Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption J Khan, GA Khan, JP Li, MF AlAjmi, AU Haq, S Khan, N Ahmad, ... Scientific Programming 2022, 1-22, 2022 | 25 | 2022 |
Efficient secure surveillance on smart healthcare IoT system through cosine-transform encryption J Khan, JP Li, AU Haq, GA Khan, S Ahmad, A Abdullah Alghamdi, ... Journal of Intelligent & Fuzzy Systems 40 (1), 1417-1442, 2021 | 23 | 2021 |
Design and implementation of a computer aided intelligent examination system A Alghamdi, M Alanezi, F Khan International Journal of Emerging Technologies in Learning (iJET) 15 (1), 30-44, 2020 | 23 | 2020 |
Role of firewall technology in network security M Imran, B Ahmad International Journal of Innovations & Advancement in Computer Science 4 (12 …, 2015 | 16 | 2015 |
Multi-view clustering based on multiple manifold regularized non-negative sparse matrix factorization MA Khan, GA Khan, J Khan, MR Khan, I Atoum, N Ahmad, M Shahid, ... IEEE Access 10, 113249-113259, 2022 | 12 | 2022 |
Studying faculty members’ readiness to use Shaqra University e-learning platform R Alotaibi, A Alghamdi Indonesian Journal of Electrical Engineering and Computer Science 22 (3 …, 2021 | 9 | 2021 |
Computerized steganographic technique using fuzzy logic AA Alghamdi International Journal of Advanced Computer Science and Applications 9 (3), 2018 | 9 | 2018 |
Cybersecurity threats to Healthcare Sectors during COVID-19 A Alghamdi 2022 2nd International Conference on Computing and Information Technology …, 2022 | 8 | 2022 |
Effective penetration testing report writing AA Alghamdi 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 8 | 2021 |
Developing a blockchain-based digitally secured model for the educational sector in Saudi Arabia toward digital transformation S Alangari, SM Alshahrani, NA Khan, AA Alghamdi, J Almalki, W Al Shehri PeerJ Computer Science 8, e1120, 2022 | 5 | 2022 |
Software engineering: Architecture, design and frameworks M Imran, AA Alghamdi, B Ahmad International Journal of Computer Science and Mobile Computing 5 (3), 801-815, 2016 | 5 | 2016 |
Overview of cybersecurity challenges in Fourth Industrial Revolution AA Alghamdi Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (7), 565-570, 2021 | 3 | 2021 |
Computerised Information Security Using Texture Based Fuzzy Cryptosystem AA Alghamdi Engineering, Technology & Applied Science Research 8 (6), 3598-3602, 2018 | 3 | 2018 |
Information Security using Steganographic Method: Genetic Algorithm and Texture Features AA Alghamdi Indian Journal of Science and Technology, 1-6, 2018 | 3 | 2018 |
Cyberthreats Facing High School Students and Methods of Addressing them AA Alghamdi جامعة نايف العربية للعلوم الأمنية, 2022 | 2 | 2022 |
Image encryption enabling chaotic ergodicity with logistic and sine map MA Khan, J Khan, AA Alghamdi, SMAB Saidan International Journal of Advanced Computer Science and Applications 12 (7), 2021 | 2 | 2021 |
Novel framework for proposed intelligent examination system AA Alghamdi, MA Alanezi, F Khan Indian Journal of Science and Technology 12 (25), 1-4, 2019 | 2 | 2019 |
Information security and steganography technique for data embedding using fuzzy inference system AA Alghamdi Int. J. Adv. Appl. Sci 6 (3), 12-16, 2019 | 2 | 2019 |
SQL injection attack, still an unaddressed issue with dynamic web applications A Alghamdi, B Ahmad, M Imran International Journal of Computer Science Engineering 4 (6), 2015 | 2 | 2015 |
Studying the dimensions of m-interactivity and customers’ engagement in m-commerce applications AA Alghamdi PeerJ Computer Science 9, e1392, 2023 | 1 | 2023 |