Simulation of wildfire evacuation with dynamic factors and model composition A Beloglazov, M Almashor, E Abebe, J Richter, KCB Steer Simulation Modelling Practice and Theory 60, 144-159, 2016 | 99 | 2016 |
Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things AP Kalapaaking, I Khalil, MS Rahman, M Atiquzzaman, X Yi, M Almashor IEEE Transactions on Industrial Informatics 19 (2), 1703-1714, 2022 | 52 | 2022 |
Spectral analysis of EEG during microsleep events annotated via driver monitoring system to characterize drowsiness C Wang, B Guragain, AK Verma, L Archer, S Majumder, A Mohamud, ... IEEE Transactions on Aerospace and Electronic Systems 56 (2), 1346-1356, 2019 | 33 | 2019 |
On the utility of shelters in wildfire evacuations K Steer, E Abebe, M Almashor, A Beloglazov, X Zhong Fire safety journal 94, 22-32, 2017 | 20 | 2017 |
Enhancing availability in content delivery networks for mobile platforms M Almashor, I Khalil, Z Tari, AY Zomaya, S Sahni IEEE Transactions on Parallel and Distributed Systems 26 (8), 2247-2257, 2014 | 20 | 2014 |
Smpc-based federated learning for 6g-enabled internet of medical things AP Kalapaaking, V Stephanie, I Khalil, M Atiquzzaman, X Yi, M Almashor IEEE Network 36 (4), 182-189, 2022 | 14 | 2022 |
IoT based smart agriculture monitoring, automation and intrusion detection system AF Suhaimi, N Yaakob, SA Saad, KA Sidek, ME Elshaikh, AKY Dafhalla, ... Journal of Physics: Conference Series 1962 (1), 012016, 2021 | 14 | 2021 |
Evaluation of federated learning in phishing email detection C Thapa, JW Tang, A Abuadbba, Y Gao, S Camtepe, S Nepal, ... Sensors 23 (9), 4346, 2023 | 11 | 2023 |
Radial basis function network with differential privacy N Bugshan, I Khalil, N Moustafa, M Almashor, A Abuadbba Future Generation Computer Systems 127, 473-486, 2022 | 9 | 2022 |
Towards web phishing detection limitations and mitigation A Abuadbba, S Wang, M Almashor, ME Ahmed, R Gaire, S Camtepe, ... arXiv preprint arXiv:2204.00985, 2022 | 8 | 2022 |
Automatic and autonomous load management in peer-to-peer virtual environments M Almashor, I Khalil, Z Tari, AY Zomaya IEEE Journal on Selected Areas in Communications 31 (9), 310-324, 2013 | 8 | 2013 |
Characterizing malicious url campaigns M Almashor, E Ahmed, B Pick, S Abuadbba, R Gaire, S Camtepe, S Nepal arXiv preprint arXiv:2108.12726, 2021 | 7 | 2021 |
Resource planning having improved visualization MBA Almashor, H Anjomshoa, A Eberbach, OJ Smith, AJ Swan US Patent 11,315,056, 2022 | 6 | 2022 |
IoT-Based Automated and Contactless Shopping Cart During Pandemic Diseases Outbreak HY Faang, N Yaakob, ME Elshaikh, AK Sidek, OB Lynn, M Almashor Journal of Physics: Conference Series 1962 (1), 012051, 2021 | 6 | 2021 |
Load-balancing properties of 3D Voronoi diagrams in peer-to-peer virtual environments M Almashor, I Khalil 2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010 | 5 | 2010 |
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches R Zelenkova, J Swallow, MAP Chamikara, D Liu, MB Chhetri, S Camtepe, ... arXiv preprint arXiv:2202.10320, 2022 | 4 | 2022 |
Reducing network load in large-scale, peer-to-peer virtual environments with 3d voronoi diagrams M Almashor, I Khalil 2010 International Conference on High Performance Computing, 1-10, 2010 | 4 | 2010 |
Fully peer-to-peer virtual environments with 3D Voronoi diagrams M Almashor, I Khalil Computing 94, 679-700, 2012 | 3 | 2012 |
Dynamic game-play arbitrators with 3d voronoi diagrams M Almashor, I Khalil, G Leach 2010 Ninth IEEE International Symposium on Network Computing and …, 2010 | 3 | 2010 |
PhishClone: Measuring the Efficacy of Cloning Evasion Attacks A Wong, A Abuadbba, M Almashor, S Kanhere arXiv preprint arXiv:2209.01582, 2022 | 2 | 2022 |