Role of firewall technology in network security M Imran, B Ahmad International Journal of Innovations & Advancement in Computer Science 4 (12 …, 2015 | 17 | 2015 |
Efficient secure surveillance on smart healthcare IoT system through cosine-transform encryption J Khan, JP Li, AU Haq, GA Khan, S Ahmad, A Abdullah Alghamdi, ... Journal of Intelligent & Fuzzy Systems 40 (1), 1417-1442, 2021 | 16 | 2021 |
Design and implementation of a computer aided intelligent examination system A Alghamdi, M Alanezi, F Khan International Journal of Emerging Technologies in Learning (iJET) 15 (1), 30-44, 2020 | 16 | 2020 |
Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption J Khan, GA Khan, JP Li, MF AlAjmi, AU Haq, S Khan, N Ahmad, ... Scientific Programming 2022, 2022 | 10 | 2022 |
Computerized steganographic technique using fuzzy logic AA Alghamdi International Journal of Advanced Computer Science and Applications 9 (3), 2018 | 7 | 2018 |
Multi-View Clustering Based on Multiple Manifold Regularized Non-Negative Sparse Matrix Factorization MA Khan, GA Khan, J Khan, MR Khan, I Atoum, N Ahmad, M Shahid, ... IEEE Access 10, 113249-113259, 2022 | 6 | 2022 |
Software engineering: Architecture, design and frameworks M Imran, AA Alghamdi, B Ahmad International Journal of Computer Science and Mobile Computing 5 (3), 801-815, 2016 | 5 | 2016 |
Cybersecurity threats to Healthcare Sectors during COVID-19 A Alghamdi 2022 2nd International Conference on Computing and Information Technology …, 2022 | 3 | 2022 |
Overview of Cybersecurity Challenges in Fourth Industrial Revolution AA Alghamdi Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (7), 565-570, 2021 | 3 | 2021 |
Information Security using Steganographic Method: Genetic Algorithm and Texture AA Alghamdi Indian Journal of Science and Technology 11, 34, 2018 | 3 | 2018 |
Effective Penetration Testing Report Writing AA Alghamdi 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 2 | 2021 |
Image encryption enabling chaotic ergodicity with logistic and sine map MA Khan, J Khan, AA Alghamdi, SMAB Saidan International Journal of Advanced Computer Science and Applications 12 (7), 2021 | 2 | 2021 |
Novel framework for proposed intelligent examination system AA Alghamdi, MA Alanezi, F Khan Indian Journal of Science and Technology 12 (25), 1-4, 2019 | 2 | 2019 |
Information security and steganography technique for data embedding using fuzzy inference system AA Alghamdi Int. J. Adv. Appl. Sci 6 (3), 12-16, 2019 | 2 | 2019 |
SQL injection attack, still an unaddressed issue with dynamic web applications A Alghamdi, B Ahmad, M Imran International Journal of Computer Science Engineering 4 (6), 2015 | 2 | 2015 |
Progress of Nursing Informatics for Mental Health Initiatives A Alenezi, AA Alghamdi 2022 Second International Conference on Interdisciplinary Cyber Physical …, 2022 | | 2022 |
A Comparative Analysis to Advancing the National Cybersecurity Strategy in Saudi Arabia AA Alghamdi Journal of Engineering and Applied Sciences 9 (1), 12-12, 2022 | | 2022 |
Research Article Secure Smart Healthcare Monitoring in Industrial Internet of Things (IIoT) Ecosystem with Cosine Function Hybrid Chaotic Map Encryption J Khan, GA Khan, JP Li, MF AlAjmi, AU Haq, S Khan, N Ahmad, ... | | 2022 |
A Novel Architecture for Information Security using Division and Pixel Matching Techniques AA Alghamdi International Journal of Advanced Computer Science and Applications 10 (1), 2019 | | 2019 |
Computerised Information Security Using Texture Based Fuzzy Cryptosystem AA Alghamdi Engineering, Technology & Applied Science Research 8 (6), 3598-3602, 2018 | | 2018 |