Search

Your search keyword '"Alhakami, Wajdi"' showing total 41 results

Search Constraints

Start Over You searched for: "Alhakami, Wajdi" Remove constraint "Alhakami, Wajdi" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
41 results on '"Alhakami, Wajdi"'

Search Results

9. Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS.

10. Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach.

11. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model.

12. A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System.

13. Advancing Sustainable Healthcare through Enhanced Therapeutic Communication with Elderly Patients in the Kingdom of Saudi Arabia.

14. SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising.

16. Evaluating Intelligent Methods for Detecting COVID-19 Fake News on Social Media Platforms.

17. Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method.

19. A Lightweight Authentication MAC Protocol for CR-WSNs.

20. A Generic Internet of Things (IoT) Middleware for Smart City Applications.

21. A Secure LEACH-PRO Protocol Based on Blockchain.

22. A Numerical Study of the Dynamics of Vector-Born Viral Plant Disorders Using a Hybrid Artificial Neural Network Approach.

23. A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems.

24. A Usability Management Framework for Securing Healthcare Information System.

25. On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach.

26. Design and Analysis of a 5G Wideband Antenna for Wireless Body-Centric Network.

27. The Rise of "Internet of Things": Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks.

28. An Effective Secure MAC Protocol for Cognitive Radio Networks.

29. Intelligent Reasoning Rules for Home Energy Management (IRRHEM): Algeria Case Study.

30. A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.

31. Role of Blockchain Technology in Combating COVID-19 Crisis.

32. Recognition of Ziziphus lotus through Aerial Imaging and Deep Transfer Learning Approach.

33. The Performance of Circularly Polarized Phased Sub-Array Antennas for 5G Laptop Devices Investigating the Radiation Effects.

34. Healthcare Device Security: Insights and Implications.

35. Atrocious Impinging of COVID-19 Pandemic on Software Development Industries.

36. Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security.

37. Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.

38. Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective.

39. Design and Analysis of Triangular Split-Ring Resonator–Based Patch Antenna for High-Speed Terahertz Devices.

40. A New SLM-UFMC Model for Universal Filtered Multi-Carrier to Reduce Cubic Metric and Peak to Average Power Ratio in 5G Technology.

41. The Determinants of Outward Foreign Direct Investment from Latin America and the Caribbean: An Integrated Entropy-Based TOPSIS Multiple Regression Analysis Framework.

Catalog

Books, media, physical & digital resources