A survey of IoT security based on a layered architecture of sensing and data analysis H Mrabet, S Belguith, A Alhomoud, A Jemai Sensors 20 (13), 3625, 2020 | 265 | 2020 |
Performance evaluation study of intrusion detection systems A Alhomoud, R Munir, JP Disso, I Awan, A Al-Dhelaan Procedia Computer Science 5, 173-180, 2011 | 96 | 2011 |
A secured industrial Internet-of-things architecture based on blockchain technology and machine learning for sensor access control systems in smart manufacturing H Mrabet, A Alhomoud, A Jemai, D Trentesaux Applied sciences 12 (9), 4641, 2022 | 35 | 2022 |
Comparative study of the common cyber-physical attacks in industry 4.0 NE Oueslati, H Mrabet, A Jemai, A Alhomoud 2019 International Conference on Internet of Things, Embedded Systems and …, 2019 | 27 | 2019 |
Image Steganography in Spatial Domain: Current Status, Techniques, and Trends. AM Alhomoud Intelligent Automation & Soft Computing 27 (1), 2021 | 24 | 2021 |
Using artificial intelligence to predict students’ academic performance in blended learning NN Hamadneh, S Atawneh, WA Khan, KA Almejalli, A Alhomoud Sustainability 14 (18), 11642, 2022 | 20 | 2022 |
Determinants towards a better acceptance model of IoT in KSA and eradication of distrust in omnipresent environments AA Albesher, A Alhomoud International Journal of Advanced Computer Science and Applications 11 (12 …, 2020 | 8 | 2020 |
Cyber security next generation toolkit against botnets A Alhomoud, I Awan, JFP Disso, M Younas Computer, 1, 2013 | 6 | 2013 |
A next-generation approach to combating botnets A Alhomoud, I Awan, JFP Disso, M Younas Computer 46 (4), 62-66, 2013 | 6 | 2013 |
Towards securing machine learning models against membership inference attacks S Ben Hamida, H Mrabet, S Belguith, A Alhomoud, A Jemai Computers, Materials & Continua 70 (3), 2021 | 5 | 2021 |
Application of Metaheuristic Algorithms for Optimizing Longitudinal Square Porous Fins. SH Atawneh, WA Khan, NN Hamadneh, AM Alhomoud Computers, Materials & Continua 67 (1), 2021 | 4 | 2021 |
On the performance evaluation of intrusion detection systems R Munir, A Alhomoud, I Awan, JP Disso Advances in Security Information Management: Perceptions and Outcomes, 117-138, 2013 | 3 | 2013 |
Se/f/-healing Framework for Enterprise networks to combat Botnets infections A Alhomoud, AP Namanya, JP Disso, IA Awan Naif Arab University for Security Sciences, Saudi Arabia, 2017 | 2 | 2017 |
An Optimized Network Intrusion Detection System for Attack Detection based on Supervised Machine Learning Models in an Internet-of-Things Environment. A Alhomoud International Journal of Advances in Soft Computing & Its Applications 15 (3), 2023 | 1 | 2023 |
Towards an enterprise self-healing system against botnets attacks A Alhomoud, I Awan, JP Disso 2013 International Conference on Computing, Networking and Communications …, 2013 | 1 | 2013 |
Intelligent Automated Cognitive-Maturity Recognition System for Confidence Based E-Learning I Usman, AM Alhomoud IJCSNS 21 (4), 223, 2021 | | 2021 |
A self-healing framework to combat cyber attacks. Analysis and development of a self-healing mitigation framework against controlled malware attacks for enterprise networks. AM Alhomoud University of Bradford, 2015 | | 2015 |
Welcome message from PAEWN-2012 Workshop Organizers I Awan, G Min, S Loucif, A Alhomoud Proceedings-26th IEEE International Conference on Advanced Information …, 2012 | | 2012 |
The Effect of Attentiveness on Information Security AM Alhomoud Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010 | | 2010 |
PAEWN-2012 Reviewers I Awan, G Min, S Loucif, A Alhomoud, WC Ting, H Karatza, ... | | |