Wajdi Alhakami

Orcid: 0000-0003-1230-9470

According to our database1, Wajdi Alhakami authored at least 29 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Reliable and Secure X2V Energy Trading Framework for Highly Dynamic Connected Electric Vehicles.
IEEE Trans. Veh. Technol., July, 2023

SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising.
Expert Syst. J. Knowl. Eng., June, 2023

A Lightweight Authentication MAC Protocol for CR-WSNs.
Sensors, February, 2023

A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System.
Sensors, 2023

TVUB: Thermal Vision-based UAV and Blockchain-aided Poaching Prevention System.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems.
Symmetry, 2022

A Secure LEACH-PRO Protocol Based on Blockchain.
Sensors, 2022

A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.
Secur. Commun. Networks, 2022

A Numerical Study of the Dynamics of Vector-Born Viral Plant Disorders Using a Hybrid Artificial Neural Network Approach.
Entropy, 2022

On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach.
Entropy, 2022

An Effective Secure MAC Protocol for Cognitive Radio Networks.
Comput. Syst. Sci. Eng., 2022

A Usability Management Framework for Securing Healthcare Information System.
Comput. Syst. Sci. Eng., 2022

A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework.
Comput. Commun., 2022

Corrigendum to "A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography" CAEE, Volume 102, September 2022, 108205.
Comput. Electr. Eng., 2022

A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography.
Comput. Electr. Eng., 2022

Efficient Security Architecture for Physical Layer in mmWave Communication Systems.
IEEE Access, 2022

2021
Atrocious Impinging of COVID-19 Pandemic on Software Development Industries.
Comput. Syst. Sci. Eng., 2021

Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance.
Computing, 2021

Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning Strategy.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2020
A New SLM-UFMC Model for Universal Filtered Multi-Carrier to Reduce Cubic Metric and Peak to Average Power Ratio in 5G Technology.
Symmetry, 2020

Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security.
Symmetry, 2020

Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective.
Symmetry, 2020

Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
Symmetry, 2020

Benchmarking Methodology for Selection of Optimal COVID-19 Diagnostic Model Based on Entropy and TOPSIS Methods.
IEEE Access, 2020

A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software.
IEEE Access, 2020

Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications.
IEEE Access, 2020

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis.
IEEE Access, 2020

2019
Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection.
IEEE Access, 2019

2014
Shared-Key Based Secure MAC Protocol for CRNs.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014


  Loading...