EMA-RPL: Energy and mobility aware routing for the Internet of Mobile Things M Bouaziz, A Rachedi, A Belghith, M Berbineau, S Al-Ahmadi Future Generation Computer Systems 97, 247-258, 2019 | 91 | 2019 |
Diagnostic features and potential applications of PPG signal in healthcare: A systematic review MA Almarshad, MS Islam, S Al-Ahmadi, AS BaHammam Healthcare 10 (3), 547, 2022 | 63 | 2022 |
Cache freshness in named data networking for the internet of things M Meddeb, A Dhraief, A Belghith, T Monteil, K Drira, S AlAhmadi The Computer Journal 61 (10), 1496-1511, 2018 | 53 | 2018 |
Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking HA Babaeer, SA Al-Ahmadi IEEE Access 8, 92098-92109, 2020 | 50 | 2020 |
Energy preserving secure measure against wormhole attack in wireless sensor networks WA Aliady, SA Al-Ahmadi IEEE Access 7, 84132-84141, 2019 | 45 | 2019 |
CBR-PDS: a case-based reasoning phishing detection system H Abutair, A Belghith, S AlAhmadi Journal of Ambient Intelligence and Humanized Computing 10, 2593-2606, 2019 | 40 | 2019 |
Performance evaluation of machine learning techniques for DOS detection in wireless sensor network L Alsulaiman, S Al-Ahmadi arXiv preprint arXiv:2104.01963, 2021 | 38 | 2021 |
A hybrid genetic-ant colony optimization algorithm for the word sense disambiguation problem W Alsaeedan, MEB Menai, S Al-Ahmadi Information Sciences 417, 20-38, 2017 | 30 | 2017 |
PDGAN: Phishing detection with generative adversarial networks S Al-Ahmadi, A Alotaibi, O Alsaleh Ieee Access 10, 42459-42468, 2022 | 29 | 2022 |
An improved machine-learning approach for COVID-19 prediction using Harris Hawks optimization and feature analysis using SHAP K Debjit, MS Islam, MA Rahman, FT Pinki, RD Nath, S Al-Ahmadi, ... Diagnostics 12 (5), 1023, 2022 | 28 | 2022 |
Named data networking: A promising architecture for the Internet of Things (IoT) M Meddeb, A Dhraief, A Belghith, T Monteil, K Drira, S Al-Ahmadi International Journal on Semantic Web and Information Systems (IJSWIS) 14 (2 …, 2018 | 27 | 2018 |
Encryption based image watermarking algorithm in 2DWT-DCT domains N Hasan, MS Islam, W Chen, MA Kabir, S Al-Ahmadi Sensors 21 (16), 5540, 2021 | 26 | 2021 |
A deep learning technique for web phishing detection combined URL features and visual similarity S Al-Ahmadi International Journal of Computer Networks & Communications (IJCNC) Vol 12, 2020 | 26 | 2020 |
PDMLP: phishing detection using multilayer perceptron S Al-Ahmadi International Journal of Network Security & Its Applications (IJNSA) Vol 12, 2020 | 26 | 2020 |
Building an ensemble of fine-tuned naive Bayesian classifiers for text classification K El Hindi, H AlSalman, S Qasem, S Al Ahmadi Entropy 20 (11), 857, 2018 | 24 | 2018 |
HGSORF: Henry Gas Solubility Optimization-based Random Forest for C-Section prediction and XAI-based cause analysis MS Islam, MA Awal, JN Laboni, FT Pinki, S Karmokar, KM Mumenin, ... Computers in Biology and Medicine 147, 105671, 2022 | 22 | 2022 |
Human state anxiety classification framework using EEG signals in response to exposure therapy F Muhammad, S Al-Ahmadi Plos one 17 (3), e0265679, 2022 | 22 | 2022 |
Robust URL Phishing Detection Based on Deep Learning. A Al-Alyan, S Al-Ahmadi KSII Transactions on Internet & Information Systems 14 (7), 2020 | 18 | 2020 |
Shieldrnn: A distributed flow-based ddos detection solution for iot using sequence majority voting F Alasmary, S Alraddadi, S Al-Ahmadi, J Al-Muhtadi IEEE Access 10, 88263-88275, 2022 | 15 | 2022 |
Efficient pooling and collaborative cache management for NDN/IoT networks B Alahmri, S Al-Ahmadi, A Belghith IEEE access 9, 43228-43240, 2021 | 15 | 2021 |