Amer Aljaedi

Orcid: 0000-0003-4099-5025

According to our database1, Amer Aljaedi authored at least 36 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Region of interest-based medical image encryption technique based on chaotic S-boxes.
Expert Syst. Appl., March, 2024

An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures.
IEEE Access, 2024

Blockchain-Enabled Secure Data Collection Scheme for Fog-Based WBAN.
IEEE Access, 2024

Cognitive Analysis of Neural Networks Using Fractional Metric Dimension and Applications.
IEEE Access, 2024

Image Encryption Based on Elliptic Curve Points and Linear Fractional Transformation.
IEEE Access, 2024

Robustness in Mesh Networks Using Connected Safe Set and Applications.
IEEE Access, 2024

A Novel Approach to Roughness of Linear Diophantine Fuzzy Sets by Fuzzy Relations and Its Application Toward Multi-Criteria Group Decision-Making.
IEEE Access, 2024

DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication.
IEEE Access, 2024

2023
Mostar Index of Neural Networks and Applications.
IEEE Access, 2023

Deep Analysis and Detection of Firewall Anomalies Using Knowledge Graph.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023

2022
Fault Tolerant Addressing Scheme for Oxide Interconnection Networks.
Symmetry, 2022

AES Based White Box Cryptography in Digital Signature Verification.
Sensors, 2022

Energy-efficient and Secure Wireless Communication for Telemedicine in IoT.
Comput. Syst. Sci. Eng., 2022

Fault-Tolerant Partition Resolvability in Mesh Related Networks and Applications.
IEEE Access, 2022

2021
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Sensors, 2021

An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.
Sensors, 2021

DAMAC: A Delay-Aware MAC Protocol for Ad Hoc Underwater Acoustic Sensor Networks.
Sensors, 2021

Enhancing topic clustering for Arabic security news based on k-means and topic modelling.
IET Networks, 2021

An Efficient Audio Encryption Scheme Based on Finite Fields.
IEEE Access, 2021

Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption.
IEEE Access, 2021

Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps.
IEEE Access, 2021

IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks.
IEEE Access, 2021

2020
Neural Networks Based on Latent Dirichlet Allocation For News Web Page Classifications.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence in Engineering and Technology, 2020

2019
Predicting Rogue Content and Arabic Spammers on Twitter.
Future Internet, 2019

Fast Fail-Over Technique for Distributed Controller Architecture in Software-Defined Networks.
IEEE Access, 2019

Mapping ERD to Knowledge Graph.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Preemptive Two-Stage Update Mechanism for Software-Defined Networks.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

Proactive Load Shifting for Distributed SDN Control Plane Architecture.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks.
Proceedings of the 2018 Wireless Days, 2018

PLS: Proactive Load Shifting for Distributed SDN Controllers.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

OTMEN: Offloading Traffic Monitoring to Edge Nodes in Software-Defined Datacenter Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Towards understanding application performance and system behavior with the full dynticks feature.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
Cyber anonymity based on software-defined networking and Onion Routing (SOR).
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Pathseer: a centralized tracer of packet trajectories in software-defined datacenter networks.
Proceedings of the 2016 Principles, Systems and Applications of IP Telecommunications, 2016

2012
Performance Analysis of Oracle Database in Virtual Environments.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011


  Loading...