关注
Dr. Ismail M. Keshta
Dr. Ismail M. Keshta
Associate Professor, AlMaarefa University
在 um.edu.sa 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Security and privacy of electronic health records: Concerns and challenges
I Keshta, A Odeh
Egyptian Informatics Journal 22 (2), 177-183, 2021
2992021
Towards implementation of requirements management specific practices (SP1. 3 and SP1. 4) for Saudi Arabian small and medium sized software development organizations
I Keshta, M Niazi, M Alshayeb
IEEE Access 5, 24162-24183, 2017
712017
Machine learningtechniquesfor detection of website phishing: A review for promises and challenges
A Odeh, I Keshta, E Abdelfattah
2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021
682021
Analysis of blockchain in the healthcare sector: application and issues
A Odeh, I Keshta, QA Al-Haija
Symmetry 14 (9), 1760, 2022
572022
An experimental analysis of various machine learning algorithms for hand gesture recognition
S Bhushan, M Alshehri, I Keshta, AK Chakraverti, J Rajpurohit, ...
Electronics 11 (6), 968, 2022
492022
Efficient detection of phishing websites using multilayer perceptron
A Odeh, I Keshta, E Abdelfattah
International Association of Online Engineering, 2020
382020
AI-driven IoT for smart health care: Security and privacy issues
I Keshta
Informatics in medicine Unlocked 30, 100903, 2022
332022
Hybrid disease prediction approach leveraging digital twin and metaverse technologies for health consumer
C Kulkarni, A Quraishi, M Raparthi, M Shabaz, MA Khan, RA Varma, ...
BMC Medical Informatics and Decision Making 24 (1), 92, 2024
272024
Hybrid model for precise hepatitis-C classification using improved random forest and SVM method
UK Lilhore, P Manoharan, JK Sandhu, S Simaiya, S Dalal, AM Baqasah, ...
Scientific Reports 13 (1), 12473, 2023
272023
PHIBOOST-a novel phishing detection model using Adaptive boosting approach
A Odeh, I Keshta, E Abdelfattah
Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021
262021
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice
I Keshta
Journal of King Saud University-Computer and Information Sciences 34 (2 …, 2022
242022
Energy management in wireless sensor networks based on naïve bayes, MLP, and SVM classifications: A comparative study
AY Barnawi, IM Keshta
Journal of Sensors 2016 (1), 6250319, 2016
242016
Towards implementation of process and product quality assurance process area for Saudi Arabian small and medium sized software development organizations
I Keshta, M Niazi, M Alshayeb
IEEE Access 6, 41643-41675, 2018
212018
Software cost estimation approaches: A survey
IM Keshta
Journal of Software Engineering and Applications 10 (10), 824, 2017
212017
Analytic hierarchy process based land suitability for organic farming in the arid region
P Mangan, D Pandi, MA Haq, A Sinha, R Nagarajan, T Dasani, I Keshta, ...
Sustainability 14 (8), 4542, 2022
192022
Smart Implementation of Industrial Internet of Things using Embedded Mechatronic System
A Zaidi, I Keshta, Z Gupta, P Pundhir, T Pandey, PK Rai, M Shabaz, ...
IEEE Embedded Systems Letters, 2023
182023
& Simaiya, S. Optimized LightGBM model for security and privacy issues in cyber‐physical systems
S Dalal, M Poongodi, UK Lilhore, F Dahan, T Vaiyapuri, I Keshta
Transactions on Emerging Telecommunications Technologies, e4771, 0
15
Blockchain aware proxy re-encryption algorithm-based data sharing scheme
I Keshta, Y Aoudni, M Sandhu, A Singh, PA Xalikovich, A Rizwan, M Soni, ...
Physical Communication 58, 102048, 2023
142023
Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22 (2), 177–183
I Keshta, A Odeh
142021
Machine vision-based human action recognition using spatio-temporal motion features (STMF) with difference intensity distance group pattern (DIDGP)
J Arunnehru, S Thalapathiraj, R Dhanasekar, L Vijayaraja, R Kannadasan, ...
Electronics 11 (15), 2363, 2022
132022
系统目前无法执行此操作,请稍后再试。
文章 1–20