Security and privacy of electronic health records: Concerns and challenges I Keshta, A Odeh Egyptian Informatics Journal 22 (2), 177-183, 2021 | 458 | 2021 |
Employing Deep Neural Networks for Real-Time Anomaly Detection and Mitigation in IoT-Based Smart Grid Cybersecurity Systems A Quraishi, MA Rusho, A Prasad, I Keshta, R Rivera, MW Bhatt 2024 Third International Conference on Distributed Computing and Electrical …, 2024 | 83 | 2024 |
Analysis of blockchain in the healthcare sector: application and issues A Odeh, I Keshta, QA Al-Haija Symmetry 14 (9), 1760, 2022 | 78 | 2022 |
Machine learningtechniquesfor detection of website phishing: A review for promises and challenges A Odeh, I Keshta, E Abdelfattah 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 74 | 2021 |
Towards implementation of requirements management specific practices (SP1. 3 and SP1. 4) for Saudi Arabian small and medium sized software development organizations I Keshta, M Niazi, M Alshayeb IEEE Access 5, 24162-24183, 2017 | 71 | 2017 |
An experimental analysis of various machine learning algorithms for hand gesture recognition S Bhushan, M Alshehri, I Keshta, AK Chakraverti, J Rajpurohit, ... Electronics 11 (6), 968, 2022 | 70 | 2022 |
AI-driven IoT for smart health care: Security and privacy issues I Keshta Informatics in medicine Unlocked 30, 100903, 2022 | 52 | 2022 |
Hybrid model for precise hepatitis-C classification using improved random forest and SVM method UK Lilhore, P Manoharan, JK Sandhu, S Simaiya, S Dalal, AM Baqasah, ... Scientific Reports 13 (1), 12473, 2023 | 37 | 2023 |
PHIBOOST-a novel phishing detection model using Adaptive boosting approach A Odeh, I Keshta, E Abdelfattah Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021 | 33 | 2021 |
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice I Keshta Journal of King Saud University-Computer and Information Sciences 34 (2 …, 2022 | 32 | 2022 |
Efficient detection of phishing websites using multilayer perceptron A Odeh, I Keshta, E Abdelfattah International Association of Online Engineering, 2020 | 32 | 2020 |
Blockchain aware proxy re-encryption algorithm-based data sharing scheme I Keshta, Y Aoudni, M Sandhu, A Singh, PA Xalikovich, A Rizwan, M Soni, ... Physical Communication 58, 102048, 2023 | 30 | 2023 |
Machine vision-based human action recognition using spatio-temporal motion features (STMF) with difference intensity distance group pattern (DIDGP) J Arunnehru, S Thalapathiraj, R Dhanasekar, L Vijayaraja, R Kannadasan, ... Electronics 11 (15), 2363, 2022 | 27 | 2022 |
A novel approach to face pattern analysis S Bhushan, M Alshehri, N Agarwal, I Keshta, J Rajpurohit, A Abugabah Electronics 11 (3), 444, 2022 | 27 | 2022 |
Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22 (2), 177-183 I Keshta, A Odeh | 26 | 2021 |
Smart water management framework for irrigation in agriculture A Bhardwaj, M Kumar, M Alshehri, I Keshta, A Abugabah, SK Sharma Environmental Technology 45 (12), 2320-2334, 2024 | 24 | 2024 |
Towards implementation of process and product quality assurance process area for Saudi Arabian small and medium sized software development organizations I Keshta, M Niazi, M Alshayeb IEEE Access 6, 41643-41675, 2018 | 24 | 2018 |
Energy management in wireless sensor networks based on naïve bayes, MLP, and SVM classifications: A comparative study AY Barnawi, IM Keshta Journal of Sensors 2016 (1), 6250319, 2016 | 24 | 2016 |
Software cost estimation approaches: A survey IM Keshta Journal of Software Engineering and Applications 10 (10), 824, 2017 | 23 | 2017 |
Smart Implementation of Industrial Internet of Things using Embedded Mechatronic System A Zaidi, I Keshta, Z Gupta, P Pundhir, T Pandey, PK Rai, M Shabaz, ... IEEE Embedded Systems Letters 16 (2), 190-193, 2023 | 21 | 2023 |