关注
Amer Aljaedi
Amer Aljaedi
其他姓名Amer Omar Aljaedi
Associate Professor of Cybersecurity at University of Tabuk
在 ut.edu.sa 的电子邮件经过验证
标题
引用次数
引用次数
年份
Comparative analysis of volatile memory forensics: live response vs. memory imaging
A Aljaedi, D Lindskog, P Zavarsky, R Ruhl, F Almari
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
772011
A survey on MAC protocol approaches for underwater wireless sensor networks
A Al Guqhaiman, O Akanbi, A Aljaedi, CE Chow
IEEE Sensors Journal 21 (3), 3916-3932, 2020
642020
Tracer of traffic trajectories in data center networks
AO Aljaedi
US Patent 10,200,279, 2019
392019
Fog big data analysis for IoT sensor application using fusion deep learning
AS Rajawat, P Bedi, SB Goyal, AR Alharbi, A Aljaedi, SS Jamal, ...
Mathematical Problems in Engineering 2021 (1), 6876688, 2021
382021
Construction of s-boxes using different maps over elliptic curves for image encryption
M Ramzan, T Shah, MM Hazzazi, A Aljaedi, AR Alharbi
IEEE Access 9, 157106-157123, 2021
352021
AES based white box cryptography in digital signature verification
PK Shukla, A Aljaedi, PK Pareek, AR Alharbi, SS Jamal
Sensors 22 (23), 9444, 2022
282022
Cryptanalysis of internet of health things encryption scheme based on chaotic maps
N Munir, M Khan, MM Hazzazi, A Aljaedi, AR Alharbi, I Hussain
IEEE Access 9, 105678-105685, 2021
282021
Securing 5G‐IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation
AS Rajawat, P Bedi, SB Goyal, PK Shukla, SS Jamal, AR Alharbi, ...
Mathematical Problems in Engineering 2021 (1), 2330049, 2021
252021
Mapping ERD to knowledge graph
A Elfaki, A Aljaedi, Y Duan
2019 IEEE World Congress on Services (SERVICES) 2642, 110-114, 2019
242019
Enhancing topic clustering for Arabic security news based on k‐means and topic modelling
AR Alharbi, M Hijji, A Aljaedi
Iet Networks 10 (6), 278-294, 2021
172021
An efficient audio encryption scheme based on finite fields
D Shah, T Shah, MM Hazzazi, MI Haider, A Aljaedi, I Hussain
IEEE Access 9, 144385-144394, 2021
162021
IBOOST: a lightweight provably secure identity-based online/offline signature technique based on FCM for massive devices in 5G wireless sensor networks
C Meshram, AL Imoize, A Elhassouny, A Aljaedi, AR Alharbi, SS Jamal
IEEE Access 9, 131336-131347, 2021
162021
Mobile forensics: A review
H Alatawi, K Alenazi, S Alshehri, S Alshamakhi, M Mustafa, A Aljaedi
2020 International Conference on Computing and Information Technology (ICCIT …, 2020
162020
Performance analysis of oracle database in virtual environments
FN Almari, P Zavarsky, R Ruhl, D Lindskog, A Aljaedi
2012 26th International Conference on Advanced Information Networking and …, 2012
162012
Website defacement detection and monitoring methods: A review
M Albalawi, R Aloufi, N Alamrani, N Albalawi, A Aljaedi, AR Alharbi
Electronics 11 (21), 3573, 2022
142022
Predicting rogue content and Arabic spammers on twitter
AR Alharbi, A Aljaedi
Future Internet 11 (11), 229, 2019
132019
Region of interest-based medical image encryption technique based on chaotic S-boxes
SS Jamal, MM Hazzazi, MF Khan, Z Bassfar, A Aljaedi, Z ul Islam
Expert Systems with Applications 238, 122030, 2024
122024
Cyber anonymity based on software-defined networking and Onion Routing (SOR)
A Elgzil, CE Chow, A Aljaedi, N Alamri
2017 IEEE conference on dependable and secure computing, 358-365, 2017
102017
SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps.
C Meshram, AL Imoize, SS Jamal, A Aljaedi, AR Alharbi
Computers, Materials & Continua 71 (3), 2022
92022
Windows and linux random number generation process: A comparative analysis
K Alzhrani, A Aljaedi
International Journal of Computer Applications 113 (8), 2015
92015
系统目前无法执行此操作,请稍后再试。
文章 1–20