Jalal Al-Muhtadi

According to our database1, Jalal Al-Muhtadi authored at least 74 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Robust Channel Estimation Scheme for 5G Massive MIMO Systems.
Wireless Communications and Mobile Computing, 2019

A comprehensive survey on network anomaly detection.
Telecommunication Systems, 2019

A Comprehensive Review on Smart Decision Support Systems for Health Care.
IEEE Systems Journal, 2019

Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications.
Sensors, 2019

Management Platforms and Protocols for Internet of Things: A Survey.
Sensors, 2019

Classification of risk areas using a bootstrap-aggregated ensemble approach for reducing Zika virus infection in pregnant women.
Pattern Recognition Letters, 2019

Performance evaluation of Wi-Fi and WiMAX over OFDM physical layer.
Int. J. Communication Systems, 2019

Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
Health Informatics Journal, 2019

A proposal for bridging application layer protocols to HTTP on IoT solutions.
Future Generation Comp. Syst., 2019

Misty clouds - A layered cloud platform for online user anonymity in Social Internet of Things.
Future Generation Comp. Syst., 2019

2018
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics and Informatics, 2018

A Robust Deep Learning Approach for Position-Independent Smartphone-Based Human Activity Recognition.
Sensors, 2018

Analysis of P2P, IRC and HTTP traffic for botnets detection.
Peer-to-Peer Networking and Applications, 2018

Evolutionary radial basis function network for gestational diabetes data analytics.
J. Comput. Science, 2018

Performance evaluation of IoT middleware.
J. Network and Computer Applications, 2018

Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care.
J. Medical Systems, 2018

A robust convolutional neural network for online smartphone-based human activity recognition.
Journal of Intelligent and Fuzzy Systems, 2018

A Reference Model for Internet of Things Middleware.
IEEE Internet of Things Journal, 2018

Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care.
Future Generation Comp. Syst., 2018

Towards energy-aware fog-enabled cloud of things for healthcare.
Computers & Electrical Engineering, 2018

Enabling Technologies for the Internet of Health Things.
IEEE Access, 2018

Enabling Technologies on Cloud of Things for Smart Healthcare.
IEEE Access, 2018

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018

Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry.
IEEE Access, 2018

An IoT-Based Smart Solution for Preventing Domestic CO and LPG Gas Accidents.
Proceedings of the 10th IEEE Latin-American Conference on Communications, 2018

2017
Design and deployment challenges in immersive and wearable technologies.
Behaviour & IT, 2017

Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models.
IEEE Access, 2017

2016
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016

Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.
Mobile Information Systems, 2016

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Computers in Human Behavior, 2016

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

U-prove based security framework for mobile device authentication in eHealth networks.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

2015
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
IJDSN, 2015

Secure transfer of environmental data to enhance human decision accuracy.
Computers in Human Behavior, 2015

Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.
Computers in Human Behavior, 2015

Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Computers in Human Behavior, 2015

On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications.
Proceedings of the 17th International Conference on E-health Networking, 2015

Survey on Mobile User's Data Privacy Threats and Defense Mechanisms.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

Cryptanalysis and Enhancement of a Password-Based Authentication Scheme.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Low delay and secure M2M communication mechanism for eHealthcare.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

2013
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks.
IJDSN, 2013

2012
ConSec: Context-Aware Security Framework for Smart Spaces.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Towards Efficient Security Services in Wireless Sensor Networks.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

2010
Message from the workshops chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Mobile and Ubiquitous Computing.
Proceedings of the Euro-Par 2010 - Parallel Processing, 16th International Euro-Par Conference, Ischia, Italy, August 31, 2010

An Access Control Architecture for Distributing Trust in Pervasive Computing Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Middleware for Personal Smart Spaces.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Message from the Workshop Co-Organizers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Context-Aware Access Control Model for Pervasive Environments.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
MAGIC Broker: A Middleware Toolkit for Interactive Public Displays.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

2006
Guidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004.
Personal and Ubiquitous Computing, 2006

Scavenger hunt: computer science retention through orientation.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2006

Context and Location-Aware Encryption for Pervasive Computing Environments.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
Olympus: A High-Level Programming Model for Pervasive Computing Environments.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Towards a Pervasive Computing Benchmark.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

Gaia Microserver: An Extendable Mobile Middleware Platform.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

2004
Reasoning about Uncertain Contexts in Pervasive Computing Environments.
IEEE Pervasive Computing, 2004

Operators of the temporal object system and their implementation.
Inf. Sci., 2004

A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures.
IEEE Distributed Systems Online, 2004

Expanding Education through Active Space Collaboration.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Super Spaces: A Middleware for Large-Scale Pervasive Computing Environments.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications.
Proceedings of the Middleware 2004, 2004

Gaia Mobility: Extending Active Space Boundaries to Everyday Devices.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Cerberus: A Context-Aware Security Scheme for Smart Spaces.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

2002
A lightweight reconfigurable security mechanism for 3G/4G mobile devices.
IEEE Wireless Commun., 2002

Towards Security and Privacy for Pervasive Computing.
Proceedings of the Software Security -- Theories and Systems, 2002

A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
Wearable Security Services.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

2000
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation.
Proceedings of the International Conference on Internet Computing, 2000

Secure Smart Homes using Jini and UIUC SESAME.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000


  Loading...