Jalal Al-Muhtadi
Orcid: 0000-0003-0246-2148
According to our database1,
Jalal Al-Muhtadi
authored at least 101 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Crowd Congestion Forecasting Framework Using Ensemble Learning Model and Decision Making Algorithm: Umrah Use Case.
IEEE Access, 2024
2023
Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation.
Comput. Syst. Sci. Eng., 2023
Block-Deep: A Hybrid Secure Data Storage and Diagnosis Model for Bone Fracture Identification of Athlete From X-Ray and MRI Images.
IEEE Access, 2023
2022
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media.
IEEE Access, 2022
ShieldRNN: A Distributed Flow-Based DDoS Detection Solution for IoT Using Sequence Majority Voting.
IEEE Access, 2022
Proceedings of the IEEE International Conference on E-health Networking, 2022
2021
Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications.
IEEE Trans. Intell. Transp. Syst., 2021
A novel Internet of things-based plug-and-play multigas sensor for environmental monitoring.
Trans. Emerg. Telecommun. Technol., 2021
Neuro-fuzzy model for HELLP syndrome prediction in mobile cloud computing environments.
Concurr. Comput. Pract. Exp., 2021
Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry".
IEEE Access, 2021
Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
2020
Multim. Tools Appl., 2020
Trans. Emerg. Telecommun. Technol., 2020
Internet of Medical Things : Remote diagnosis and monitoring application for diabetics.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
2019
Wirel. Commun. Mob. Comput., 2019
IEEE Syst. J., 2019
Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications.
Sensors, 2019
Classification of risk areas using a bootstrap-aggregated ensemble approach for reducing Zika virus infection in pregnant women.
Pattern Recognit. Lett., 2019
Biomedical data analytics in mobile-health environments for high-risk pregnancy outcome prediction.
J. Ambient Intell. Humaniz. Comput., 2019
Int. J. Commun. Syst., 2019
Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
Health Informatics J., 2019
Future Gener. Comput. Syst., 2019
Misty clouds - A layered cloud platform for online user anonymity in Social Internet of Things.
Future Gener. Comput. Syst., 2019
2018
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018
A Robust Deep Learning Approach for Position-Independent Smartphone-Based Human Activity Recognition.
Sensors, 2018
Peer-to-Peer Netw. Appl., 2018
J. Comput. Sci., 2018
Nature-Inspired Algorithm for Training Multilayer Perceptron Networks in e-health Environments for High-Risk Pregnancy Care.
J. Medical Syst., 2018
A robust convolutional neural network for online smartphone-based human activity recognition.
J. Intell. Fuzzy Syst., 2018
Semantic interoperability and pattern classification for a service-oriented architecture in pregnancy care.
Future Gener. Comput. Syst., 2018
Comput. Electr. Eng., 2018
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 10th IEEE Latin-American Conference on Communications, 2018
2017
Behav. Inf. Technol., 2017
Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models.
IEEE Access, 2017
Proceedings of the Eleventh International Conference on Sensing Technology, 2017
2016
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016
Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.
Mob. Inf. Syst., 2016
Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Comput. Hum. Behav., 2016
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
U-prove based security framework for mobile device authentication in eHealth networks.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
2015
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Comput. Hum. Behav., 2015
Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.
Comput. Hum. Behav., 2015
Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Comput. Hum. Behav., 2015
Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks.
Proceedings of the 12th International Conference on Information Technology, 2015
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications.
Proceedings of the 17th International Conference on E-health Networking, 2015
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
2014
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014
2013
Int. J. Distributed Sens. Networks, 2013
2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012
2011
J. King Saud Univ. Comput. Inf. Sci., 2011
Proceedings of the HCI International 2011 - Posters' Extended Abstracts, 2011
2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Proceedings of the Euro-Par 2010 - Parallel Processing, 16th International Euro-Par Conference, Ischia, Italy, August 31, 2010
An Access Control Architecture for Distributing Trust in Pervasive Computing Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
2007
An Efficient Overlay Infrastructure for Privacy-Preserving Communication on the Internet.
J. King Saud Univ. Comput. Inf. Sci., 2007
2006
Guidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004.
Pers. Ubiquitous Comput., 2006
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
PhD thesis, 2005
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005
2004
IEEE Pervasive Comput., 2004
IEEE Distributed Syst. Online, 2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications.
Proceedings of the Middleware 2004, 2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
2003
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
2002
IEEE Wirel. Commun., 2002
Proceedings of the Software Security -- Theories and Systems, 2002
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001
2000
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation.
Proceedings of the International Conference on Internet Computing, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000