Theo dõi
Dr. Ismail M. Keshta
Dr. Ismail M. Keshta
Associate Professor, AlMaarefa University
Email được xác minh tại um.edu.sa - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Security and privacy of electronic health records: Concerns and challenges
I Keshta, A Odeh
Egyptian Informatics Journal 22 (2), 177-183, 2021
4582021
Employing Deep Neural Networks for Real-Time Anomaly Detection and Mitigation in IoT-Based Smart Grid Cybersecurity Systems
A Quraishi, MA Rusho, A Prasad, I Keshta, R Rivera, MW Bhatt
2024 Third International Conference on Distributed Computing and Electrical …, 2024
832024
Analysis of blockchain in the healthcare sector: application and issues
A Odeh, I Keshta, QA Al-Haija
Symmetry 14 (9), 1760, 2022
782022
Machine learningtechniquesfor detection of website phishing: A review for promises and challenges
A Odeh, I Keshta, E Abdelfattah
2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021
742021
Towards implementation of requirements management specific practices (SP1. 3 and SP1. 4) for Saudi Arabian small and medium sized software development organizations
I Keshta, M Niazi, M Alshayeb
IEEE Access 5, 24162-24183, 2017
712017
An experimental analysis of various machine learning algorithms for hand gesture recognition
S Bhushan, M Alshehri, I Keshta, AK Chakraverti, J Rajpurohit, ...
Electronics 11 (6), 968, 2022
702022
AI-driven IoT for smart health care: Security and privacy issues
I Keshta
Informatics in medicine Unlocked 30, 100903, 2022
522022
Hybrid model for precise hepatitis-C classification using improved random forest and SVM method
UK Lilhore, P Manoharan, JK Sandhu, S Simaiya, S Dalal, AM Baqasah, ...
Scientific Reports 13 (1), 12473, 2023
372023
PHIBOOST-a novel phishing detection model using Adaptive boosting approach
A Odeh, I Keshta, E Abdelfattah
Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021
332021
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice
I Keshta
Journal of King Saud University-Computer and Information Sciences 34 (2 …, 2022
322022
Efficient detection of phishing websites using multilayer perceptron
A Odeh, I Keshta, E Abdelfattah
International Association of Online Engineering, 2020
322020
Blockchain aware proxy re-encryption algorithm-based data sharing scheme
I Keshta, Y Aoudni, M Sandhu, A Singh, PA Xalikovich, A Rizwan, M Soni, ...
Physical Communication 58, 102048, 2023
302023
Machine vision-based human action recognition using spatio-temporal motion features (STMF) with difference intensity distance group pattern (DIDGP)
J Arunnehru, S Thalapathiraj, R Dhanasekar, L Vijayaraja, R Kannadasan, ...
Electronics 11 (15), 2363, 2022
272022
A novel approach to face pattern analysis
S Bhushan, M Alshehri, N Agarwal, I Keshta, J Rajpurohit, A Abugabah
Electronics 11 (3), 444, 2022
272022
Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22 (2), 177-183
I Keshta, A Odeh
262021
Smart water management framework for irrigation in agriculture
A Bhardwaj, M Kumar, M Alshehri, I Keshta, A Abugabah, SK Sharma
Environmental Technology 45 (12), 2320-2334, 2024
242024
Towards implementation of process and product quality assurance process area for Saudi Arabian small and medium sized software development organizations
I Keshta, M Niazi, M Alshayeb
IEEE Access 6, 41643-41675, 2018
242018
Energy management in wireless sensor networks based on naïve bayes, MLP, and SVM classifications: A comparative study
AY Barnawi, IM Keshta
Journal of Sensors 2016 (1), 6250319, 2016
242016
Software cost estimation approaches: A survey
IM Keshta
Journal of Software Engineering and Applications 10 (10), 824, 2017
232017
Smart Implementation of Industrial Internet of Things using Embedded Mechatronic System
A Zaidi, I Keshta, Z Gupta, P Pundhir, T Pandey, PK Rai, M Shabaz, ...
IEEE Embedded Systems Letters 16 (2), 190-193, 2023
212023
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20