Ismail Mohamed Keshta

Orcid: 0000-0001-9803-5882

Affiliations:
  • AlMaarefa University, Riyadh, Saudi Arabia


According to our database1, Ismail Mohamed Keshta authored at least 23 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hybrid disease prediction approach leveraging digital twin and metaverse technologies for health consumer.
BMC Medical Informatics Decis. Mak., December, 2024

Few-shot learning-based human behavior recognition model.
Comput. Hum. Behav., February, 2024

Deep learning model to detect deceptive generative adversarial network generated images using multimedia forensic.
Comput. Electr. Eng., January, 2024

2023
Energy efficient indoor localisation for narrowband internet of things.
CAAI Trans. Intell. Technol., December, 2023

An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering.
Sensors, September, 2023

IoT-Based Federated Learning Model for Hypertensive Retinopathy Lesions Classification.
IEEE Trans. Comput. Soc. Syst., August, 2023

Generic Edge Computing System for Optimization and Computation Offloading of Unmanned Aerial Vehicle.
Comput. Electr. Eng., July, 2023

Blockchain aware proxy re-encryption algorithm-based data sharing scheme.
Phys. Commun., June, 2023

Optimized LightGBM model for security and privacy issues in cyber-physical systems.
Trans. Emerg. Telecommun. Technol., June, 2023

Policy conflict detection approach for decision-making in intelligent industrial Internet of Things.
Comput. Electr. Eng., May, 2023

2022
Analysis of Blockchain in the Healthcare Sector: Application and Issues.
Symmetry, 2022

A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice.
J. King Saud Univ. Comput. Inf. Sci., 2022

A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification.
IEEE Access, 2022

Privacy and Security in Mobile Health Technologies: Challenges and Concerns.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Efficient Email phishing detection using Machine learning.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Efficient Detection of Phishing Websites Using Multilayer Perceptron.
Int. J. Interact. Mob. Technol., 2020

Towards the implementation of requirements management specific practices (SP 1.1 and SP 1.2) for small- and medium-sized software development organisations.
IET Softw., 2020

2019
Approaches to Software Process Improvement: A State-of-the-Art Review.
J. Softw., 2019

2018
Towards Implementation of Process and Product Quality Assurance Process Area for Saudi Arabian Small and Medium Sized Software Development Organizations.
IEEE Access, 2018

2017
Towards Implementation of Requirements Management Specific Practices (SP1.3 and SP1.4) for Saudi Arabian Small and Medium Sized Software Development Organizations.
IEEE Access, 2017

2016
Energy Management in Wireless Sensor Networks Based on Naive Bayes, MLP, and SVM Classifications: A Comparative Study.
J. Sensors, 2016


  Loading...