Software vulnerability markets: Discoverers and buyers A Algarni, Y Malaiya International Journal of Computer, Information Science and Engineering 8 (3 …, 2014 | 79 | 2014 |
Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems AM Algarni, V Thayananthan, YK Malaiya Applied Sciences 11 (8), 3678, 2021 | 65 | 2021 |
Performance and Power Efficient Massive Parallel Computational Model for HPC Heterogeneous Exascale Systems MU Ashraf, FA Eassa, AA Albeshri, A Algarni IEEE Access 6, 23095-23107, 2018 | 54 | 2018 |
A consolidated approach for estimation of data security breach costs AM Algarni, YK Malaiya 2016 2nd International Conference on Information Management (ICIM), 26-39, 2016 | 43 | 2016 |
Most successful vulnerability discoverers: Motivation and methods AM Algarni, YK Malaiya Proceedings of the International Conference on Security and Management (SAM), 1, 2013 | 24 | 2013 |
Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication A Algarni, V Thayananthan Symmetry 14 (12), 2494, 2022 | 23 | 2022 |
Autonomous Vehicles With a 6G-Based Intelligent Cybersecurity Model AM Algarni, V Thayananthan IEEE Access 11, 15284-15296, 2023 | 18 | 2023 |
Improvement of 5G Transportation Services with SDN-Based Security Solutions and beyond 5G A Algarni, V Thayananthan Electronics 10 (20), 2490, 2021 | 17 | 2021 |
Toward exascale computing systems: An energy efficient massive parallel computational model MU Ashraf, FA Eassa, AA Albeshri, A Algarni International Journal of Advanced Computer Science and Applications 9 (2), 2018 | 17 | 2018 |
BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking S Algarni, F Eassa, K Almarhabi, A Algarni, A Albeshri Electronics 11 (7), 996, 2022 | 16 | 2022 |
A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACC K Alsubhi, F Alsolami, A Algarni, E Albassam, M Khemakhem, F Eassa, ... 2019 IEEE/ACS 16th International Conference on Computer Systems and …, 2019 | 16 | 2019 |
Agile Framework To Transform Traditional Team A Alsari, R Qureshi, A Algarni 2020 IEEE Frontiers in Education Conference (FIE), 1-9, 2020 | 14 | 2020 |
Empirical investigation: performance and power-consumption based dual-level model for exascale computing systems MU Ashraf, FA Eassa, A Ahmad, A Algarni IET Software 14 (4), 319-327, 2020 | 13 | 2020 |
AAP4All: An Adaptive Auto Parallelization of Serial Code for HPC Systems II M. Usman Ashraf, Fathy Alburaei Eassa, Leon J. Osterweil, Aiiad Ahmad ... Intelligent Automation & Soft Computing, doi:10.32604/iasc.2021.019044 30 (2 …, 2021 | 8* | 2021 |
Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective A Attaallah, A Algarni, RA Khan | 7 | 2020 |
Standalone Behaviour-Based Attack Detection Techniques for Distributed Software Systems via Blockchain AA Hosam Aljihani, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni Applied Science 11 (12), https://doi.org/10.3390/app11125685, 2021 | 5* | 2021 |
The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks A Algarni Computers, 2022 | 4 | 2022 |
Feature Selection Approach for Improving the Accuracy of Software Bug Prediction E Kaen, A Algarni | 4 | 2019 |
An Open Tool Architecture for Security Testing of NoSQL-Based Applications A Algarni, F Alsolami, F Eassa, K Alsubhi, K Jambi, M Khemakhem 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 4 | 2017 |
Internet of Things based 5G Infrastructure for Securing Transportation Facilities in Smart Cities V Thayananthan, A Algarni International Journal of Computer Applications 975, 8887, 2019 | 3 | 2019 |