Seguir
Fahd Al-Haidari
Fahd Al-Haidari
Associate Professor at College of Computer Science and Information Technology CCSIT, NC department
Dirección de correo verificada de iau.edu.sa
Título
Citado por
Citado por
Año
Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing
MH Sqalli, F Al-Haidari, K Salah
2011 Fourth IEEE international conference on utility and cloud computing, 49-56, 2011
1992011
A survey of consensus algorithms for blockchain technology
SJ Alsunaidi, FA Alhaidari
2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019
1762019
Applications of big data analytics to control COVID-19 pandemic
SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ...
Sensors 21 (7), 2282, 2021
1442021
Impact of cpu utilization thresholds and scaling size on autoscaling cloud resources
F Al-Haidari, M Sqalli, K Salah
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
1092013
Cough sound detection and diagnosis using artificial intelligence techniques: challenges and opportunities
KS Alqudaihi, N Aslam, IU Khan, AM Almuhaideb, SJ Alsunaidi, ...
Ieee Access 9, 102327-102344, 2021
1062021
Intrusion detection system using feature extraction with machine learning algorithms in IoT
D Musleh, M Alotaibi, F Alhaidari, A Rahman, RM Mohammad
Journal of Sensor and Actuator Networks 12 (2), 29, 2023
952023
Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses
F Al-Haidari, MH Sqalli, K Salah
2012 IEEE 11th international conference on trust, security and privacy in …, 2012
812012
Improving security and capacity for arabic text steganography using ‘Kashida’extensions
F Al-Haidari, A Gutub, K Al-Kahsah, J Hamodi
2009 IEEE/ACS International Conference on Computer Systems and Applications …, 2009
762009
Round robin scheduling algorithm in CPU and cloud computing: a review
T Balharith, F Alhaidari
2019 2nd international conference on computer applications & information …, 2019
732019
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing
A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi
Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010
722010
Cloud of Things: architecture, applications and challenges
F Alhaidari, A Rahman, R Zagrouba
Journal of Ambient Intelligence and Humanized Computing 14 (5), 5957-5975, 2023
702023
Detecting malicious URLs using machine learning techniques: review and research directions
M Aljabri, HS Altamimi, SA Albelali, M Al-Harbi, HT Alhuraib, NK Alotaibi, ...
IEEE Access 10, 121395-121417, 2022
672022
Machine learning techniques to detect DDoS attacks on VANET system: A survey
AM Alrehan, FA Alhaidari
2019 2nd International Conference on Computer Applications & Information …, 2019
662019
Enhanced round-robin algorithm in the cloud computing environment for optimal task scheduling
F Alhaidari, TZ Balharith
Computers 10 (5), 63, 2021
562021
Evaluation of the impact of EDoS attacks against cloud computing services
F Al-Haidari, M Sqalli, K Salah
Arabian Journal for Science and Engineering 40, 773-785, 2015
552015
An Assessment of Lexical, Network, and Content‐Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models
M Aljabri, F Alhaidari, RMA Mohammad, S Mirza, DH Alhamed, ...
Computational Intelligence and Neuroscience 2022 (1), 3241216, 2022
502022
Survey for anomaly detection of IoT botnets using machine learning auto-encoders
R Alhajri, R Zagrouba, F Al-Haidari
Int. J. Appl. Eng. Res 14 (10), 2417-2421, 2019
482019
New approach to determine DDoS attack patterns on SCADA system using machine learning
FA Alhaidari, EM Al-Dahasi
2019 International conference on computer and information sciences (ICCIS), 1-6, 2019
482019
Intelligent software-defined network for cognitive routing optimization using deep extreme learning machine approach
F Alhaidari, SH Almotiri, MA Al Ghamdi, MA Khan, A Rehman, S Abbas, ...
Computers, Materials & Continua 67 (1), 1269-1285, 2021
442021
Exploit Kashida adding to Arabic e-text for high capacity steganography
A Al-Nazer, A Gutub
2009 Third International Conference on Network and System Security, 447-451, 2009
412009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20