关注
Shereen Ismail
标题
引用次数
引用次数
年份
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks
KA Darabkh, SS Ismail, M Al-Shurman, IF Jafar, E Alkhader, ...
Journal of Network and Computer Applications 35 (6), 2068-2080, 2012
922012
Dynamic selection techniques for detecting GPS spoofing attacks on UAVs
T Talaei Khoei, S Ismail, N Kaabouch
Sensors 22 (2), 662, 2022
522022
Static clustering for target tracking in wireless sensor networks
SS Ismail, AI Al Khader, KA Darabkh
Global Journal on Technology (Selected Paper of COMENG-2014) 8, 167-173, 2015
292015
A comparative study of machine learning models for cyber-attacks detection in wireless sensor networks
S Ismail, TT Khoei, R Marsh, N Kaabouch
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021
272021
IoT-based water management systems: survey and future research direction
S Ismail, DW Dawoud, N Ismail, R Marsh, AS Alshami
IEEE Access 10, 35942-35952, 2022
252022
Evaluation of naïve bayesian algorithms for cyber-attacks detection in wireless sensor networks
S Ismail, H Reza
2022 IEEE World AI IoT Congress (AIIoT), 283-289, 2022
242022
Boosting-based models with tree-structured parzen estimator optimization to detect intrusion attacks on smart grid
TT Khoei, S Ismail, N Kaabouch
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021
172021
Toward an intelligent blockchain ioT-enabled fish supply chain: A review and conceptual framework
S Ismail, H Reza, K Salameh, H Kashani Zadeh, F Vasefi
Sensors 23 (11), 5136, 2023
162023
A lightweight multilayer machine learning detection system for cyber-attacks in WSN
S Ismail, D Dawoud, H Reza
2022 IEEE 12th annual computing and communication workshop and conference …, 2022
162022
Prison Perimeter Surveillance System Using WSN
AA Shereen S. Ismail, Eman Alkhader
Journal of Computer Science 13 (11), 674-679, 2017
152017
Object Tracking in Wireless Sensor Networks: Challenges and Solutions.
SS Ismail, E Alkhader, S Elnaffar
J. Comput. Sci. 12 (4), 201-212, 2016
152016
Securing wireless sensor networks using machine learning and blockchain: A review
S Ismail, DW Dawoud, H Reza
Future Internet 15 (6), 200, 2023
132023
User selective encryption method for securing MANETs
A Ahmad, S Ismail
International Journal of Electrical and Computer Engineering (IJECE) 8 (5 …, 2018
132018
Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles
T Talaei Khoei, S Ismail, KA Shamaileh, VK Devabhaktuni, N Kaabouch
Applied Sciences 13 (1), 383, 2022
122022
Security vulnerabilities related to web-based data
M Awad, M Ali, M Takruri, S Ismail
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (2), 852-856, 2019
122019
An ensemble-based machine learning approach for cyber-attacks detection in wireless sensor networks
S Ismail, Z El Mrabet, H Reza
Applied Sciences 13 (1), 30, 2022
112022
Towards a lightweight identity management and secure authentication for IoT using blockchain
S Ismail, D Dawoud, H Reza
2022 IEEE World AI IoT Congress (AIIoT), 077-083, 2022
112022
A Blockchain-based IoT Security Solution Using Multichain
S Ismail, H Reza, HK Zadeh, F Vasefi
2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023
92023
Toward management of uncertainty in self-adaptive software systems: IoT case study
S Ismail, K Shah, H Reza, R Marsh, E Grant
Computers 10 (3), 27, 2021
92021
Vehicle safety distance alarming system
HA Attia, S Ismail, HY Ali
2016 5th International Conference on Electronic Devices, Systems and …, 2016
92016
系统目前无法执行此操作,请稍后再试。
文章 1–20