A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware AO Almashhadani, M Kaiiali, S Sezer, P O’Kane IEEE access 7, 47053-47067, 2019 | 174 | 2019 |
Designing a secure exam management system (SEMS) for M-learning environments M Kaiiali, A Ozkaya, H Altun, H Haddad, M Alier IEEE Transactions on Learning Technologies 9 (3), 258-271, 2016 | 62 | 2016 |
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning AO Almashhadani, M Kaiiali, D Carlin, S Sezer Computers & Security 93, 101787, 2020 | 57 | 2020 |
A new mobile-based multi-factor authentication scheme using pre-shared number, GPS location and time stamp UA Abdurrahman, M Kaiiali, J Muhammad 2013 International Conference on Electronics, Computer and Computation …, 2013 | 35 | 2013 |
MFMCNS: A multi-feature and multi-classifier network-based system for ransomworm detection AO Almashhadani, D Carlin, M Kaiiali, S Sezer Computers & Security 121, 102860, 2022 | 18 | 2022 |
Cloud computing in the quantum era M Kaiiali, S Sezer, A Khalid 2019 IEEE Conference on Communications and Network Security (CNS), 1-4, 2019 | 16 | 2019 |
Trust management for public key infrastructures: Implementing the X. 509 trust broker AS Wazan, R Laborde, DW Chadwick, F Barrere, A Benzekri, M Kaiiali, ... Security and Communication Networks 2017 (1), 6907146, 2017 | 16 | 2017 |
Rank-based genetic algorithm with limited iteration for grid scheduling W Abdulal, O Al Jadaan, A Jabas, S Ramachandram, M Kaiiali, CR Rao 2009 First International Conference on Computational Intelligence …, 2009 | 13 | 2009 |
A secure data outsourcing scheme based on Asmuth–Bloom secret sharing YI Muhammad, M Kaiiali, A Habbal, AS Wazan, A Sani Ilyasu Enterprise Information Systems 10 (9), 1001-1023, 2016 | 11 | 2016 |
Design of a structured fine-grained access control mechanism for authorizing grid resources M Kaiiali, R Wankar, CR Rao, A Agarwal 2008 11th IEEE International Conference on Computational Science and …, 2008 | 10 | 2008 |
Grid authorization graph M Kaiiali, R Wankar, CR Rao, A Agarwal, R Buyya Future Generation Computer Systems 29 (8), 1909-1918, 2013 | 9 | 2013 |
Enhancing the hierarchical clustering mechanism of storing resources’ security policies in a grid authorization system M Kaiiali, R Wankar, CR Rao, A Agarwal Distributed Computing and Internet Technology: 6th International Conference …, 2010 | 9 | 2010 |
New efficient tree-building algorithms for creating HCM decision tree in a grid authorization system M Kaiiali, R Wankar, CR Rao, A Agarwal 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 8 | 2010 |
Cloud-based online social network SI Auwal, SI Faisal, IM Yusuf, H Altun, M Kaiiali, AS Wazan 2013 International Conference on Electronics, Computer and Computation …, 2013 | 7 | 2013 |
A Rough Set based PCM for authorizing grid resources M Kaiiali, R Wankar, CR Rao, A Agarwal 2010 10th International Conference on Intelligent Systems Design and …, 2010 | 6 | 2010 |
A Cloud-based Architecture for Mitigating Privacy Issues in Online Social Networks M Kaiiali, A Iliyasu, AS Wazan, A Habbal, YI Muhammad International Arab Journal of Information Technology, 2019 | 5 | 2019 |
BIND: An indexing strategy for big data processing A Habbal, FB Adamu, S Hassan, R Les Cottrell, B White, M Kaiiali, ... TENCON 2017-2017 IEEE Region 10 Conference, 645-650, 2017 | 5 | 2017 |
RootAsRole: a security module to manage the administrative privileges for Linux AS Wazan, DW Chadwick, R Venant, E Billoir, R Laborde, L Ahmad, ... Computers & Security, 102983, 2022 | 4 | 2022 |
Designing a VM-level vertical scalability service in current cloud platforms: a new hope for wearable computers M Kaiiali Turkish Journal of Electrical Engineering and Computer Sciences 25 (4), 2555 …, 2017 | 3 | 2017 |
Concurrent HCM for authorizing grid resources M Kaiiali, C Raghavendra Rao, R Wankar, A Agarwal Distributed Computing and Internet Technology: 8th International Conference …, 2012 | 3 | 2012 |