Omar Alfandi

Orcid: 0000-0002-9581-401X

According to our database1, Omar Alfandi authored at least 89 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Engaging Students With a Chatbot-Based Academic Advising System.
Int. J. Hum. Comput. Interact., June, 2023

A Proposed Artificial Intelligence Model for Android-Malware Detection.
Informatics, 2023

Overhead Based Cluster Scheduling of Mixed Criticality Systems on Multicore Platform.
IEEE Access, 2023

A Review of the Factors Influencing Users' Perception of Metaverse Security and Trust.
Proceedings of the Tenth International Conference on Social Networks Analysis, 2023

A Sentiment Analysis Approach for Identifying Users' Security and Privacy Perception of Metaverse In Twitter.
Proceedings of the International Conference on Smart Applications, 2023

Asma'ak: An Emarati Sign Language Translator.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

2022
ENROUTE: An Entropy Aware Routing Scheme for Information-Centric Networks (ICN).
Wirel. Pers. Commun., 2022

On the Validation of Web X.509 Certificates by TLS Interception Products.
IEEE Trans. Dependable Secur. Comput., 2022

An Intelligent IoT Monitoring and Prediction System for Health Critical Conditions.
Mob. Networks Appl., 2022

Probabilistic analysis of security attacks in cloud environment using hidden Markov models.
Trans. Emerg. Telecommun. Technol., 2022

Twin Delayed Deep Deterministic Policy Gradient-Based Target Tracking for Unmanned Aerial Vehicle With Achievement Rewarding and Multistage Training.
IEEE Access, 2022

Motivation and Hurdles for the Student Adoption of Metaverse-based Classroom: A Qualitative Study.
Proceedings of the International Conference on Computer and Applications, 2022

2021
Optimal Clustering in Wireless Sensor Networks for the Internet of Things Based on Memetic Algorithm: memeWSN.
Wirel. Commun. Mob. Comput., 2021

A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems.
Future Internet, 2021

Outlier Detection: Methods, Models, and Classification.
ACM Comput. Surv., 2021

A Comprehensive Survey of the Tactile Internet: State-of-the-Art and Research Directions.
IEEE Commun. Surv. Tutorials, 2021

A survey on boosting IoT security and privacy through blockchain.
Clust. Comput., 2021

Pros and cons of Blockchain-based approaches in Education.
Proceedings of the IEEE Global Engineering Education Conference, 2021

2020
Bodacious-Instance Coverage Mechanism for Wireless Sensor Network.
Wirel. Commun. Mob. Comput., 2020

Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices.
IEEE Trans. Netw. Serv. Manag., 2020

A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020

An Energy Efficient Routing Approach for IoT Enabled Underwater WSNs in Smart Cities.
Sensors, 2020

IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging.
Future Gener. Comput. Syst., 2020

Consistently accurate forecasts of temperature within buildings from sensor data using ridge and lasso regression.
Future Gener. Comput. Syst., 2020

Peer-to-Peer Blockchain based Energy Trading.
CoRR, 2020

Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading.
Computer, 2020

Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints.
Ad Hoc Networks, 2020

Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography.
IEEE Access, 2020

A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

UAV-Assisted Vehicular Communication for Densely Crowded Environments.
Proceedings of the NOMS 2020, 2020

Blockchain Solution for IoT-based Critical Infrastructures: Byzantine Fault Tolerance.
Proceedings of the NOMS 2020, 2020

A Framework for Predicting Haptic Feedback in Needle Insertion in 5G Remote Robotic Surgery.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

An IoT-Based Non-invasive Diabetics Monitoring System for Crucial Conditions.
Proceedings of the Ad Hoc Networks - 12th EAI International Conference, 2020

2019
Accurately forecasting temperatures in smart buildings using fewer sensors.
Pers. Ubiquitous Comput., 2019

An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT.
IEEE Access, 2019

Non-Orthogonal Radio Resource Management for RF Energy Harvested 5G Networks.
IEEE Access, 2019

Assessment and Hardening of IoT Development Boards.
Proceedings of the Wired/Wireless Internet Communications, 2019

Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Urban Sensing: Towards Security Efficient Sensing Network Scheme.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

An Application of Using Support Vector Machine Based on Classification Technique for Predicting Medical Data Sets.
Proceedings of the Intelligent Computing Theories and Application, 2019

A Fog-Based Architecture for Remote Phobia Treatment.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

Enabling High Performance Fog Computing through Fog-2-Fog Coordination Model.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Incentive Based Relaying in D2D Social Networks.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Fuzzy searching and routing in unstructured mobile peer-to-peer networks.
Clust. Comput., 2018

Remote Data Acquisition Using Raspberry Pi3.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Hardware based Two-Factor User Authentication for the Internet of Things.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

Fog Computing Framework for Internet of Things Applications.
Proceedings of the 11th International Conference on Developments in eSystems Engineering, 2018

A Refinement of Lasso Regression Applied to Temperature Forecasting.
Proceedings of the 9th International Conference on Ambient Systems, 2018

A Novel Feature Selection-Based Sequential Ensemble Learning Method for Class Noise Detection in High-Dimensional Data.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
Open-Source Based Testbed for Multioperator 4G/5G Infrastructure Sharing in Virtual Environments.
Wirel. Commun. Mob. Comput., 2017

Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Selecting Sensors when Forecasting Temperature in Smart Buildings.
Proceedings of the 8th International Conference on Ambient Systems, 2017

E-Healthcare Knowledge Creation Platform Using Action Research.
Proceedings of the Emerging Technologies for Developing Countries, 2017

Cloud Digital Forensics Evaluation and Crimes Detection.
Proceedings of the Emerging Technologies for Developing Countries, 2017

Seamless WSN Connectivity Using Diverse Wireless Links.
Proceedings of the Emerging Technologies for Developing Countries, 2017

2016
Towards an open source architecture for multi-operator LTE core networks.
J. Netw. Comput. Appl., 2016

Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN.
IEEE Access, 2016

A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation.
Proceedings of the IEEE International Smart Cities Conference, 2016

Smart meter: Toward client centric energy efficient smartphone based solution.
Proceedings of the 7th International Conference on Information, 2016

Calculating the Speed of Vehicles Using Wireless Sensor Networks.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

Forecasting Internal Temperature in a Home with a Sensor Network.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Secure and Authenticated Data Communication in Wireless Sensor Networks.
Sensors, 2015

Graph-theoretic characterization of cyber-threat infrastructures.
Digit. Investig., 2015

NGNaaS: NGNs as cloud computing services.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Received signal strength indication for movement detection.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center.
Proceedings of the Global Summit on Computer & Information Technology, 2015

Challenges of leveraging mobile sensing devices in wireless healthcare.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Trust integrated node potential aware routing for WSNs.
Int. J. Trust. Manag. Comput. Commun., 2014

Cheating detection and cheater identification in (t, n) secret sharing scheme.
Comput. Syst. Sci. Eng., 2014

Smart parking system for vehicles.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A New Business Model and Architecture for Context-Aware Applications Provisioning in the Cloud.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

2013
The design and implementation of a wireless healthcare application for WSN-enabled IMS environments.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Towards robust key extraction from multipath wireless channels.
J. Commun. Networks, 2012

Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Fuzzy Logic Election of Node for Routing in WSNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Novel Indirect Trust Based Link State Routing Scheme Using a Robust Route Trust Method for Wireless Sensor Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

On improving the robustness of physical-layer key extraction mechanisms against delay and mobility.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

An optimal sensor deployment scheme to ensure multi level coverage and connectivity in wireless sensor networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2011
Intelligent mechanisms for key generation from multipath wireless channels.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

TAGER: Trust-Aware Georouting Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Security Verification of Trust-Based Authentication Handover in IP Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Trust integrated link state routing protocol for Wireless Sensor Networks (TILSRP).
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2009
A new authentication approach for seamless handover in IP networks: design, modelling, verification and performance evaluation.
PhD thesis, 2009

2008
Enabling Pervasiveness by Seamless Inter-domain Handover: Performance Study of PANA Pre-authentication.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Fast Re-Authentication for Inter-Domain Handover using Context Transfer.
Proceedings of the 2008 International Conference on Information Networking, 2008

Performance Study of PANA Pre-authentication for Interdomain Handover.
Proceedings of the Fourth International Conference on Networking and Services, 2008


  Loading...