Detecting phishing domains using machine learning S Alnemari, M Alshammari Applied Sciences 13 (8), 4649, 2023 | 79 | 2023 |
A novel text2IMG mechanism of credit card fraud detection: A deep learning approach A Alharbi, M Alshammari, OD Okon, A Alabrah, HT Rauf, H Alyami, ... Electronics 11 (5), 756, 2022 | 73 | 2022 |
Effectiveness evaluation of different IDSs using integrated fuzzy MCDM model H Alyami, MTJ Ansari, A Alharbi, W Alosaimi, M Alshammari, D Pandey, ... Electronics 11 (6), 859, 2022 | 32 | 2022 |
PackerRobo: Model-based robot vision self supervised learning in CART A Khan, JP Li, MK Hasan, N Varish, Z Mansor, S Islam, RA Saeed, ... Alexandria Engineering Journal 61 (12), 12549-12566, 2022 | 29 | 2022 |
Uplink power control scheme for spectral efficiency maximization in NOMA systems BU Rehman, MI Babar, GA Azim, M Amir, H Alhumyani, MS Alzaidi, ... Alexandria Engineering Journal 64, 667-677, 2023 | 27 | 2023 |
Credit card-not-present fraud detection and prevention using big data analytics algorithms A Razaque, MBH Frej, G Bektemyssova, F Amsaad, M Almiani, A Alotaibi, ... Applied Sciences 13 (1), 57, 2022 | 20 | 2022 |
Efficient and secure key distribution protocol for wireless sensor networks MR Alshammari, KM Elleithy Sensors 18 (10), 3569, 2018 | 16 | 2018 |
Machine learning-driven detection of cross-site scripting attacks R Alhamyani, M Alshammari Information 15 (7), 420, 2024 | 10 | 2024 |
An empirical investigation to understand the issues of distributed software testing amid COVID-19 pandemic A Alharbi, MTJ Ansari, W Alosaimi, H Alyami, M Alshammari, A Agrawal, ... Processes 10 (5), 838, 2022 | 10 | 2022 |
Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning A Razaque, MBH Frej, G Bektemyssova, M Almi’ani, F Amsaad, A Alotaibi, ... Electronics 12 (5), 1129, 2023 | 5 | 2023 |
Secure and efficient key management protocol (SEKMP) for wireless sensor networks M Alshammari, K Elleithy Proceedings of the tenth ACM/IEEE symposium on Architectures for networking …, 2014 | 5 | 2014 |
A novel secure quantum key distribution algorithm A Aldhaheri, K Elleithy, M Alshammari, H Ghunaim IEEE Long Island Systems, Applications and Technology (LISAT) Conference …, 2014 | 5 | 2014 |
Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing A Razaque, M Khan, J Yoo, A Alotaibi, M Alshammari, M Almiani Internet of Things 25, 101115, 2024 | 4 | 2024 |
Malicious vehicle detection using layer-based paradigm and the internet of things A Razaque, G Bektemyssova, J Yoo, A Alotaibi, M Ali, F Amsaad, ... Sensors 23 (14), 6554, 2023 | 4 | 2023 |
IoT-Inspired Reliable Irregularity-Detection Framework for Education 4.0 and Industry 4.0 A Verma, D Anand, A Singh, R Vij, A Alharbi, M Alshammari, ... Electronics 11 (9), 1436, 2022 | 4 | 2022 |
Efficient key distribution protocol for wireless sensor networks MR Alshammari, KM Elleithy 2018 IEEE 8th Annual Computing and Communication Workshop and Conference …, 2018 | 4 | 2018 |
Defense mechanisms for computer-based information systems M Alshammari, C Bach International Journal of Network Security & Its Applications 5 (5), 107, 2013 | 4 | 2013 |
Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT) A Alsumayt, M Alshammari, ZM Alfawaer, FN Al-Wesabi, N El-Haggar, ... PeerJ Computer Science 10, e2091, 2024 | 3 | 2024 |
Efficient internet-of-things cyberattack depletion using blockchain-enabled software-defined networking and 6G network technology A Razaque, J Yoo, G Bektemyssova, M Alshammari, TT Chinibayeva, ... Sensors 23 (24), 9690, 2023 | 3 | 2023 |
Deep learning-based intrusion detection: A novel approach for identifying brute-force attacks on ftp and ssh protocol N Alotibi, M Alshammari International Journal of Advanced Computer Science and Applications 14 (6), 2023 | 3 | 2023 |