Green and climate-smart mining: A framework to analyze open-pit mines for cleaner mineral production

IM Jiskani, Q Cai, W Zhou, SAA Shah - Resources Policy, 2021‏ - Elsevier
Green and climate-smart mining (GCSM) can transform the traditional mining system into a
more sustainable pattern by conserving the environment, reducing the ecological footprint …

Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021‏ - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

Strategic Approaches in Network Communication and Information Security Risk Assessment

N Alsafwani, Y Fazea, F Alnajjar - Information, 2024‏ - mdpi.com
Risk assessment is a critical sub-process in information security risk management (ISRM)
that is used to identify an organization's vulnerabilities and threats as well as evaluate …

A hybrid decision model and case study for comprehensive evaluation of green mine construction level

J Chen, IM Jiskani, A Lin, C Zhao, P **g, F Liu… - Environment …, 2023‏ - Springer
The mining industry around the world is plagued by environmental concerns associated with
the exploitation and utilization of mineral resources, as well as the economic issues caused …

Energy-efficient and secure mobile fog-based cloud for the Internet of Things

A Razaque, Y Jararweh, B Alotaibi, M Alotaibi… - Future Generation …, 2022‏ - Elsevier
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is
highly suitable for obtaining virtualized data without additional waiting time. However, the …

A blockchain and smart contract-based data provenance collection and storing in cloud environment

A Jyoti, RK Chauhan - Wireless Networks, 2022‏ - Springer
Data uploading needs security and privacy in the cloud. But there are some problems like
centralized provenance data (PD) collection, storage, lack of security, integrity, and more …

[HTML][HTML] Big data handling approach for unauthorized cloud computing access

A Razaque, N Shaldanbayeva, B Alotaibi, M Alotaibi… - Electronics, 2022‏ - mdpi.com
Nowadays, cloud computing is one of the important and rapidly growing services; its
capabilities and applications have been extended to various areas of life. Cloud computing …

Environmental risk assessment of subway station construction to achieve sustainability using the intuitionistic fuzzy analytic hierarchy process and set pair analysis

J Wang, S Liu, Y Song, J Wang… - Discrete Dynamics in …, 2021‏ - Wiley Online Library
Environmental risks have a significant impact on the sustainability of subway station
construction projects. This paper proposes an environmental risk assessment model based …

An Automatic Artificial Intelligence System for Malware Detection

A Moawad, AI Ebada, AA El‐Harby… - … Secure Computing for …, 2024‏ - Wiley Online Library
One of the major issues in computer system security is detecting malware threats before they
spread. The continuous development of malware makes it challenging to detect malware …

Nash equilibrium and social optimization in cloud service systems with diverse users

L Fu, S ** - Cluster Computing, 2021‏ - Springer
Cloud service systems typically rank the tasks from diverse users according to their
privileges. Besides providing high performance service to membership-based users …