Abdullah Mohammed Almuhaideb
Orcid: 0000-0002-2004-5324
According to our database1,
Abdullah Mohammed Almuhaideb
authored at least 33 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
J. Ambient Intell. Humaniz. Comput., December, 2023
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
Sensors, August, 2023
Design Recommendations for Gate Security Systems and Health Status: A Systematic Review.
IEEE Access, 2023
2022
Sensors, 2022
J. Sens. Actuator Networks, 2022
J. Sens. Actuator Networks, 2022
Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV.
J. Sens. Actuator Networks, 2022
Investigation of the optimal method for generating and verifying the Smartphone's fingerprint: A review.
J. King Saud Univ. Comput. Inf. Sci., 2022
Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment.
Big Data Cogn. Comput., 2022
ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging.
Big Data Cogn. Comput., 2022
IEEE Access, 2022
IEEE Access, 2022
2021
A strong smartphone authentication model to control cellular network access using blockchain.
Wirel. Networks, 2021
A Process-Based Approach to ABET Accreditation: A Case Study of a Cybersecurity and Digital Forensics Program.
J. Inf. Syst. Educ., 2021
Cough Sound Detection and Diagnosis Using Artificial Intelligence Techniques: Challenges and Opportunities.
IEEE Access, 2021
2020
Sensors, 2020
2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
2011
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
2010
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens
CoRR, 2010
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping
CoRR, 2010
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010