A Survey of Consensus Algorithms for Blockchain Technology SJ Alsunaidi, FA Alhaidari 2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019 | 153 | 2019 |
Applications of Big Data Analytics to Control COVID-19 Pandemic SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ... Sensors 21 (7), 2282, 2021 | 123 | 2021 |
Cough Sound Detection and Diagnosis Using Artificial Intelligence Techniques: Challenges and Opportunities KS Alqudaihi, N Aslam, IU Khan, AM Almuhaideb, SJ Alsunaidi, ... IEEE Access 9, 102327-102344, 2021 | 73 | 2021 |
E-Triage Systems for COVID-19 Outbreak: Review and Recommendations F Alhaidari, A Almuhaideb, S Alsunaidi, N Ibrahim, N Aslam, IU Khan, ... Sensors 21 (8), 2845, 2021 | 32 | 2021 |
Machine learning model for predicting the length of stay in the intensive care unit for Covid-19 patients in the eastern province of Saudi Arabia DA Alabbad, AM Almuhaideb, SJ Alsunaidi, KS Alqudaihi, FA Alamoudi, ... Informatics in Medicine Unlocked 30, 100937, 2022 | 27 | 2022 |
Security Methods Against Potential Physical Attacks on Smartphones SJ Alsunaidi, AM Almuhaideb 2019 2nd International Conference on Computer Applications & Information …, 2019 | 11 | 2019 |
Homoglyph Attack Detection Model Using Machine Learning and Hash Function AM Almuhaideb, N Aslam, A Alabdullatif, S Altamimi, S Alothman, ... Journal of Sensor and Actuator Networks 11 (3), 54, 2022 | 9 | 2022 |
Blockchain-based Distributed Renewable Energy Management Framework SJ Alsunaidi, FA Khan IEEE Access 10, 81888 - 81898, 2022 | 9 | 2022 |
A comparison of human brainwaves-based biometric authentication systems SJ Alsunaidi, NA Saqib, KA Alissa International Journal of Biometrics 12 (4), 411-429, 2020 | 8 | 2020 |
Investigation of the Optimal Method for Generating and Verifying the Smartphone's Fingerprint: A Review SJ Alsunaidi, AM Almuhaideb Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 7 | 2022 |
The Security Risks Associated With IMEIs And Security Solutions SJ Alsunaidi, AM Almuhaideb 2019 2nd International Conference on Computer Applications & Information …, 2019 | 6 | 2019 |
A strong smartphone authentication model to control cellular network access using blockchain SJ Alsunaidi, AM Almuhaideb Wireless Networks 27 (4), 2301-2321, 2021 | 4 | 2021 |
Twitter Spam Accounts Detection Using Machine Learning Models SJ Alsunaidi, RT Alraddadi, H Aljamaan 2022 14th International Conference on Computational Intelligence and …, 2022 | 3 | 2022 |
Dynamic Interpretation Approaches for Information Security Risk Assessment RM Alhajri, SJ Alsunaidi, R Zagrouba, AM Almuhaideb, MA Alqahtani 2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019 | 3 | 2019 |
Sensor-based identification to detect counterfeit smartphones using Blockchain AM Almuhaideb, SJ Alsunaidi Journal of Ambient Intelligence and Humanized Computing 14 (12), 16521-16538, 2023 | | 2023 |
Performance Evaluation of Machine Learning Models on Apache Spark: An Empirical Study AZ Yamani, SJ Alsunaidi, I Boudellioua 2022 14th International Conference on Computational Intelligence and …, 2022 | | 2022 |
A Strong Smartphone Authentication Approach to Control Cellular Network Access S Alsunaidi https://drepo.sdl.edu.sa/handle/20.500.14154/119, 2019 | | 2019 |