Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Abdullah Sharaf Alghamdi
@article{DBLP:journals/eait/AlsudaisAAAAKSA22, author = {Ali S. Alsudais and Abdullah S. Alghamdi and Abdullrhman A. Alharbi and Atif A. Alshehri and Mustafa A. Alzhrani and Sinan Keskin and Muhittin Sahin and Alaa M. Althubaiti}, title = {Social anxiety in E-Learning: Scale validation and socio-demographic correlation study}, journal = {Educ. Inf. Technol.}, volume = {27}, number = {6}, pages = {8189--8201}, year = {2022}, url = {https://doi.org/10.1007/s10639-022-10919-7}, doi = {10.1007/S10639-022-10919-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eait/AlsudaisAAAAKSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/BouchihaMAA17, author = {Djelloul Bouchiha and Mimoun Malki and Abdullah Sharaf Alghamdi and Khalid Al{-}Nafjan}, title = {Htab2RDF: Mapping {HTML} Tables to {RDF} Triples}, journal = {Comput. Informatics}, volume = {36}, number = {6}, pages = {1467--1491}, year = {2017}, url = {https://doi.org/10.4149/cai\_2017\_6\_1467}, doi = {10.4149/CAI\_2017\_6\_1467}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cai/BouchihaMAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/RahmanHHAAP16, author = {Sk. Md. Mizanur Rahman and M. Anwar Hossain and Mohammad Mehedi Hassan and Atif Alamri and Abdullah S. Alghamdi and Mukaddim Pathan}, title = {Secure privacy vault design for distributed multimedia surveillance system}, journal = {Future Gener. Comput. Syst.}, volume = {55}, pages = {344--352}, year = {2016}, url = {https://doi.org/10.1016/j.future.2014.10.019}, doi = {10.1016/J.FUTURE.2014.10.019}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/RahmanHHAAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AlamriHAHAZSA16, author = {Atif Alamri and M. Shamim Hossain and Ahmad Almogren and Mohammad Mehedi Hassan and Khalid Al{-}Nafjan and Mohammed Zakariah and Lee Seyam and Abdullah Sharaf Alghamdi}, title = {QoS-adaptive service configuration framework for cloud-assisted video surveillance systems}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13333--13348}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-3074-7}, doi = {10.1007/S11042-015-3074-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AlamriHAHAZSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SiddiquiAKA16, author = {Zeeshan Siddiqui and Abdul Hanan Abdullah and Muhammad Khurram Khan and Abdullah Sharaf Alghamdi}, title = {Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification}, journal = {Peer-to-Peer Netw. Appl.}, volume = {9}, number = {5}, pages = {841--853}, year = {2016}, url = {https://doi.org/10.1007/s12083-015-0364-9}, doi = {10.1007/S12083-015-0364-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SiddiquiAKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/AlelaiwiASRHM15, author = {Abdulhameed Alelaiwi and Abdullah S. Alghamdi and Mohammad Shorfuzzaman and Majdi Rawashdeh and M. Shamim Hossain and Ghulam Muhammad}, title = {Enhanced engineering education using smart class environment}, journal = {Comput. Hum. Behav.}, volume = {51}, pages = {852--856}, year = {2015}, url = {https://doi.org/10.1016/j.chb.2014.11.061}, doi = {10.1016/J.CHB.2014.11.061}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/AlelaiwiASRHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/HassanHAAAA15, author = {Mohammad Mehedi Hassan and M. Anwar Hossain and Mohammad Abdullah{-}Al{-}Wadud and Tsaheel Al{-}Mudaihesh and Sultan Alyahya and Abdullah Sharaf Alghamdi}, title = {A scalable and elastic cloud-assisted publish/subscribe model for {IPTV} video surveillance system}, journal = {Clust. Comput.}, volume = {18}, number = {4}, pages = {1539--1548}, year = {2015}, url = {https://doi.org/10.1007/s10586-015-0476-2}, doi = {10.1007/S10586-015-0476-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/HassanHAAAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/KamruzzamanHA15, author = {S. M. Kamruzzaman and M. Anwar Hossain and Abdullah Sharaf Alghamdi}, title = {Energy efficient cognitive radio {MAC} protocol for battlefield communications}, booktitle = {{IEEE} 28th Canadian Conference on Electrical and Computer Engineering, {CCECE} 2015, Halifax, NS, Canada, May 3-6, 2015}, pages = {1101--1108}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCECE.2015.7129428}, doi = {10.1109/CCECE.2015.7129428}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccece/KamruzzamanHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scse/AlomairAA15, author = {Yasmeen Alomair and Iftikhar Ahmad and Abdullah Sharaf Alghamdi}, title = {A Review of Evaluation Methods and Techniques for Simulation Packages}, booktitle = {Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, SCSE'15, Berkeley, CA, USA, March 5-6, 2015}, series = {Procedia Computer Science}, volume = {62}, pages = {249--256}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.08.447}, doi = {10.1016/J.PROCS.2015.08.447}, timestamp = {Thu, 08 Jul 2021 14:29:22 +0200}, biburl = {https://dblp.org/rec/conf/scse/AlomairAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KamruzzamanAAH14, author = {S. M. Kamruzzaman and Abdullah Sharaf Alghamdi and Abdulhameed Alelaiwi and Mohammad Mehedi Hassan}, title = {Channel-Slot Aggregation Diversity Based Slot Reservation Scheme for Cognitive Radio Ad Hoc Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/382414}, doi = {10.1155/2014/382414}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KamruzzamanAAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/SiddiquiAKA14, author = {Zeeshan Siddiqui and Abdul Hanan Abdullah and Muhammad Khurram Khan and Abdullah S. Alghamdi}, title = {Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System}, journal = {J. Medical Syst.}, volume = {38}, number = {1}, pages = {9997}, year = {2014}, url = {https://doi.org/10.1007/s10916-013-9997-5}, doi = {10.1007/S10916-013-9997-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/SiddiquiAKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AhmedHSAAE14, author = {Dewan Tanvir Ahmed and M. Anwar Hossain and Shervin Shirmohammadi and Abdullah S. Alghamdi and Pradeep K. Atrey and Abdulmotaleb El{-}Saddik}, title = {Utility based decision support engine for camera view selection in multimedia surveillance systems}, journal = {Multim. Tools Appl.}, volume = {73}, number = {1}, pages = {219--240}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1294-7}, doi = {10.1007/S11042-012-1294-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/AhmedHSAAE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AtreyAHAE14, author = {Pradeep K. Atrey and Saeed Alharthi and M. Anwar Hossain and Abdullah Sharaf Alghamdi and Abdulmotaleb El{-}Saddik}, title = {Collective control over sensitive video data using secret sharing}, journal = {Multim. Tools Appl.}, volume = {73}, number = {3}, pages = {1459--1486}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1644-0}, doi = {10.1007/S11042-013-1644-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AtreyAHAE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/AhmadHAA14, author = {Iftikhar Ahmad and Muhammad Hussain and Abdullah S. Alghamdi and Abdulhameed Alelaiwi}, title = {Enhancing {SVM} performance in intrusion detection using optimal feature subset selection based on genetic principal components}, journal = {Neural Comput. Appl.}, volume = {24}, number = {7-8}, pages = {1671--1682}, year = {2014}, url = {https://doi.org/10.1007/s00521-013-1370-6}, doi = {10.1007/S00521-013-1370-6}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/AhmadHAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KamruzzamanA14, author = {S. M. Kamruzzaman and Abdullah S. Alghamdi}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {A Resource Reservation Scheme in Cognitive Radio Ad Hoc Networks for {C4I} Systems}, booktitle = {28th International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2014 Workshops, Victoria, BC, Canada, May 13-16, 2014}, pages = {879--886}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/WAINA.2014.136}, doi = {10.1109/WAINA.2014.136}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KamruzzamanA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/KamruzzamanAR14, author = {S. M. Kamruzzaman and Abdullah Sharaf Alghamdi and Sk. Md. Mizanur Rahman}, title = {Spectrum and energy aware multipath routing for cognitive radio ad hoc networks}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2014, Busan, South Korea, October 22-24, 2014}, pages = {341--346}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICTC.2014.6983150}, doi = {10.1109/ICTC.2014.6983150}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/KamruzzamanAR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/RahmanKAAAA14, author = {Sk. Md. Mizanur Rahman and S. M. Kamruzzaman and Ahmad Almogren and Abdulhameed Alelaiwi and Atif Alamri and Abdullah Sharaf Alghamdi}, title = {Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks}, booktitle = {2014 {IEEE} International Symposium on Multimedia, {ISM} 2014, Taichung, Taiwan, December 10-12, 2014}, pages = {393--398}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISM.2014.85}, doi = {10.1109/ISM.2014.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ism/RahmanKAAAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HossainSAE13, author = {M. Anwar Hossain and Ali Asghar Nazari Shirehjini and Abdullah S. Alghamdi and Abdulmotaleb El{-}Saddik}, title = {Adaptive interaction support in ambient-aware environments based on quality of context information}, journal = {Multim. Tools Appl.}, volume = {67}, number = {2}, pages = {409--432}, year = {2013}, url = {https://doi.org/10.1007/s11042-012-1008-1}, doi = {10.1007/S11042-012-1008-1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/HossainSAE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/AhmadAAH13, author = {Iftikhar Ahmad and Azween B. Abdullah and Abdullah Sharaf Alghamdi and Muhammad Hussain}, title = {Optimized intrusion detection mechanism using soft computing techniques}, journal = {Telecommun. Syst.}, volume = {52}, number = {4}, pages = {2187--2195}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9541-1}, doi = {10.1007/S11235-011-9541-1}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/AhmadAAH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/KimRAE12, author = {Heung{-}Nam Kim and Majdi Rawashdeh and Abdullah S. Alghamdi and Abdulmotaleb El{-}Saddik}, title = {Folksonomy-based personalized search and ranking in social media services}, journal = {Inf. Syst.}, volume = {37}, number = {1}, pages = {61--76}, year = {2012}, url = {https://doi.org/10.1016/j.is.2011.07.002}, doi = {10.1016/J.IS.2011.07.002}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/is/KimRAE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/HossainHQA12, author = {M. Shamim Hossain and Mohammad Mehedi Hassan and Muhammad Al{-}Qurishi and Abdullah S. Alghamdi}, editor = {Jian Zhang and Dan Schonfeld and David Dagan Feng}, title = {Resource Allocation for Service Composition in Cloud-based Video Surveillance Platform}, booktitle = {2012 {IEEE} International Conference on Multimedia and Expo Workshops, Melbourne, Australia, July 9-13, 2012}, pages = {408--412}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICMEW.2012.77}, doi = {10.1109/ICMEW.2012.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/HossainHQA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cis/HossainEAE11, author = {Mohammod Shamim Hossain and Dia Elghobary and Abdullah S. Alghamdi and Abdulmotaleb El{-}Saddik}, title = {Ant-Based Energy-Efficient Routing Algorithms for Resource Constrained Networks}, journal = {Control. Intell. Syst.}, volume = {39}, number = {4}, year = {2011}, url = {https://doi.org/10.2316/Journal.201.2011.4.201-2293}, doi = {10.2316/JOURNAL.201.2011.4.201-2293}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cis/HossainEAE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sede/HussainAAH11, author = {Tazar Hussain and Abdullah Sharaf Alghamdi and Abdulhameed Alelaiwi and Abdul Haseeb}, editor = {Rym Zalila{-}Wenkstern and Weili Wu}, title = {Modeling Software Engineering Challenges of {C4I} Systems using Assurance Cases}, booktitle = {{ISCA} 20th International Conference on Software Engineering and Data Engineering {(SEDE-2011)} June 20-22, 2011, Imperial Palace Hotel, Las Vegas, Nevada {USA}}, pages = {45--48}, publisher = {{ISCA}}, year = {2011}, timestamp = {Thu, 02 Dec 2021 16:45:01 +0100}, biburl = {https://dblp.org/rec/conf/sede/HussainAAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/AlghamdiUA10, author = {Abdullah Sharaf Alghamdi and Hanif Ullah and Iftikhar Ahmad}, editor = {Frederick C. Harris Jr. and Fei Hu}, title = {Evaluating Encryption Techniques for {C4I} System}, booktitle = {Proceedings of the {ISCA} 23rd International Conference on Computer Applications in Industry and Engineering, {CAINE} 2010, November 8-10 2010, Imperial Palace Hotel, Las Vegas, Nevada, {USA}}, pages = {196--201}, publisher = {{ISCA}}, year = {2010}, timestamp = {Wed, 01 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caine/AlghamdiUA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/AlghamdiHK10, author = {Abdullah Sharaf Alghamdi and Tazar Hussain and Gul Faraz Khan}, editor = {Frederick C. Harris Jr. and Fei Hu}, title = {Enhancing {C4I} Security using Intrusion Detection and Prevention System}, booktitle = {Proceedings of the {ISCA} 23rd International Conference on Computer Applications in Industry and Engineering, {CAINE} 2010, November 8-10 2010, Imperial Palace Hotel, Las Vegas, Nevada, {USA}}, pages = {202--207}, publisher = {{ISCA}}, year = {2010}, timestamp = {Mon, 24 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caine/AlghamdiHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dms/AlghamdiS10, author = {Abdullah S. Alghamdi and Zeeshan Siddiqui}, title = {Common Interoperability Framework for Defense Architectures, {A} Web Semantic approach}, booktitle = {Proceedings of the 16th International Conference on Distributed Multimedia Systems, {DMS} 2010, October 14-16, 2010, Hyatt Lodge at McDonald's Campus, Oak Brook, Illinois, {USA}}, pages = {149--152}, publisher = {Knowledge Systems Institute}, year = {2010}, timestamp = {Fri, 26 Nov 2010 10:09:52 +0100}, biburl = {https://dblp.org/rec/conf/dms/AlghamdiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AlghamdiQAA10, author = {Abdullah Sharaf Alghamdi and Syed Amanullah Quadri and Iftikhar Ahmad and Khalid Al{-}Nafjan}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {A Generic Approach to Security Assured Net-Centric Communications Network Architecture for {C4I} Systems}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {244--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_28}, doi = {10.1007/978-3-642-17610-4\_28}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AlghamdiQAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AhmadAA10, author = {Iftikhar Ahmad and Azween Vitra Abdullah and Abdullah Sharaf Alghamdi}, title = {Remote to Local attack detection using supervised neural network}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678110/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AhmadAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sede/Alghamdi10, author = {Abdullah S. Alghamdi}, editor = {Imad Rahal and Rym Zalila{-}Wenkstern}, title = {An Optimum Selection of Enterprise Service Bus for {DODAF} Based Defense Systems}, booktitle = {{ISCA} 19th International Conference on Software Engineeringand Data Engineering {(SEDE-2010)} June 16-18, 2010, Hilton Fisherman's Wharf, San Francisco, CA, {USA}}, pages = {21--26}, publisher = {{ISCA}}, year = {2010}, timestamp = {Fri, 28 Jan 2011 07:43:08 +0100}, biburl = {https://dblp.org/rec/conf/sede/Alghamdi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serp/AlghamdiAN10, author = {Abdullah Sharaf Alghamdi and Iftikhar Ahmad and Muhammad Nasir}, editor = {Hamid R. Arabnia and Hassan Reza and Leonidas Deligiannidis and Juan Jose Cuadrado{-}Gallego and Vincent Schmidt and Ashu M. G. Solo}, title = {Evaluating {ESB} for {C4I} Architecture Framework Using Analytic Hierarchy Process}, booktitle = {Proceedings of the 2010 International Conference on Software Engineering Research {\&} Practice, {SERP} 2010, July 12-15, 2010, Las Vegas, Nevada, USA, 2 Volumes}, pages = {117--123}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Wed, 01 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/serp/AlghamdiAN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/AhmadAA10, author = {Iftikhar Ahmad and Azween B. Abdullah and Abdullah Sharaf Alghamdi}, editor = {Tai{-}Hoon Kim and Hojjat Adeli}, title = {Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks}, booktitle = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN} 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6059}, pages = {597--602}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13577-4\_53}, doi = {10.1007/978-3-642-13577-4\_53}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/AhmadAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uksim/AlghamdiHK10, author = {Abdullah Sharaf Alghamdi and Tazar Hussain and Gul Faraz Khan}, editor = {David Al{-}Dabass and Alessandra Orsoni and Richard J. Cant and Ajith Abraham}, title = {Enhancing {C4I} Security Using Threat Modeling}, booktitle = {Proceedings of the 12th UKSim, International Conference on Computer Modelling and Simulation, Cambridge, UK, 24-26 March 2010}, pages = {131--136}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/UKSIM.2010.31}, doi = {10.1109/UKSIM.2010.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uksim/AlghamdiHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uksim/AlghamdiSQ10, author = {Abdullah S. Alghamdi and Zeeshan Siddiqui and Syed S. A. Quadri}, editor = {David Al{-}Dabass and Alessandra Orsoni and Richard J. Cant and Ajith Abraham}, title = {A Common Information Exchange Model for Multiple {C4I} Architectures}, booktitle = {Proceedings of the 12th UKSim, International Conference on Computer Modelling and Simulation, Cambridge, UK, 24-26 March 2010}, pages = {538--542}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/UKSIM.2010.104}, doi = {10.1109/UKSIM.2010.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uksim/AlghamdiSQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uksim/AhmadAA10, author = {Iftikhar Ahmad and Azween B. Abdullah and Abdullah Sharaf Alghamdi}, editor = {David Al{-}Dabass and Alessandra Orsoni and Richard J. Cant and Ajith Abraham}, title = {Comparative Analysis of Intrusion Detection Approaches}, booktitle = {Proceedings of the 12th UKSim, International Conference on Computer Modelling and Simulation, Cambridge, UK, 24-26 March 2010}, pages = {586--591}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/UKSIM.2010.112}, doi = {10.1109/UKSIM.2010.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uksim/AhmadAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/AlghamdiUMK09, author = {Abdullah Sharaf Alghamdi and Hanif Ullah and Maqsood Mahmud and Muhammad Khurram Khan}, title = {Bio-chaotic Stream Cipher-Based Iris Image Encryption}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {739--744}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.317}, doi = {10.1109/CSE.2009.317}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cse/AlghamdiUMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AhmadAA09, author = {Iftikhar Ahmad and Azween B. Abdullah and Abdullah Sharaf Alghamdi}, editor = {Atilla El{\c{c}}i and Oleg B. Makarevich and Mehmet A. Orgun and Alexander G. Chefranov and Josef Pieprzyk and Yuri Anatolievich Bryukhomitsky and Siddika Berna {\"{O}}rs}, title = {Application of artificial neural network in detection of {DOS} attacks}, booktitle = {Proceedings of the 2nd International Conference on Security of Information and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10, 2009}, pages = {229--234}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1626195.1626252}, doi = {10.1145/1626195.1626252}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AhmadAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.