Rakan A. Alsowail

According to our database1, Rakan A. Alsowail authored at least 16 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Multi-stage Alzheimer's Disease Classification Using Squeeze Excitation Light Channel Network with a Random Lyrebird: Achieving High Sensitivity and Precision in Early Detection.
Cogn. Comput., August, 2025

Anomaly detection based capsnet for malicious Url detection system.
Wirel. Networks, June, 2025

Advancing object detection performance: random replacement one-one optimized convolutional LeNet algorithm with novel strategies for improved efficiency.
Evol. Syst., June, 2025

Advanced video encryption using the opposition lotus effect-elliptic curve cryptography in signal processing applications.
Signal Image Video Process., May, 2025

Levy flight and secretary bird optimization for cloud security: implementing an advanced DCGAN model for attack prediction.
Earth Sci. Informatics, March, 2025

A systematic PAPR analysis of optical 5G waveforms using advanced and deep learning PAPR algorithms: estimation of PAPR, PSD, and BER.
Wirel. Networks, February, 2025

Active attack compensator control for Takagi-Sugeno fuzzy chaotic Markovian jump systems with cyber attacks.
Commun. Nonlinear Sci. Numer. Simul., 2025

2024
Cognitive Intelligent Decisions for Big Data and Cloud Computing in Industrial Applications using Trifold Algorithms.
Cogn. Comput., November, 2024

2023
Development of edge computing and classification using The Internet of Things with incremental learning for object detection.
Internet Things, October, 2023

Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection.
Int. J. Inf. Sec., June, 2023

Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm.
IEEE Access, 2023

2022
Techniques and countermeasures for preventing insider threats.
PeerJ Comput. Sci., 2022

2021
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques.
Entropy, 2021

2020
Empirical Detection Techniques of Insider Threat Incidents.
IEEE Access, 2020

2016
Secure file sharing.
PhD thesis, 2016

Controlling File Access with Types.
Proceedings of the 11th Workshop on Logical and Semantic Frameworks with Applications, 2016


  Loading...