Mohammad Ahmad Alia

Orcid: 0000-0002-1821-7756

According to our database1, Mohammad Ahmad Alia authored at least 16 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Analysis of the optimal number of clusters and probability in homogeneous unreliable WSNs.
Multim. Tools Appl., October, 2023

The Impact of Operational Characteristics on the Total Risk Management: Evidence from the Industrial Firms.
Proceedings of the International Conference on Information Technology, 2023

Key Analysis of Integer Factorizing based Public-Key Cryptosystems Using Machine Learning.
Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence, 2023

2021
Optimal network dimensions for energy conservation in clustered 3D WSN.
Wirel. Networks, 2021

Parallel scalable approximate matching algorithm for network intrusion detection systems.
Int. Arab J. Inf. Technol., 2021

May I Know your IBAN? Cracking the Short Message Service (SMS) as a Second Factor Authentication for Online Payments.
Proceedings of the International Conference on Information Technology, 2021

A Survey on SQL Injection Attack: Detection and Challenges.
Proceedings of the International Conference on Information Technology, 2021

A Tutorial on Singular Value Decomposition with Applications on Image Compression and Dimensionality Reduction.
Proceedings of the International Conference on Information Technology, 2021

Light Fidelity to Transfer Secure Data Using Advanced Encryption Standard Algorithm.
Proceedings of the International Conference on Information Technology, 2021

An Intelligent Arabic Chatbot System Proposed Framework.
Proceedings of the International Conference on Information Technology, 2021

2020
UN-Substituted Video Steganography.
KSII Trans. Internet Inf. Syst., 2020

Improved steganography scheme based on fractal set.
Int. Arab J. Inf. Technol., 2020

2018
A novel method for localising a randomly distributed wireless sensor network.
Int. J. Syst. Assur. Eng. Manag., 2018

Multiprocessing scalable string matching algorithm for network intrusion detection system.
Int. J. High Perform. Syst. Archit., 2018

2016
Combining Public-Key Encryption with Digital Signature Scheme.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2016

2011
A Novel Header Matching Algorithm for Intrusion Detection Systems
CoRR, 2011


  Loading...