default search action
M. Omar Al-Kadri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Mohamed Amine Ben Farah, Yussuf Ahmed, Haitham H. Mahmoud, Syed Attique Shah, M. Omar Al-Kadri, Sandy Taramonli, Xavier J. A. Bellekens, Raouf Abozariba, Moad Idrissi, Adel Aneiba:
A survey on blockchain technology in the maritime industry: Challenges and future perspectives. Future Gener. Comput. Syst. 157: 618-637 (2024) - [j11]Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, Luca Piras, M. Omar Al-Kadri:
Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with XAI. J. Inf. Secur. Appl. 82: 103741 (2024) - [j10]Somaiyeh MahmoudZadeh, Amirmehdi Yazdani, Yashar Kalantari, Bekir Sait Ciftler, Fathi Aidarus, Mhd Omar Al-Kadri:
Holistic Review of UAV-Centric Situational Awareness: Applications, Limitations, and Algorithmic Challenges. Robotics 13(8): 117 (2024) - 2023
- [j9]Muhammad Shadi Hajar, Harsha Kumara Kalutarage, M. Omar Al-Kadri:
3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks. Comput. Networks 237: 110073 (2023) - [j8]Idris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri:
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring. Comput. Secur. 133: 103388 (2023) - [j7]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Luca Piras:
Android Source Code Vulnerability Detection: A Systematic Literature Review. ACM Comput. Surv. 55(9): 187:1-187:37 (2023) - [j6]Sampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Garikayi Madzudzo, Madeline Cheah:
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey. ACM Comput. Surv. 55(11): 237:1-237:40 (2023) - [j5]Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Garikayi Madzudzo:
Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system. J. Inf. Secur. Appl. 77: 103570 (2023) - [c21]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
RRP: A Reliable Reinforcement Learning Based Routing Protocol for Wireless Medical Sensor Networks. CCNC 2023: 781-789 - [c20]Mohamed Amine Ben Farah, M. Omar Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Xavier J. A. Bellekens:
Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies. CSR 2023: 194-199 - [c19]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Luca Piras:
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin. DBSec 2023: 339-357 - [c18]Sampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri:
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis. ESORICS Workshops (2) 2023: 341-356 - [c17]Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, M. Omar Al-Kadri, Luca Piras:
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI. ESORICS Workshops (2) 2023: 426-441 - [c16]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Luca Piras, Andrei Petrovski:
Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models. SECRYPT 2023: 659-666 - 2022
- [c15]Idris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri:
Resource Efficient Federated Deep Learning for IoT Security Monitoring. ADIoT 2022: 122-142 - [c14]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei V. Petrovski, Luca Piras:
Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning. AsiaCCS 2022: 1255-1257 - [c13]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
A Robust Exploration Strategy in Reinforcement Learning Based on Temporal Difference Error. AI 2022: 789-799 - [c12]Idris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri:
Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT Networks. CPSS@AsiaCCS 2022: 41-51 - [c11]Sampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Garikayi Madzudzo, Andrei V. Petrovski:
Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security. CyCom 2022: 309-330 - [c10]Sampath Rajapaksha, Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri:
AI-Powered Vulnerability Detection for Secure Source Code Development. SecITC 2022: 275-288 - [c9]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network. SecureComm 2022: 611-629 - 2021
- [j4]Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha Kumara Kalutarage:
A survey on wireless body area networks: architecture, security challenges and research opportunities. Comput. Secur. 104: 102211 (2021) - [c8]Idris Zakariyya, M. Omar Al-Kadri, Harsha K. Kalutarage:
Resource Efficient Boosting Method for IoT Security Monitoring. CCNC 2021: 1-6 - [c7]Idris Zakariyya, Harsha K. Kaluterage, M. Omar Al-Kadri:
Memory Efficient Federated Deep Learning for Intrusion Detection in IoT Networks. AI-Cybersec@SGAI 2021: 85-99 - [c6]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
TrustMod: A Trust Management Module For NS-3 Simulator. TrustCom 2021: 51-60 - 2020
- [c5]Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage:
ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks. CNS 2020: 1-9 - [c4]Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage:
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks. TrustCom 2020: 1783-1790
2010 – 2019
- 2019
- [j3]M. Omar Al-Kadri, Adnan Aijaz, Arumugam Nallanathan:
X-FDR: A Cross-Layer Routing Protocol for Multihop Full-Duplex Wireless Networks. IEEE Wirel. Commun. 26(2): 70-77 (2019) - [c3]Harsha Kumara Kalutarage, M. Omar Al-Kadri, Madeline Cheah, Garikayi Madzudzo:
Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus. CSCS 2019: 7:1-7:8 - [c2]Idris Zakariyya, M. Omar Al-Kadri, Harsha K. Kalutarage, Andrei Petrovski:
Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm. ICETE (2) 2019: 523-528 - 2018
- [i1]M. Omar Al-Kadri, Adnan Aijaz, Arumugam Nallanathan:
X-FDR: A Cross-Layer Routing Protocol for Multi-hop Full-Duplex Wireless Networks. CoRR abs/1806.01737 (2018) - 2017
- [j2]M. Omar Al-Kadri, Yansha Deng, Adnan Aijaz, Arumugam Nallanathan:
Full-Duplex Small Cells for Next Generation Heterogeneous Cellular Networks: A Case Study of Outage and Rate Coverage Analysis. IEEE Access 5: 8025-8038 (2017) - 2016
- [j1]M. Omar Al-Kadri, Adnan Aijaz, Arumugam Nallanathan:
An Energy-Efficient Full-Duplex MAC Protocol for Distributed Wireless Networks. IEEE Wirel. Commun. Lett. 5(1): 44-47 (2016) - [c1]M. Omar Al-Kadri, Yansha Deng, Arumugam Nallanathan:
Outage Probability of Heterogeneous Cellular Networks with Full-Duplex Small Cells. GLOBECOM 2016: 1-6
Coauthor Index
aka: Andrei V. Petrovski
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint