Eesa Alsolami

Orcid: 0000-0003-0132-6662

According to our database1, Eesa Alsolami authored at least 20 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management.
IEEE Access, 2024

Enhanced IoT Security for DDOS Attack Detection: Split Attention-Based ResNeXt-GRU Ensembler Approach.
IEEE Access, 2024

Toward Multi-Modal Approach for Identification and Detection of Cyberbullying in Social Networks.
IEEE Access, 2024

2022
Optimal policy learning for COVID-19 prevention using reinforcement learning.
J. Inf. Sci., 2022

2021
Replication-aware secure resource administration scheme for Internet of Things-smart city applications.
Trans. Emerg. Telecommun. Technol., 2021

Travellers decision making through preferences learning: A case on Malaysian spa hotels in TripAdvisor.
Comput. Ind. Eng., 2021

2020
Formal Verification of Hardware Components in Critical Systems.
Wirel. Commun. Mob. Comput., 2020

Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme.
Entropy, 2020

Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation.
Complex., 2020

A Novel Modular Approach Based Substitution-Box Design for Image Encryption.
IEEE Access, 2020

ACC_TEST: Hybrid Testing Approach for OpenACC-Based Programs.
IEEE Access, 2020

Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures.
IEEE Access, 2020

2019
Construction of a stable vehicular ad hoc network based on hybrid genetic algorithm.
Telecommun. Syst., 2019

An adjusted K-medoids clustering algorithm for effective stability in vehicular ad hoc networks.
Int. J. Commun. Syst., 2019

2018
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos.
Symmetry, 2018

A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes.
Entropy, 2018

Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map.
Complex., 2018

A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes.
IEEE Access, 2018

2011
User-representative feature selection for keystroke dynamics.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Continuous Biometric Authentication: Can It Be More Practical?
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010


  Loading...