124 results on '"Alhakami, Wajdi"'
Search Results
2. Adaptive control-based Isolated bi-directional converter for G2V& V2G charging with integration of the renewable energy source
3. A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
4. A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework
5. Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
6. P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements
7. A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application
8. Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance
9. Secure MAC protocols for cognitive radio networks
10. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
11. Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach.
12. Advancing Sustainable Healthcare through Enhanced Therapeutic Communication with Elderly Patients in the Kingdom of Saudi Arabia
13. A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System
14. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model.
15. A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G
16. Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method
17. A Lightweight Authentication MAC Protocol for CR-WSNs
18. Reliable and secure X2V energy trading framework for highly dynamic connected electric vehicles
19. A Generic Internet of Things (IoT) Middleware for Smart City Applications
20. A Secure LEACH-PRO Protocol Based on Blockchain
21. A Real-time Privacy System for Electric Vehicles using Blockchain Technology
22. A Numerical Study of the Dynamics of Vector-Born Viral Plant Disorders Using a Hybrid Artificial Neural Network Approach
23. Corrigendum to “A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography” CAEE, Volume 102, September 2022, 108205
24. A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems
25. On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach
26. SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising.
27. SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising
28. Design and Analysis of a 5G Wideband Antenna for Wireless Body-Centric Network
29. Evaluating Intelligent Methods for Detecting COVID-19 Fake News on Social Media Platforms
30. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks
31. A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption
32. Intelligent Reasoning Rules for Home Energy Management (IRRHEM): Algeria Case Study
33. An Effective Secure MAC Protocol for Cognitive Radio Networks
34. A Usability Management Framework for Securing Healthcare Information System
35. Adaptive Control-Based Isolated Bi-Directional Converter for G2v& V2g Charging with Integration of the Renewable Energy Source
36. Efficient Security Architecture for Physical Layer in mmWave Communication Systems
37. Role of Blockchain Technology in Combating COVID-19 Crisis
38. Recognition of Ziziphus lotus through Aerial Imaging and Deep Transfer Learning Approach
39. A Generic Internet of Things (IoT) Middleware for Smart City Applications.
40. Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning Strategy
41. Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment
42. Security and Threats of RFID and WSNs: Comparative Study
43. THE PERFORMANCE OF CIRCULARLY POLARIZED PHASED SUB-ARRAY ANTENNAS FOR 5G LAPTOP DEVICES INVESTIGATING THE RADIATION EFFECTS
44. Healthcare Device Security: Insights and Implications
45. Atrocious Impinging of COVID-19 Pandemic on Software Development Industries
46. Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective
47. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
48. A New SLM-UFMC Model for Universal Filtered Multi-Carrier to Reduce Cubic Metric and Peak to Average Power Ratio in 5G Technology
49. Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security
50. Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.