An anti-phishing approach that uses training intervention for phishing websites detection A Alnajim, M Munro 2009 Sixth International Conference on Information Technology: New …, 2009 | 114 | 2009 |
An evaluation of users' anti-phishing knowledge retention A Alnajim, M Munro 2009 International Conference on Information Management and Engineering, 210-214, 2009 | 44 | 2009 |
Exploring cybersecurity education and training techniques: A comprehensive review of traditional, virtual reality, and augmented reality approaches AM Alnajim, S Habib, M Islam, HS AlRawashdeh, M Wasim Symmetry 15 (12), 2175, 2023 | 39 | 2023 |
An approach to the implementation of the anti-phishing tool for phishing websites detection A Alnajim, M Munro 2009 International Conference on Intelligent Networking and Collaborative …, 2009 | 39 | 2009 |
An evaluation of users’ tips effectiveness for phishing websites detection A Alnajim, M Munro 2008 Third International Conference on Digital Information Management, 63-68, 2008 | 32 | 2008 |
Enhanced anomaly detection system for iot based on improved dynamic SBPSO A Sarwar, AM Alnajim, SNK Marwat, S Ahmed, S Alyahya, WU Khan Sensors 22 (13), 4926, 2022 | 25 | 2022 |
Design and implementation: An iot-framework-based automated wastewater irrigation system S Habib, S Alyahya, M Islam, AM Alnajim, A Alabdulatif, A Alabdulatif Electronics 12 (1), 28, 2022 | 23 | 2022 |
Faults feature extraction using discrete wavelet transform and artificial neural network for induction motor availability monitoring—internet of things enabled environment M Zuhaib, FA Shaikh, W Tanweer, AM Alnajim, S Alyahya, S Khan, ... Energies 15 (21), 7888, 2022 | 21 | 2022 |
A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in industrial internet of things AM Alnajim, S Habib, M Islam, SM Thwin, F Alotaibi Technologies 11 (6), 161, 2023 | 19 | 2023 |
Effects of technical abilities and phishing knowledge on phishing websites detection A Alnajim, M Munro Proc. the IASTED International Conference on Software Engineering (SE 2009 …, 2009 | 15 | 2009 |
A finite precision implementation of an image encryption scheme based on DNA encoding and binarized chaotic cores RA Elmanfaloty, AM Alnajim, E Abou-Bakr IEEE Access 9, 136905-136916, 2021 | 13 | 2021 |
Mitigating the risks of malware attacks with deep Learning techniques AM Alnajim, S Habib, M Islam, R Albelaihi, A Alabdulatif Electronics 12 (14), 3166, 2023 | 12 | 2023 |
Hybrid chaotic-based PRNG for secure cryptography applications AM Alnajim, E Abou-Bakr, SS Alruwisan, S Khan, RA Elmanfaloty Applied Sciences 13 (13), 7768, 2023 | 12 | 2023 |
Investigation of using captcha keystroke dynamics to enhance the prevention of phishing attacks EK Alamri, AM Alnajim, SA Alsuhibany Future Internet 14 (3), 82, 2022 | 11 | 2022 |
Fighting internet fraud: anti-phishing effectiveness for phishing websites detection AM Alnajim Durham University, 2009 | 11 | 2009 |
Entice to trap: enhanced protection against a rate-aware intelligent jammer in cognitive radio networks K Ibrahim, AM Alnajim, A Naveed Malik, A Waseem, S Alyahya, M Islam, ... Sustainability 14 (5), 2957, 2022 | 10 | 2022 |
Deep learning-based symptomizing cyber threats using adaptive 5G shared slice security approaches A Majeed, AM Alnajim, A Waseem, A Khaliq, A Naveed, S Habib, M Islam, ... Future Internet 15 (6), 193, 2023 | 9 | 2023 |
Internet of Things Authentication Protocols: Comparative Study. S Dargaoui, M Azrour, A El Allaoui, A Guezzaz, A Alabdulatif, A Alnajim Computers, Materials & Continua 79 (1), 2024 | 5 | 2024 |
High level anti-phishing countermeasure: A case study AM Alnajim 2011 World Congress on Internet Security (WorldCIS-2011), 139-144, 2011 | 5 | 2011 |
Artificial intelligence-driven malware detection framework for internet of things environment S Alsubai, AK Dutta, AM Alnajim, R Ayub, AM AlShehri, N Ahmad PeerJ Computer Science 9, e1366, 2023 | 3 | 2023 |