Intrudtree: a machine learning based cyber security intrusion detection model IH Sarker, YB Abushark, F Alsolami, AI Khan Symmetry 12 (5), 754, 2020 | 259 | 2020 |
Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions IH Sarker, AI Khan, YB Abushark, F Alsolami Mobile Networks and Applications 28 (1), 296-312, 2023 | 204 | 2023 |
Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model IH Sarker, A Colman, J Han, AI Khan, YB Abushark, K Salah Mobile Networks and Applications 25, 1151-1161, 2020 | 131 | 2020 |
Key issues in healthcare data integrity: Analysis and recommendations AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ... IEEE Access 8, 40612-40628, 2020 | 93 | 2020 |
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 50944-50957, 2020 | 80 | 2020 |
A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 48870-48885, 2020 | 60 | 2020 |
Contextpca: Predicting context-aware smartphone apps usage based on machine learning techniques IH Sarker, YB Abushark, AI Khan Symmetry 12 (4), 499, 2020 | 48 | 2020 |
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling IH Sarker, H Alqahtani, F Alsolami, AI Khan, YB Abushark, MK Siddiqui Journal Of Big Data 7, 1-23, 2020 | 41 | 2020 |
Managing security of healthcare data for a modern healthcare system A Almalawi, AI Khan, F Alsolami, YB Abushark, AS Alfakeeh Sensors 23 (7), 3612, 2023 | 35 | 2023 |
Novel energy management scheme in IoT enabled smart irrigation system using optimized intelligence methods AI Khan, F Alsolami, F Alqurashi, YB Abushark, IH Sarker Engineering Applications of Artificial Intelligence 114, 104996, 2022 | 35 | 2022 |
DBP-CNN: Deep learning-based prediction of DNA-binding proteins by coupling discrete cosine transform with two-dimensional convolutional neural network O Barukab, F Ali, W Alghamdi, Y Bassam, SA Khan Expert Systems with Applications 197, 116729, 2022 | 29 | 2022 |
Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective J Kaur, AI Khan, YB Abushark, MM Alam, SA Khan, A Agrawal, R Kumar, ... Risk Management and Healthcare Policy, 355-371, 2020 | 29 | 2020 |
Integrating blockchain technology into healthcare through an intelligent computing technique AI Khan, A ALGhamdi, FJ Alsolami, YB Abushark, A Almalawi, AM Ali, ... Computers, Materials & Continua 70 (2), 2835-2860, 2022 | 25 | 2022 |
Deep learning based anomaly detection in images: insights, challenges and recommendations A Alloqmani, YB Abushark, AI Khan, F Alsolami International Journal of Advanced Computer Science and Applications 12 (4), 2021 | 19 | 2021 |
Early detection of design faults relative to requirement specifications in agent-based models Y Abushark, J Thangarajah, T Miller, J Harland, M Winikoff Proceedings of the 14th International Conference on Autonomous Agents and …, 2015 | 16 | 2015 |
Cyber security analysis and evaluation for intrusion detection systems YB Abushark, A Irshad Khan, F Alsolami, A Almalawi, M Mottahir Alam, ... Comput. Mater. Contin 72, 1765-1783, 2022 | 15 | 2022 |
Hesitant fuzzy-sets based decision-making model for security risk assessment AS Alfakeeh, A Almalawi, FJ Alsolami, YB Abushark, AI Khan, ... CMC-Comput. Mater. Contin 70, 2297-2317, 2022 | 15 | 2022 |
Usability evaluation through fuzzy AHP-TOPSIS approach: Security requirement perspective YB Abushark, AI Khan, FJ Alsolami, A Almalawi, MM Alam, A Agrawal, ... Comput. Mater. Contin 68, 1203-1218, 2021 | 15 | 2021 |
Requirements specification via activity diagrams for agent-based systems Y Abushark, T Miller, J Thangarajah, M Winikoff, J Harland Autonomous Agents and Multi-Agent Systems 31, 423-468, 2017 | 15 | 2017 |
Checking consistency of agent designs against interaction protocols for early-phase defect location YB Abushark, J Thangarajah, T Miller, J Harland Proceedings of the 13th International Joint Conference on Autonomous Agents …, 2014 | 14 | 2014 |