio encryption scheme based on finite fields D Shah, T Shah, MM Hazzazi, MI Haider, A Aljaedi, I Hussain IEEE Access 9, 144385-144394, 2021 | 22 | 2021 |
Mobile forensics: A review H Alatawi, K Alenazi, S Alshehri, S Alshamakhi, M Mustafa, A Aljaedi 2020 International Conference on Computing and Information Technology (ICCIT …, 2020 | 20 | 2020 |
IBOOST: a lightweight provably secure identity-based online/offline signature technique based on FCM for massive devices in 5G wireless sensor networks C Meshram, AL Imoize, A Elhassouny, A Aljaedi, AR Alharbi, SS Jamal IEEE Access 9, 131336-131347, 2021 | 19 | 2021 |
Performance analysis of oracle database in virtual environments FN Almari, P Zavarsky, R Ruhl, D Lindskog, A Aljaedi 2012 26th International Conference on Advanced Information Networking and …, 2012 | 16 | 2012 |
Predicting rogue content and Arabic spammers on twitter AR Alharbi, A Aljaedi Future Internet 11 (11), 229, 2019 | 13 | 2019 |
Lightweight multi-factor authentication for underwater wireless sensor networks A Al Guqhaiman, O Akanbi, A Aljaedi, CE Chow 2020 International Conference on Computational Science and Computational …, 2020 | 11 | 2020 |
Windows and linux random number generation process: A comparative analysis K Alzhrani, A Aljaedi International Journal of Computer Applications 113 (8), 2015 | 11 | 2015 |
Cyber anonymity based on software-defined networking and Onion Routing (SOR) A Elgzil, CE Chow, A Aljaedi, N Alamri 2017 IEEE conference on dependable and secure computing, 358-365, 2017 | 10 | 2017 |