Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing MH Sqalli, F Al-Haidari, K Salah 2011 Fourth IEEE international conference on utility and cloud computing, 49-56, 2011 | 199 | 2011 |
A survey of consensus algorithms for blockchain technology SJ Alsunaidi, FA Alhaidari 2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019 | 176 | 2019 |
Applications of big data analytics to control COVID-19 pandemic SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ... Sensors 21 (7), 2282, 2021 | 144 | 2021 |
Impact of cpu utilization thresholds and scaling size on autoscaling cloud resources F Al-Haidari, M Sqalli, K Salah 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 109 | 2013 |
Cough sound detection and diagnosis using artificial intelligence techniques: challenges and opportunities KS Alqudaihi, N Aslam, IU Khan, AM Almuhaideb, SJ Alsunaidi, ... Ieee Access 9, 102327-102344, 2021 | 106 | 2021 |
Intrusion detection system using feature extraction with machine learning algorithms in IoT D Musleh, M Alotaibi, F Alhaidari, A Rahman, RM Mohammad Journal of Sensor and Actuator Networks 12 (2), 29, 2023 | 95 | 2023 |
Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses F Al-Haidari, MH Sqalli, K Salah 2012 IEEE 11th international conference on trust, security and privacy in …, 2012 | 81 | 2012 |
Improving security and capacity for arabic text steganography using ‘Kashida’extensions F Al-Haidari, A Gutub, K Al-Kahsah, J Hamodi 2009 IEEE/ACS International Conference on Computer Systems and Applications …, 2009 | 76 | 2009 |
Round robin scheduling algorithm in CPU and cloud computing: a review T Balharith, F Alhaidari 2019 2nd international conference on computer applications & information …, 2019 | 73 | 2019 |
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010 | 72 | 2010 |
Cloud of Things: architecture, applications and challenges F Alhaidari, A Rahman, R Zagrouba Journal of Ambient Intelligence and Humanized Computing 14 (5), 5957-5975, 2023 | 70 | 2023 |
Detecting malicious URLs using machine learning techniques: review and research directions M Aljabri, HS Altamimi, SA Albelali, M Al-Harbi, HT Alhuraib, NK Alotaibi, ... IEEE Access 10, 121395-121417, 2022 | 67 | 2022 |
Machine learning techniques to detect DDoS attacks on VANET system: A survey AM Alrehan, FA Alhaidari 2019 2nd International Conference on Computer Applications & Information …, 2019 | 66 | 2019 |
Enhanced round-robin algorithm in the cloud computing environment for optimal task scheduling F Alhaidari, TZ Balharith Computers 10 (5), 63, 2021 | 56 | 2021 |
Evaluation of the impact of EDoS attacks against cloud computing services F Al-Haidari, M Sqalli, K Salah Arabian Journal for Science and Engineering 40, 773-785, 2015 | 55 | 2015 |
An Assessment of Lexical, Network, and Content‐Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models M Aljabri, F Alhaidari, RMA Mohammad, S Mirza, DH Alhamed, ... Computational Intelligence and Neuroscience 2022 (1), 3241216, 2022 | 50 | 2022 |
Survey for anomaly detection of IoT botnets using machine learning auto-encoders R Alhajri, R Zagrouba, F Al-Haidari Int. J. Appl. Eng. Res 14 (10), 2417-2421, 2019 | 48 | 2019 |
New approach to determine DDoS attack patterns on SCADA system using machine learning FA Alhaidari, EM Al-Dahasi 2019 International conference on computer and information sciences (ICCIS), 1-6, 2019 | 48 | 2019 |
Intelligent software-defined network for cognitive routing optimization using deep extreme learning machine approach F Alhaidari, SH Almotiri, MA Al Ghamdi, MA Khan, A Rehman, S Abbas, ... Computers, Materials & Continua 67 (1), 1269-1285, 2021 | 44 | 2021 |
Exploit Kashida adding to Arabic e-text for high capacity steganography A Al-Nazer, A Gutub 2009 Third International Conference on Network and System Security, 447-451, 2009 | 41 | 2009 |