46 results on '"Alhakami, Wajdi"'
Search Results
2. Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS
3. Adaptive control-based Isolated bi-directional converter for G2V& V2G charging with integration of the renewable energy source
4. A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
5. A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application
6. Secure MAC protocols for cognitive radio networks
7. Advancing Sustainable Healthcare through Enhanced Therapeutic Communication with Elderly Patients in the Kingdom of Saudi Arabia
8. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
9. A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System
10. A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G
11. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model.
12. Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method
13. A Lightweight Authentication MAC Protocol for CR-WSNs
14. Reliable and secure X2V energy trading framework for highly dynamic connected electric vehicles
15. A Generic Internet of Things (IoT) Middleware for Smart City Applications
16. A Secure LEACH-PRO Protocol Based on Blockchain
17. A Numerical Study of the Dynamics of Vector-Born Viral Plant Disorders Using a Hybrid Artificial Neural Network Approach
18. Corrigendum to “A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography” CAEE, Volume 102, September 2022, 108205
19. A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems
20. On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach
21. SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising
22. Design and Analysis of a 5G Wideband Antenna for Wireless Body-Centric Network
23. Evaluating Intelligent Methods for Detecting COVID-19 Fake News on Social Media Platforms
24. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks
25. SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising.
26. A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption
27. Intelligent Reasoning Rules for Home Energy Management (IRRHEM): Algeria Case Study
28. An Effective Secure MAC Protocol for Cognitive Radio Networks
29. A Usability Management Framework for Securing Healthcare Information System
30. Efficient Security Architecture for Physical Layer in mmWave Communication Systems
31. Role of Blockchain Technology in Combating COVID-19 Crisis
32. Recognition of Ziziphus lotus through Aerial Imaging and Deep Transfer Learning Approach
33. A Generic Internet of Things (IoT) Middleware for Smart City Applications.
34. THE PERFORMANCE OF CIRCULARLY POLARIZED PHASED SUB-ARRAY ANTENNAS FOR 5G LAPTOP DEVICES INVESTIGATING THE RADIATION EFFECTS
35. Healthcare Device Security: Insights and Implications
36. Atrocious Impinging of COVID-19 Pandemic on Software Development Industries
37. Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective
38. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
39. A New SLM-UFMC Model for Universal Filtered Multi-Carrier to Reduce Cubic Metric and Peak to Average Power Ratio in 5G Technology
40. Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security
41. Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective
42. A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software
43. Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications
44. Benchmarking Methodology for Selection of Optimal COVID-19 Diagnostic Model Based on Entropy and TOPSIS Methods
45. Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis
46. Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.