Year |
Citation |
Score |
2020 |
AsSadhan B, AlShaalan R, Diab DM, Alzoghaiby A, AlShebeili S, Al-Muhtadi J, Bin-Abbas H, El-Samie FEA. A robust anomaly detection method using a constant false alarm rate approach Multimedia Tools and Applications. 79: 12727-12750. DOI: 10.1007/S11042-020-08653-8 |
0.402 |
|
2019 |
Sobral JVV, Rodrigues JJPC, Rabêlo RAL, Al-Muhtadi J, Korotaev V. Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications. Sensors. 19: 2144. PMID 31075837 DOI: 10.3390/S19092144 |
0.454 |
|
2019 |
Silva JC, Rodrigues JJPC, Al-Muhtadi J, Rabêlo RAL, Furtado V. Management Platforms and Protocols for Internet of Things: A Survey. Sensors (Basel, Switzerland). 19. PMID 30736424 DOI: 10.3390/S19030676 |
0.432 |
|
2019 |
Al-Muhtadi J, Shahzad B, Saleem K, Jameel W, Orgun MA. Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment: Health Informatics Journal. 25: 315-329. PMID 28480788 DOI: 10.1177/1460458217706184 |
0.386 |
|
2019 |
Moreira MWL, Rodrigues JJPC, Korotaev V, Al-Muhtadi J, Kumar N. A Comprehensive Review on Smart Decision Support Systems for Health Care Ieee Systems Journal. 13: 3536-3545. DOI: 10.1109/Jsyst.2018.2890121 |
0.326 |
|
2019 |
Sobral JVV, Rodrigues JJPC, Rabêlo RAL, Al-Muhtadi J. Multicast improvement for LOADng in Internet of Things networks Measurement. 148: 106931. DOI: 10.1016/J.Measurement.2019.106931 |
0.438 |
|
2019 |
Avancini DB, Rodrigues JJPC, Martins SGB, Rabêlo RAL, Al-Muhtadi J, Solic P. Energy meters evolution in smart grids: A review Journal of Cleaner Production. 217: 702-715. DOI: 10.1016/J.Jclepro.2019.01.229 |
0.393 |
|
2019 |
Cruz MAAd, Rodrigues JJPC, Lorenz P, Solic P, Al-Muhtadi J, Albuquerque VHCd. A proposal for bridging application layer protocols to HTTP on IoT solutions Future Generation Computer Systems. 97: 145-152. DOI: 10.1016/J.Future.2019.02.009 |
0.415 |
|
2019 |
Moreira MWL, Rodrigues JJPC, Carvalho FHC, Chilamkurti NK, Al-Muhtadi J, Denisov VM. Biomedical data analytics in mobile-health environments for high-risk pregnancy outcome prediction Journal of Ambient Intelligence and Humanized Computing. 10: 4121-4134. DOI: 10.1007/S12652-019-01230-4 |
0.324 |
|
2019 |
GFJ, Rodrigues JJPC, Carvalho LF, Al-Muhtadi JF, MLPJ. A comprehensive survey on network anomaly detection Telecommunication Systems. 70: 447-489. DOI: 10.1007/S11235-018-0475-8 |
0.394 |
|
2018 |
Moreira MWL, Rodrigues JJPC, Kumar N, Al-Muhtadi J, Korotaev V. Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care. Journal of Medical Systems. 42: 51. PMID 29392487 DOI: 10.1007/S10916-017-0887-0 |
0.343 |
|
2018 |
Cruz MAAd, Rodrigues JJPC, Al-Muhtadi J, Korotaev VV, Albuquerque VHCd. A Reference Model for Internet of Things Middleware Ieee Internet of Things Journal. 5: 871-883. DOI: 10.1109/Jiot.2018.2796561 |
0.438 |
|
2018 |
Mahmoud MME, Rodrigues JJPC, Ahmed SH, Shah SC, Al-Muhtadi JF, Korotaev VV, Albuquerque VHCD. Enabling Technologies on Cloud of Things for Smart Healthcare Ieee Access. 6: 31950-31967. DOI: 10.1109/Access.2018.2845399 |
0.409 |
|
2018 |
Al-Muhtadi J, Qiang M, Zeb K, Chaudhry J, Saleem K, Derhab A, Orgun MA, Shankaran R, Imran M, Pasha M. A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems Ieee Access. 6: 16363-16376. DOI: 10.1109/Access.2018.2812741 |
0.391 |
|
2018 |
Abrar H, Hussain SJ, Chaudhry J, Saleem K, Orgun MA, Al-Muhtadi J, Valli C. Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry Ieee Access. 6: 19140-19150. DOI: 10.1109/Access.2018.2805919 |
0.377 |
|
2018 |
Rodrigues JJPC, Segundo DBDR, Junqueira HA, Sabino MH, Prince RM, Al-Muhtadi J, Albuquerque VHCD. Enabling Technologies for the Internet of Health Things Ieee Access. 6: 13129-13141. DOI: 10.1109/Access.2017.2789329 |
0.319 |
|
2018 |
Cruz MAAd, Rodrigues JJPC, Sangaiah AK, Al-Muhtadi J, Korotaev V. Performance evaluation of IoT middleware Journal of Network and Computer Applications. 109: 53-65. DOI: 10.1016/J.Jnca.2018.02.013 |
0.356 |
|
2018 |
Moreira MWL, Rodrigues JJPC, Sangaiah AK, Al-Muhtadi J, Korotaev V. Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care Future Generation Computer Systems. 89: 137-147. DOI: 10.1016/J.Future.2018.04.031 |
0.334 |
|
2018 |
Al-Muhtadi J, Qiang M, Saleem K, AlMusallam M, Rodrigues JJPC. Misty clouds—A layered cloud platform for online user anonymity in Social Internet of Things Future Generation Computer Systems. 92: 812-820. DOI: 10.1016/J.Future.2017.12.040 |
0.426 |
|
2018 |
Mahmoud MME, Rodrigues JJPC, Saleem K, Al-Muhtadi J, Kumar N, Korotaev V. Towards energy-aware fog-enabled cloud of things for healthcare Computers & Electrical Engineering. 67: 58-69. DOI: 10.1016/J.Compeleceng.2018.02.047 |
0.415 |
|
2018 |
AsSadhan B, Bashaiwth A, Al-Muhtadi J, Alshebeili S. Analysis of P2P, IRC and HTTP traffic for botnets detection Peer-to-Peer Networking and Applications. 11: 848-861. DOI: 10.1007/S12083-017-0586-0 |
0.323 |
|
2017 |
AsSadhan B, Zeb K, Al-Muhtadi J, Alshebeili S. Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models Ieee Access. 5: 13501-13519. DOI: 10.1109/Access.2017.2689001 |
0.357 |
|
2017 |
Saleem K, Shahzad B, Orgun MA, Al-Muhtadi J, Rodrigues JJPC, Zakariah M. Design and deployment challenges in immersive and wearable technologies Behaviour & Information Technology. 36: 687-698. DOI: 10.1080/0144929X.2016.1275808 |
0.307 |
|
2017 |
Yaseen M, Saleem K, Orgun MA, Derhab A, Abbas H, Al-Muhtadi J, Iqbal W, Rashid I. Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art Telematics and Informatics. 35: 702-726. DOI: 10.1016/J.Tele.2017.08.005 |
0.411 |
|
2017 |
Moreira MWL, Rodrigues JJPC, Kumar N, Al-Muhtadi J, Korotaev V. Evolutionary radial basis function network for gestational diabetes data analytics Journal of Computational Science. 27: 410-417. DOI: 10.1016/J.Jocs.2017.07.015 |
0.335 |
|
2016 |
Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks. Sensors (Basel, Switzerland). 16: 460. PMID 27043572 DOI: 10.3390/s16040460 |
0.347 |
|
2016 |
Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJPC, Khalil MS, Ahmed AA. Cost-effective encryption-based autonomous routing protocol for efficient and securewireless sensor networks Sensors (Switzerland). 16. DOI: 10.3390/S16040460 |
0.434 |
|
2016 |
Alanazi S, Saleem K, Al-Muhtadi J, Derhab A. Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network Mobile Information Systems. 2016: 1-19. DOI: 10.1155/2016/4853924 |
0.449 |
|
2016 |
Derhab A, Saleem K, Al-Muhtadi J, Orgun MA. Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices Computers in Human Behavior. 59: 9-17. DOI: 10.1016/J.Chb.2016.01.023 |
0.33 |
|
2015 |
Beraka M, Al-Muhtadi J. Critical Comparison of Access Control Models for Cloud Computing Journal of Internet Technology. 16: 431-442. DOI: 10.6138/Jit.2015.16.3.20130124 |
0.371 |
|
2015 |
Abazeed M, Saleem K, Derhab A, Orgun MA, Fisal N, Al-Muhtadi J, Zubair S. A review of secure routing approaches for current and next-generation wireless multimedia sensor networks International Journal of Distributed Sensor Networks. 2015. DOI: 10.1155/2015/524038 |
0.426 |
|
2015 |
Khan J, Abbas H, Al-Muhtadi J. Survey on mobile user's data privacy threats and defense mechanisms Procedia Computer Science. 56: 376-383. DOI: 10.1016/J.Procs.2015.07.223 |
0.402 |
|
2015 |
Saleem K, Derhab A, Al-Muhtadi J, Shahzad B, Orgun MA. Secure transfer of environmental data to enhance human decision accuracy Computers in Human Behavior. 51: 632-639. DOI: 10.1016/J.Chb.2015.01.023 |
0.379 |
|
2015 |
Saleem K, Derhab A, Al-Muhtadi J, Orgun MA. Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience Computers in Human Behavior. 51: 1340-1350. DOI: 10.1016/J.Chb.2014.11.030 |
0.427 |
|
2015 |
Saleem K, Derhab A, Al-Muhtadi J, Shahzad B. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society Computers in Human Behavior. 51: 977-985. DOI: 10.1016/J.Chb.2014.10.010 |
0.386 |
|
2014 |
Saleem K, Fisal N, Al-Muhtadi J. Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol Ieee Sensors Journal. 14: 2232-2239. DOI: 10.1109/Jsen.2014.2308725 |
0.444 |
|
2013 |
Faisal M, Al-Muhtadi J, Al-Dhelaan A. Integrated Protocols to Ensure Security Services in Wireless Sensor Networks International Journal of Distributed Sensor Networks. 9: 740392. DOI: 10.1155/2013/740392 |
0.437 |
|
2011 |
Al-Muhtadi J, Hill R, Al-Rwais S. Original Article: Access control using threshold cryptography for ubiquitous computing environments Journal of King Saud University - Computer and Information Sciences Archive. 23: 71-78. DOI: 10.1016/J.Jksuci.2011.05.003 |
0.387 |
|
2010 |
Al-Rwais S, Al-Muhtadi J. A Context-aware Access Control Model for Pervasive Environments Iete Technical Review. 27: 371. DOI: 10.4103/0256-4602.63847 |
0.356 |
|
2007 |
Al-Muhtadi J. An Efficient Overlay Infrastructure for Privacy-Preserving Communication on the Internet Journal of King Saud University - Computer and Information Sciences Archive. 19: 39-59. DOI: 10.1016/S1319-1578(07)80003-6 |
0.367 |
|
2004 |
Ranganathan A, Al-Muhtadi J, Campbell RH. Reasoning about uncertain contexts in pervasive computing environments Ieee Pervasive Computing. 3: 62-70. DOI: 10.1109/Mprv.2004.1316821 |
0.368 |
|
2004 |
Hill R, Al-Muhtadi J, Campbell R, Kapadia A, Naldurg P, Ranganathan A. A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures Ieee Distributed Systems Online. 5: 1-1. DOI: 10.1109/Mdso.2004.21 |
0.454 |
|
2002 |
Al-Muhtadi J, Mickunas D, Campbell R. A lightweight reconfigurable security mechanism for 3G/4G mobile devices Ieee Wireless Communications. 9: 60-65. DOI: 10.1109/Mwc.2002.998526 |
0.428 |
|
Show low-probability matches. |