Abdullah Sharaf Alghamdi

According to our database1, Abdullah Sharaf Alghamdi authored at least 35 papers between 2009 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Htab2RDF: Mapping HTML Tables to RDF Triples.
Comput. Informatics, 2017

Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification.
Peer-to-Peer Netw. Appl., 2016

QoS-adaptive service configuration framework for cloud-assisted video surveillance systems.
Multim. Tools Appl., 2016

Secure privacy vault design for distributed multimedia surveillance system.
Future Gener. Comput. Syst., 2016

A scalable and elastic cloud-assisted publish/subscribe model for IPTV video surveillance system.
Clust. Comput., 2015

Enhanced engineering education using smart class environment.
Comput. Hum. Behav., 2015

A Review of Evaluation Methods and Techniques for Simulation Packages.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Energy efficient cognitive radio MAC protocol for battlefield communications.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components.
Neural Comput. Appl., 2014

Collective control over sensitive video data using secret sharing.
Multim. Tools Appl., 2014

Utility based decision support engine for camera view selection in multimedia surveillance systems.
Multim. Tools Appl., 2014

Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System.
J. Medical Syst., 2014

Channel-Slot Aggregation Diversity Based Slot Reservation Scheme for Cognitive Radio Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2014

Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014

Spectrum and energy aware multipath routing for cognitive radio ad hoc networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

A Resource Reservation Scheme in Cognitive Radio Ad Hoc Networks for C4I Systems.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Optimized intrusion detection mechanism using soft computing techniques.
Telecommun. Syst., 2013

Adaptive interaction support in ambient-aware environments based on quality of context information.
Multim. Tools Appl., 2013

Folksonomy-based personalized search and ranking in social media services.
Inf. Syst., 2012

Resource Allocation for Service Composition in Cloud-based Video Surveillance Platform.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

Ant-Based Energy-Efficient Routing Algorithms for Resource Constrained Networks.
Control. Intell. Syst., 2011

Modeling Software Engineering Challenges of C4I Systems using Assurance Cases.
Proceedings of the ISCA 20th International Conference on Software Engineering and Data Engineering (SEDE-2011) June 20-22, 2011

A Common Information Exchange Model for Multiple C4I Architectures.
Proceedings of the 12th UKSim, 2010

Enhancing C4I Security Using Threat Modeling.
Proceedings of the 12th UKSim, 2010

Comparative Analysis of Intrusion Detection Approaches.
Proceedings of the 12th UKSim, 2010

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Evaluating ESB for C4I Architecture Framework Using Analytic Hierarchy Process.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

An Optimum Selection of Enterprise Service Bus for DODAF Based Defense Systems.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010

Remote to Local attack detection using supervised neural network.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Common Interoperability Framework for Defense Architectures, A Web Semantic approach.
Proceedings of the 16th International Conference on Distributed Multimedia Systems, 2010

Evaluating Encryption Techniques for C4I System.
Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, 2010

Enhancing C4I Security using Intrusion Detection and Prevention System.
Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, 2010

Application of artificial neural network in detection of DOS attacks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Bio-chaotic Stream Cipher-Based Iris Image Encryption.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009