Abdullah M. Almuhaideb, PhD
Abdullah M. Almuhaideb, PhD
Imam Abdulrahman Bin Faisal University, College of Computer Science and Information Technology
Verified email at iau.edu.sa - Homepage
Title
Cited by
Cited by
Year
Information security threats classification pyramid
M Alhabeeb, A Almuhaideb, PD Le, B Srinivasan
IEEE 24th international conference on advanced information networking and …, 2010
422010
A Survey on Android Malware Detection Techniques Using Machine Learning Algorithms.
EJ Alqahtani, R Zagrouba, A Almuhaideb
2019 Sixth International Conference on Software Defined Systems (SDS), 110-117, 2019
112019
Applications of Big Data Analytics to Control COVID-19 Pandemic
SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ...
Sensors 21 (7), 2282, 2021
72021
A lightweight and secure anonymity preserving protocol for WBAN
AM Almuhaideb, KS Alqudaihi
IEEE Access 8, 178183-178194, 2020
72020
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks
A Almuhaideb, PD Le, B Srinivasan
IEEE NCA 2011: The 10th International Symposium onNetwork Computing and …, 2011
72011
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance
A Almuhaideb, M Alhabeeb, PD Le, B Srinivasan
IEEE AINA 2010: The 24th International Conference on Advanced Information …, 2010
72010
A lightweight three-factor authentication scheme for WHSN architecture
AM Almuhaideb, KS Alqudaihi
Sensors 20 (23), 6860, 2020
62020
Fostering sustainable quality assurance practices in outcome-based education: lessons learned from ABET accreditation process of computing programs
AM Almuhaideb, S Saeed
Sustainability 12 (20), 8380, 2020
62020
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications
A Almuhaideb, PD Le, B Srinivasan
MobiQuitous 2010: The 7th International ICST Conference on Mobile and …, 2012
62012
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens
AM Almuhaideb, MA Alhabeeb, PD Le, B Srinivasan
Journal of Telecommunications 1 (2), 1-10, 2010
52010
Security Methods Against Potential Physical Attacks on Smartphones
SJ Alsunaidi, AM Almuhaideb
2019 2nd International Conference on Computer Applications & Information …, 2019
32019
A Hybrid Mobile Authentication Model for Ubiquitous Networking
A Almuhaideb, B Srinivasan, PD Le, M Alhabeeb, W Alfehaid
IEEE Trustcom 2015: The 14th International Conference on Trust, Security and …, 2015
32015
Analysis of mobile authentication protocols by SVO logic
A Almuhaideb, B Srinivasan, PD Le, C Wilson, V Malhotra
Proceedings of the 1st International Conference on Security of Internet of …, 2012
32012
Passport-Visa based authentication mechanism for ubiquitous mobile communication
A Almuhaideb, M Alhabeeb, PD Le, B Srinivasan
IEEE The 6th International Conference on Networked Computing (INC), 2010, 1-6, 2010
32010
Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks
AM Almuhaideb
Arabian Journal for Science and Engineering, 1-14, 2021
22021
E-Triage Systems for COVID-19 Outbreak: Review and Recommendations
F Alhaidari, A Almuhaideb, S Alsunaidi, N Ibrahim, N Aslam, IU Khan, ...
Sensors 21 (8), 2845, 2021
22021
The Security Risks Associated With IMEIs And Security Solutions
SJ Alsunaidi, AM Almuhaideb
2019 2nd International Conference on Computer Applications & Information …, 2019
22019
Securing mobile access in ubiquitous networking via non-roaming agreement protocol
T Alharbi, A Almuhaideb, P Le
ICICS 2010: The 12th International Conference on Information and …, 2010
22010
Toward a Ubiquitous Mobile Access Model: A roaming agreement-less approach
A Almuhaideb, T Alharbi, M Alhabeeb, PD Le, B Srinivasan
IEEE SNPD 2010: The 11th ACIS International Conference on Software …, 2010
22010
Holistic approach for critical system security: Flooding prevention
M Alhabeeb, X Wu, A Almuhaideb, PD Le, B Srinivasan
IEEE INC 2010: The 6th International Conference on Networked Computing, 1-8, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20