Abdullah Mohammed Almuhaideb

Orcid: 0000-0002-2004-5324

According to our database1, Abdullah Mohammed Almuhaideb authored at least 33 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Sensor-based identification to detect counterfeit smartphones using Blockchain.
J. Ambient Intell. Humaniz. Comput., December, 2023

A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
Sensors, August, 2023

Design Recommendations for Gate Security Systems and Health Status: A Systematic Review.
IEEE Access, 2023

2022
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine.
Sensors, 2022

Homoglyph Attack Detection Model Using Machine Learning and Hash Function.
J. Sens. Actuator Networks, 2022

Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier.
J. Sens. Actuator Networks, 2022

Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV.
J. Sens. Actuator Networks, 2022

Investigation of the optimal method for generating and verifying the Smartphone's fingerprint: A review.
J. King Saud Univ. Comput. Inf. Sci., 2022

Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment.
Big Data Cogn. Comput., 2022

ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging.
Big Data Cogn. Comput., 2022

FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs.
IEEE Access, 2022

Applications of Artificial Intelligence to Detect Android Botnets: A Survey.
IEEE Access, 2022

2021
A strong smartphone authentication model to control cellular network access using blockchain.
Wirel. Networks, 2021

Applications of Big Data Analytics to Control COVID-19 Pandemic.
Sensors, 2021

E-Triage Systems for COVID-19 Outbreak: Review and Recommendations.
Sensors, 2021

A Process-Based Approach to ABET Accreditation: A Case Study of a Cybersecurity and Digital Forensics Program.
J. Inf. Syst. Educ., 2021

Cough Sound Detection and Diagnosis Using Artificial Intelligence Techniques: Challenges and Opportunities.
IEEE Access, 2021

2020
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture.
Sensors, 2020

A Lightweight and Secure Anonymity Preserving Protocol for WBAN.
IEEE Access, 2020

2019
A Survey on Android Malware Detection Techniques Using Machine Learning Algorithms.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

2015
Authentication in Ubiquitous Networking.
Int. J. Inf. Secur. Priv., 2015

A Hybrid Mobile Authentication Model for Ubiquitous Networking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2012
Analysis of mobile authentication protocols by SVO logic.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

2010
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens
CoRR, 2010

Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping
CoRR, 2010

Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010

A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010

A New Holistic Security Approach for Government Critical Systems: Flooding Prevention.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Information Security Threats Classification Pyramid.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010


  Loading...