Omaimah Bamasag

Orcid: 0000-0003-3150-0350

Affiliations:
  • King Abdulaziz University, Jeddah, Saudi Arabia


According to our database1, Omaimah Bamasag authored at least 34 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Diversified Regularization Enhanced Training for Effective Manipulator Calibration.
IEEE Trans. Neural Networks Learn. Syst., November, 2023

Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment.
IEEE Internet Things J., March, 2023

Transaction transmission model for blockchain channels based on non-cooperative games.
Sci. China Inf. Sci., January, 2023

2022
Effective and scalable black-box fuzzing approach for modern web applications.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing.
PeerJ Comput. Sci., 2022

2021
A Performance-Optimized Consensus Mechanism for Consortium Blockchains Consisting of Trust-Varying Nodes.
IEEE Trans. Netw. Sci. Eng., 2021

Radio Coverage and Device Capacity Dimensioning Methodologies for IoT LoRaWAN and NB-IoT Deployments in Urban Environments.
Future Internet, 2021

Congestion Control in Cognitive IoT-Based WSN Network for Smart Agriculture.
IEEE Access, 2021

2020
A survey on heterogeneous mobile networks planning in indoor dense areas.
Pers. Ubiquitous Comput., 2020

Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial Intelligence.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

A Novel Access Control Security Model Based on Ciphertext Policy Attribute-Based Encryption for Smart Homes.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

2019
Bridging Education and Labor Skills by a Novel Competency-Based Course Linked-Data Model.
IEEE Access, 2019

2018
Added Values of Linked Data in Education: A Survey and Roadmap.
Comput., 2018

Nateq Reading Arabic Text for Visually Impaired People.
Proceedings of the Universal Access in Human-Computer Interaction. Methods, Technologies, and Users, 2018

2017
Mobile Cloud Computing: Security Analysis.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

2016
Achieving protection against man-in-the-middle attack in HB family protocols implemented in RFID tags.
Int. J. Pervasive Comput. Commun., 2016

Securing Healthcare Records in the Cloud Using Attribute-Based Encryption.
Comput. Inf. Sci., 2016

2015
Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

2013
Towards healthcare data security in cloud computing.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Improving Autistic Children's Social Skills Using Virtual Reality.
Proceedings of the Design, User Experience, and Usability. Health, Learning, Playing, Cultural, and Cross-Cultural User Experience, 2013

2012
A flexible approach for providing adaptivity in learning management system based on learning styles.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

2011
Exploring consumers acceptance of mobile payments - an empirical study.
Int. J. Inf. Technol. Commun. Convergence, 2011

Dynamic Adaptive Mechanism in Learning Management System Based on Learning Styles.
Proceedings of the ICALT 2011, 2011

2010
A context-constrained authorisation (CoCoA) framework for pervasive grid computing.
Wirel. Networks, 2010

A Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications.
Intell. Inf. Manag., 2010

2009
Towards securing e-transactions in e-government systems of Saudi Arabia.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2006
Reputation management and signature delegation: A distributed approach.
Electron. Commer. Res., 2006

2005
DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications .
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
A secure method for signature delegation to mobile agents.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Achieving Distributed Trusted Services.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A secure proxy signature protocol for agent-based M-commerce applications.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

2003
Towards a Secure Mobile Agent Based M-Commerce System.
Proceedings of the ICEIS 2003, 2003


  Loading...