Muath Obaidat
Orcid: 0000-0003-2963-7315
According to our database1,
Muath Obaidat
authored at least 20 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Exploring the convergence of Metaverse, Blockchain, and AI: A comprehensive survey of enabling technologies, applications, challenges, and future directions.
WIREs Data. Mining. Knowl. Discov., 2024
2023
Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions.
IEEE Access, 2023
Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges.
IEEE Access, 2023
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
Proceedings of the Ninth International Conference on Software Defined Systems, 2022
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022
2021
A novel Paradigm for Access Control Trust in IoT Applications: A Distributed Cross-Communication Approach.
Proceedings of the 13th IFIP Wireless and Mobile Networking Conference, 2021
Artificial Intelligence Bias Minimization Via Random Sampling Technique of Adversary Data.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021
Proceedings of the IEEE World AI IoT Congress, 2021
2020
A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication.
Sensors, 2020
A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures.
Comput., 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
2019
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019
Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography.
Proceedings of the Security, Privacy and Trust in the IoT Environment, 2019
2013
2011
QoS-aware Multipath Routing Protocol for Delay Sensitive Applications in MANETs - A Cross-layer Approach.
Proceedings of the WINSYS 2011, 2011