Abdulbasit A. Darem

Orcid: 0000-0002-5650-1838

Affiliations:
  • Northern Border University, Arar, Saudi Arabia


According to our database1, Abdulbasit A. Darem authored at least 21 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility.
Int. J. Hum. Comput. Interact., July, 2025

Integrating cyber-physical systems with embedding technology for controlling autonomous vehicle driving.
PeerJ Comput. Sci., 2025

HECOCP: hybrid edge-cloud optimistic concurrency protocol for sensor data transactional services.
Int. Arab J. Inf. Technol., 2025

Strengthening Collaboration via Interlinked Skew Assessment and Rectification (ISAR) in Swarm Robotics.
IEEE Access, 2025

Ensuring Zero Trust Security in Consumer Internet of Things Using Federated Learning-Based Attack Detection Model.
IEEE Access, 2025

2024
Elevating Survivability in Next-Gen IoT-Fog-Cloud Networks: Scheduling Optimization With the Metaheuristic Mountain Gazelle Algorithm.
IEEE Trans. Consumer Electron., February, 2024

Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks.
J. King Saud Univ. Comput. Inf. Sci., 2024

Energy efficiency optimization for 6G multi-IRS multi-cell NOMA vehicle-to-infrastructure communication networks.
Comput. Commun., 2024

Fair resource optimization for cooperative non-terrestrial vehicular networks.
Comput. Networks, 2024

Enhancing smart city IoT communication: A two-layer NOMA-based network with caching mechanisms and optimized resource allocation.
Comput. Networks, 2024

Mathematical Modeling and Simulation of Traffic Flow Control in Urban Environments Using Fuzzy Deep Neural Network With Optimization Algorithm.
IEEE Access, 2024

Empowering Retail Through Advanced Consumer Product Recognition Using Aquila Optimization Algorithm With Deep Learning.
IEEE Access, 2024

2023
Cyber Threats Classifications and Countermeasures in Banking and Financial Sector.
IEEE Access, 2023

BDDTPA: Blockchain-Driven Deep Traffic Pattern Analysis for Enhanced Security in Cognitive Radio Ad-Hoc Networks.
IEEE Access, 2023

2022
Consensus-Based Ensemble Model for Arabic Cyberbullying Detection.
Comput. Syst. Sci. Eng., 2022

Deep-Ensemble and Multifaceted Behavioral Malware Variant Detection Model.
IEEE Access, 2022

2021
Feature Subset Selection for Malware Detection in Smart IoT Platforms.
Sensors, 2021

Visualization and deep-learning-based malware variant detection using OpCode-level features.
Future Gener. Comput. Syst., 2021

Measuring Software Obfuscation Quality-A Systematic Literature Review.
IEEE Access, 2021

An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning.
IEEE Access, 2021

2017
Privacy Threat Analysis of Mobile Social Network Data Publishing.
Proceedings of the Security and Privacy in Communication Networks, 2017


  Loading...