Jalal Al-Muhtadi

Orcid: 0000-0003-0246-2148

According to our database1, Jalal Al-Muhtadi authored at least 100 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Crowd Management Intelligence Framework: Umrah Use Case.
IEEE Access, 2024

2023
Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation.
Comput. Syst. Sci. Eng., 2023

Block-Deep: A Hybrid Secure Data Storage and Diagnosis Model for Bone Fracture Identification of Athlete From X-Ray and MRI Images.
IEEE Access, 2023

2022
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media.
IEEE Access, 2022

ShieldRNN: A Distributed Flow-Based DDoS Detection Solution for IoT Using Sequence Majority Voting.
IEEE Access, 2022

Cellular IoT based Secure Monitoring System for Smart Environments.
Proceedings of the IEEE International Conference on E-health Networking, 2022

2021
Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications.
IEEE Trans. Intell. Transp. Syst., 2021

A novel Internet of things-based plug-and-play multigas sensor for environmental monitoring.
Trans. Emerg. Telecommun. Technol., 2021

Neuro-fuzzy model for HELLP syndrome prediction in mobile cloud computing environments.
Concurr. Comput. Pract. Exp., 2021

Subjective logic-based trust model for fog computing.
Comput. Commun., 2021

Tweet-Based Bot Detection Using Big Data Analytics.
IEEE Access, 2021

Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry".
IEEE Access, 2021

Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

2020
A robust anomaly detection method using a constant false alarm rate approach.
Multim. Tools Appl., 2020

Performance comparison of programming languages for Internet of Things middleware.
Trans. Emerg. Telecommun. Technol., 2020

Bio-Inspired Network Security for 5G-Enabled IoT Applications.
IEEE Access, 2020

Internet of Medical Things : Remote diagnosis and monitoring application for diabetics.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
A Robust Channel Estimation Scheme for 5G Massive MIMO Systems.
Wirel. Commun. Mob. Comput., 2019

A comprehensive survey on network anomaly detection.
Telecommun. Syst., 2019

A Comprehensive Review on Smart Decision Support Systems for Health Care.
IEEE Syst. J., 2019

Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications.
Sensors, 2019

Management Platforms and Protocols for Internet of Things: A Survey.
Sensors, 2019

Classification of risk areas using a bootstrap-aggregated ensemble approach for reducing Zika virus infection in pregnant women.
Pattern Recognit. Lett., 2019

Biomedical data analytics in mobile-health environments for high-risk pregnancy outcome prediction.
J. Ambient Intell. Humaniz. Comput., 2019

Performance evaluation of Wi-Fi and WiMAX over OFDM physical layer.
Int. J. Commun. Syst., 2019

Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
Health Informatics J., 2019

A proposal for bridging application layer protocols to HTTP on IoT solutions.
Future Gener. Comput. Syst., 2019

Misty clouds - A layered cloud platform for online user anonymity in Social Internet of Things.
Future Gener. Comput. Syst., 2019

2018
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018

A Robust Deep Learning Approach for Position-Independent Smartphone-Based Human Activity Recognition.
Sensors, 2018

Analysis of P2P, IRC and HTTP traffic for botnets detection.
Peer-to-Peer Netw. Appl., 2018

Evolutionary radial basis function network for gestational diabetes data analytics.
J. Comput. Sci., 2018

Performance evaluation of IoT middleware.
J. Netw. Comput. Appl., 2018

Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care.
J. Medical Syst., 2018

A robust convolutional neural network for online smartphone-based human activity recognition.
J. Intell. Fuzzy Syst., 2018

A Reference Model for Internet of Things Middleware.
IEEE Internet Things J., 2018

Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care.
Future Gener. Comput. Syst., 2018

Towards energy-aware fog-enabled cloud of things for healthcare.
Comput. Electr. Eng., 2018

Enabling Technologies for the Internet of Health Things.
IEEE Access, 2018

Enabling Technologies on Cloud of Things for Smart Healthcare.
IEEE Access, 2018

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018

Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry.
IEEE Access, 2018

An IoT-Based Smart Solution for Preventing Domestic CO and LPG Gas Accidents.
Proceedings of the 10th IEEE Latin-American Conference on Communications, 2018

2017
Design and deployment challenges in immersive and wearable technologies.
Behav. Inf. Technol., 2017

Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models.
IEEE Access, 2017

A bio-inspired secure IPv6 communication protocol for Internet of Things.
Proceedings of the Eleventh International Conference on Sensing Technology, 2017

2016
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016

Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.
Mob. Inf. Syst., 2016

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Comput. Hum. Behav., 2016

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

U-prove based security framework for mobile device authentication in eHealth networks.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

2015
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Secure transfer of environmental data to enhance human decision accuracy.
Comput. Hum. Behav., 2015

Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.
Comput. Hum. Behav., 2015

Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Comput. Hum. Behav., 2015

Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks.
Proceedings of the 12th International Conference on Information Technology, 2015

On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications.
Proceedings of the 17th International Conference on E-health Networking, 2015

Survey on Mobile User's Data Privacy Threats and Defense Mechanisms.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

Cryptanalysis and Enhancement of a Password-Based Authentication Scheme.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
De-correlating User Profiles: Exploring Anonymity Tools.
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014

Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Low delay and secure M2M communication mechanism for eHealthcare.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

2013
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
ConSec: Context-Aware Security Framework for Smart Spaces.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Towards Efficient Security Services in Wireless Sensor Networks.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

2011
Access control using threshold cryptography for ubiquitous computing environments.
J. King Saud Univ. Comput. Inf. Sci., 2011

Personal Smart Spaces for Diabetics.
Proceedings of the HCI International 2011 - Posters' Extended Abstracts, 2011

2010
Message from the workshops chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Mobile and Ubiquitous Computing.
Proceedings of the Euro-Par 2010 - Parallel Processing, 16th International Euro-Par Conference, Ischia, Italy, August 31, 2010

An Access Control Architecture for Distributing Trust in Pervasive Computing Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Middleware for Personal Smart Spaces.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Message from the Workshop Co-Organizers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Context-Aware Access Control Model for Pervasive Environments.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
MAGIC Broker: A Middleware Toolkit for Interactive Public Displays.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

2007
An Efficient Overlay Infrastructure for Privacy-Preserving Communication on the Internet.
J. King Saud Univ. Comput. Inf. Sci., 2007

2006
Guidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004.
Pers. Ubiquitous Comput., 2006

Scavenger hunt: computer science retention through orientation.
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006

Context and Location-Aware Encryption for Pervasive Computing Environments.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
An Intelligent Authentication Infrastructure for Ubiquitous Computing Environments
PhD thesis, 2005

Olympus: A High-Level Programming Model for Pervasive Computing Environments.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Towards a Pervasive Computing Benchmark.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

Gaia Microserver: An Extendable Mobile Middleware Platform.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Mobile Gaia: a middleware for ad-hoc pervasive computing.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

2004
Reasoning about Uncertain Contexts in Pervasive Computing Environments.
IEEE Pervasive Comput., 2004

Operators of the temporal object system and their implementation.
Inf. Sci., 2004

A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures.
IEEE Distributed Syst. Online, 2004

Expanding Education through Active Space Collaboration.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Super Spaces: A Middleware for Large-Scale Pervasive Computing Environments.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications.
Proceedings of the Middleware 2004, 2004

Gaia Mobility: Extending Active Space Boundaries to Everyday Devices.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Cerberus: A Context-Aware Security Scheme for Smart Spaces.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

2002
A lightweight reconfigurable security mechanism for 3G/4G mobile devices.
IEEE Wirel. Commun., 2002

Towards Security and Privacy for Pervasive Computing.
Proceedings of the Software Security -- Theories and Systems, 2002

A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
Wearable Security Services.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

2000
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation.
Proceedings of the International Conference on Internet Computing, 2000

Secure Smart Homes using Jini and UIUC SESAME.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000


  Loading...