default search action
Mohammed Abdullatif Alzain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Hind A. Al-Ghuraybi, Mohammed A. Alzain, Ben Soh:
Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems. Multim. Tools Appl. 83(12): 35629-35672 (2024) - [j30]Hind A. Al-Ghuraybi, Mohammed A. Alzain, Ben Soh:
Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning. Multim. Tools Appl. 83(12): 35673-35707 (2024) - 2023
- [j29]R. Rajadevi, K. Venkatachalam, Mehedi Masud, Mohammed A. Alzain, Mohamed Abouhawwash:
Proof of Activity Protocol for IoMT Data Security. Comput. Syst. Sci. Eng. 44(1): 339-350 (2023) - [j28]G. Ravikumar, K. Venkatachalam, Mohammed A. Alzain, Mehedi Masud, Mohamed Abouhawwash:
Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT. Comput. Syst. Sci. Eng. 44(1): 945-959 (2023) - [j27]Nidhi Gour, Rajneesh Pareek, Karthikeyan Rajagopal, Himanshu Sharma, Mrim M. Alnfiai, Mohammed A. Alzain, Mehedi Masud, Arun Kumar:
A Novel Approximate Message Passing Detection for Massive MIMO 5G System. Comput. Syst. Sci. Eng. 45(3): 2827-2835 (2023) - [j26]Muhammad Zia Ur Rehman, Jawad Ahmad, Emad Sami Jaha, Abdullah Marish Ali, Mohammed A. Alzain, Faisal Saeed:
An Efficient Automated Technique for Classification of Breast Cancer Using Deep Ensemble Model. Comput. Syst. Sci. Eng. 46(1): 897-911 (2023) - [j25]Reetu Gupta, Priyesh Kanungo, Nirmal Dagdee, Golla Madhu, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Nabil Sharaf Almalki, Mohammed A. Alzain:
Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing. Sensors 23(5): 2617 (2023) - [i1]Abdur Rab Dhruba, Kazi Nabiul Alam, Md. Shakib Khan, Sananda Saha, Mohammad Monirujjaman Khan, Mohammed Baz, Mehedi Masud, Mohammed A. Alzain:
IoT-Based Water Quality Assessment System for Industrial Waste WaterHealthcare Perspective. CoRR abs/2304.06491 (2023) - 2022
- [j24]Adlyn Adam Teoh, Norjihan Binti Abdul Ghani, Muneer Ahmad, N. Z. Jhanjhi, Mohammed A. Alzain, Mehedi Masud:
Organizational Data Breach: Building Conscious Care Behavior in Incident Response. Comput. Syst. Sci. Eng. 40(2): 505-515 (2022) - [j23]Norjihan Binti Abdul Ghani, Suraya Hamid, Muneer Ahmad, Younes Saadi, N. Z. Jhanjhi, Mohammed A. Alzain, Mehedi Masud:
Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume. Comput. Syst. Sci. Eng. 40(3): 913-926 (2022) - [j22]Osama S. Faragallah, Walid El Shafai, Ahmed I. Sallam, Ibrahim F. Elashry, El-Sayed El-Rabaie, Ashraf Afifi, Mohammed Abdullatif Alzain, Jehad F. Al-Amri, Fathi E. Abd El-Samie, Hala S. El-sayed:
Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J. Ambient Intell. Humaniz. Comput. 13(2): 1215-1239 (2022) - [j21]Aitizaz Ali, Muhammad Fermi Pasha, Jehad Ali, Ong Huey Fang, Mehedi Masud, Anca Delia Jurcut, Mohammed A. Alzain:
Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography. Sensors 22(2): 528 (2022) - [j20]F. Zahra, NZ Jhanjhi, Sarfraz Nawaz Brohi, Navid Ali Khan, Mehedi Masud, Mohammed A. Alzain:
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning. Sensors 22(18): 6765 (2022) - 2021
- [j19]Badre Bossoufi, Mohammed Karim, Mohammed Taoussi, Hala Alami Aroussi, Manale Bouderbala, Olivier Deblecker, Saad Motahhir, Anand Nayyar, Mohammed A. Alzain:
Rooted Tree Optimization for the Backstepping Power Control of a Doubly Fed Induction Generator Wind Turbine: dSPACE Implementation. IEEE Access 9: 26512-26522 (2021) - [j18]Dalia Abdulkareem Shafiq, Noor Zaman Jhanjhi, Azween B. Abdullah, Mohammed A. Alzain:
A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications. IEEE Access 9: 41731-41744 (2021) - [j17]Rabbani Rasha, Mohammad Monirujjaman Khan, Mehedi Masud, Mohammed A. Alzain:
Investigain: A Productive Asset Management Web Application. Comput. Syst. Sci. Eng. 38(2): 151-164 (2021) - [j16]Halima E. Samra, Alice S. Li, Ben Soh, Mohammed A. Alzain:
Review of Contemporary Database Design and Implication for Big Data. Int. J. Smart Educ. Urban Soc. 12(4): 1-11 (2021) - [j15]Mehedi Masud, Niloy Sikder, Abdullah Al Nahid, Anupam Kumar Bairagi, Mohammed A. Alzain:
A Machine Learning Approach to Diagnosing Lung and Colon Cancer Using a Deep Learning-Based Classification Framework. Sensors 21(3): 748 (2021) - [j14]Shaik Vaseem Akram, Rajesh Singh, Mohammed Abdullatif Alzain, Anita Gehlot, Mamoon Rashid, Osama S. Faragallah, Walid El Shafai, Deepak Prashar:
Performance Analysis of IoT and Long-Range Radio-Based Sensor Node and Gateway Architecture for Solid Waste Management. Sensors 21(8): 2774 (2021) - [j13]Kothai G, E. Poovammal, Gaurav Dhiman, Kadiyala Ramana, Ashutosh Sharma, Mohammed Abdullatif Alzain, Gurjot Singh Gaba, Mehedi Masud:
A New Hybrid Deep Learning Algorithm for Prediction of Wide Traffic Congestion in Smart Cities. Wirel. Commun. Mob. Comput. 2021: 5583874:1-5583874:13 (2021) - 2020
- [j12]Osama S. Faragallah, Ashraf Afifi, Walid El Shafai, Hala S. El-sayed, Ensherah A. Naeem, Mohammed A. Alzain, Jehad F. Al-Amri, Ben Soh, Fathi E. Abd El-Samie:
Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications. IEEE Access 8: 42491-42503 (2020) - [j11]Osama S. Faragallah, Ashraf Afifi, Walid El Shafai, Hala S. El-sayed, Mohammed A. Alzain, Jehad F. Al-Amri, Fathi E. Abd El-Samie:
Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications. IEEE Access 8: 103200-103218 (2020) - [j10]Osama S. Faragallah, Ashraf Afifi, Hala S. El-sayed, Mohammed A. Alzain, Jehad F. Al-Amri, Fathi E. Abd El-Samie, Walid El Shafai:
Efficient HEVC Integrity Verification Scheme for Multimedia Cybersecurity Applications. IEEE Access 8: 167069-167089 (2020) - [j9]Osama S. Faragallah, Mohammed A. Alzain, Hala S. El-sayed, Jehad F. Al-Amri, Walid El Shafai, Ashraf Afifi, Ensherah A. Naeem, Ben Soh:
Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multim. Tools Appl. 79(3-4): 2495-2519 (2020)
2010 – 2019
- 2019
- [j8]Osama S. Faragallah, Mohammed A. Alzain, Hala S. El-sayed, Jehad F. Al-Amri, Walid El Shafai, Ashraf Afifi, Ensherah A. Naeem, Ben Soh:
Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding. IEEE Access 7: 4184-4194 (2019) - [j7]May A. Alotaibi, Mohammed A. Alzain, Ben Soh, Mehedi Masud, Jehad F. Al-Amri:
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - [j6]Suleiman Ali Alsaif, Alice S. Li, Ben Soh, Mohammed A. Alzain, Mehedi Masud:
From Learning Management Systems to a Social Learning Environment: A Comparative Review and the Implications. Int. J. Smart Educ. Urban Soc. 10(1): 1-18 (2019) - 2017
- [j5]Halima E. Samra, Alice S. Li, Ben Soh, Mohammed Abdullatif Alzain:
A Cloud-Based Architecture for Interactive E-Training. Int. J. Knowl. Soc. Res. 8(1): 67-78 (2017) - 2016
- [j4]Mohammed Abdullatif Alzain, Alice S. Li, Ben Soh, Mehedi Masud:
Byzantine Fault-Tolerant Architecture in Cloud Data Management. Int. J. Knowl. Soc. Res. 7(3): 86-98 (2016) - [c7]Halima E. Samra, Ben Soh, Mohammed A. Alzain:
A Conceptual Model for an Intelligent Simulation-Based Learning Management System Using a Data Mining Agent in Clinical Skills Education. ES 2016: 81-88 - 2015
- [j3]Mohammed Abdullatif Alzain, Alice S. Li, Ben Soh, Eric Pardede:
Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes. Int. J. Cloud Appl. Comput. 5(3): 35-52 (2015) - 2014
- [c6]Mohammed Abdullatif Alzain, Ben Soh, Eric Pardede:
Evaluation of multi-cloud computing TMR-based model using a cloud simulator. FSKD 2014: 6-11 - 2013
- [j2]Mohammed A. Alzain, Ben Soh, Eric Pardede:
A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds. J. Softw. 8(5): 1068-1078 (2013) - [c5]Mohammed A. Alzain, Ben Soh, Eric Pardede:
A Byzantine Fault Tolerance Model for a Multi-cloud Computing. CSE 2013: 130-137 - 2012
- [j1]Mohammed Abdullatif Alzain, Ben Soh, Eric Pardede:
A new model to ensure security in cloud computing services. J. Serv. Sci. Res. 4(1): 49-70 (2012) - [c4]Mohammed A. Alzain, Ben Soh, Eric Pardede:
A New approach using redundancy technique to improve security in cloud computing. CyberSec 2012: 230-235 - [c3]Mohammed Abdullatif Alzain, Eric Pardede, Ben Soh, James A. Thom:
Cloud Computing Security: From Single to Multi-clouds. HICSS 2012: 5490-5499 - 2011
- [c2]Mohammed Abdullatif Alzain, Ben Soh, Eric Pardede:
MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. DASC 2011: 784-791 - [c1]Mohammed Abdullatif Alzain, Eric Pardede:
Using Multi Shares for Ensuring Privacy in Database-as-a-Service. HICSS 2011: 1-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-04 03:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint