Preserving privacy in internet of things: a survey AA Abi Sen, FA Eassa, K Jambi, M Yamin International Journal of Information Technology 10, 189-200, 2018 | 179 | 2018 |
Blockchain-based secured access control in an IoT system S Algarni, F Eassa, K Almarhabi, A Almalaise, E Albassam, K Alsubhi, ... Applied Sciences 11 (4), 1772, 2021 | 88 | 2021 |
An ensemble machine learning technique for functional requirement classification N Rahimi, F Eassa, L Elrefaei symmetry 12 (10), 1601, 2020 | 55 | 2020 |
Blockchain platforms and access control classification for IoT systems AI Abdi, FE Eassa, K Jambi, K Almarhabi, ASAM Al-Ghamdi Symmetry 12 (10), 1663, 2020 | 54 | 2020 |
Preserving privacy of smart cities based on the fog computing AA Abi Sen, FA Eassa, K Jambi Smart Societies, Infrastructure, Technologies and Applications: First …, 2018 | 53 | 2018 |
Hierarchical blockchain-based multi-chaincode access control for securing IoT systems AI Abdi, FE Eassa, K Jambi, K Almarhabi, M Khemakhem, A Basuhail, ... Electronics 11 (5), 711, 2022 | 49 | 2022 |
Near duplicate document detection survey BS Alsulami, MF Abulkhair, FE Eassa International Journal of Computer Science and Communications Networks 2 (2 …, 2012 | 37 | 2012 |
Personalized learning style for adaptive e-learning system NA Ali, F Eassa, E Hamed International Journal of Advanced Trends in Computer Science and Engineering …, 2019 | 35 | 2019 |
Ensemble model based on hybrid deep learning for intrusion detection in smart grid networks U AlHaddad, A Basuhail, M Khemakhem, FE Eassa, K Jambi Sensors 23 (17), 7464, 2023 | 28 | 2023 |
Ontology-based cloud services representation A Ali, SM Shamsuddin, FE Eassa Research Journal of Applied Sciences, Engineering and Technology 8 (1), 83-94, 2014 | 28 | 2014 |
Towards big data security framework by leveraging fragmentation and blockchain technology HE Alhazmi, FE Eassa, SM Sandokji IEEE Access 10, 10768-10782, 2022 | 26 | 2022 |
One-and two-phase software requirement classification using ensemble deep learning N Rahimi, F Eassa, L Elrefaei Entropy 23 (10), 1264, 2021 | 25 | 2021 |
Securing mobile-agent-based systems against malicious hosts MA Madkour, FE Eassa, AM Ali, NU Qayyum World Applied Sciences Journal 29 (2), 287-297, 2014 | 25 | 2014 |
An interoperable blockchain security frameworks based on microservices and smart contract in IoT environment KS Alshudukhi, MA Khemakhem, FE Eassa, KM Jambi Electronics 12 (3), 776, 2023 | 23 | 2023 |
A survey on fault tolerant multi agent system Y Arfat, FE Eassa IJ Inf. Technol. Comput. Sci 9, 39-48, 2016 | 22 | 2016 |
Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network. F Alanazi, K Jambi, F Eassa, M Khemakhem, A Basuhail, K Alsubhi Intelligent Automation & Soft Computing 33 (2), 2022 | 20 | 2022 |
Software testing techniques for parallel systems: A survey AM Alghamdi, FE Eassa Int. J. Comput. Sci. Netw. Secur. 19 (4), 176-186, 2019 | 18 | 2019 |
Survey on access control and management issues in cloud and BYOD environment K Almarhabi, K Jambi, F Eassa, O Batarfi International Journal of Computer Science and Mobile Computing 6 (12), 44-54, 2017 | 18 | 2017 |
Cloud computing services: Taxonomy of discovery approaches and extraction solutions F Mohammed, AM Ali, ASAM Al-Ghamdi, F Alsolami, SM Shamsuddin, ... Symmetry 12 (8), 1354, 2020 | 17 | 2020 |
A Proposed Framework for Access Control in the Cloud and BYOD Environment K Almarhabi, K Jambi, F Eassa, O Batarfi IJCSNS Int. J. Comput. Sci. Netw. Secur 18 (2), 144-152, 2018 | 17 | 2018 |