Muder Almiani

Orcid: 0000-0003-0021-2364

According to our database1, Muder Almiani authored at least 48 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks.
Clust. Comput., July, 2024

DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement.
Clust. Comput., July, 2024

Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer's Disease diagnosis.
Clust. Comput., June, 2024

Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing.
Internet Things, April, 2024

Knowledge Graph Embedding for Detecting Brand Advocates in Online Social Networks.
Proceedings of the Fifth International Conference on Intelligent Data Science Technologies and Applications, 2024

2023
Incorporating Time-Series Forecasting Techniques to Predict Logistics Companies' Staffing Needs and Order Volume.
Comput., June, 2023

Parallel Metaheuristic Algorithms for Solving Imbalanced Data Classification Problems.
IEEE Access, 2023

Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023

Securing the Digital Fortress: Unveiling the Modern Battleground for Sustainable OSs and the Digital Threatscape.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023

Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm.
J. Supercomput., 2022

Hybrid energy-efficient algorithm for efficient Internet of Things deployment.
Sustain. Comput. Informatics Syst., 2022

Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing.
Simul. Model. Pract. Theory, 2022

State-of-art review of information diffusion models and their impact on social network vulnerabilities.
J. King Saud Univ. Comput. Inf. Sci., 2022

Vehicle routing problems based on Harris Hawks optimization.
J. Big Data, 2022

Energy-efficient and secure mobile fog-based cloud for the Internet of Things.
Future Gener. Comput. Syst., 2022

Transfer Learning Enabled CAD System for Monkey Pox Classification.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Intelligent Ensemble based System for Rare Attacks Dectection in IoT Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification.
Sensors, 2021

DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network.
Int. J. Mach. Learn. Cybern., 2021

Efficient and reliable forensics using intelligent edge computing.
Future Gener. Comput. Syst., 2021

Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Novel File-Checksum Method for Data Duplication Removal of Patients.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

2020
A deep recurrent Q network towards self-adapting distributed microservice architecture.
Softw. Pract. Exp., 2020

Deep recurrent neural network for IoT intrusion detection system.
Simul. Model. Pract. Theory, 2020

Cascaded hybrid intrusion detection model based on SOM and RBF neural networks.
Concurr. Comput. Pract. Exp., 2020

Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography.
IEEE Access, 2020

Secure Password-Driven Fingerprint Biometrics Authentication.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Efficient Context-aware File System Approach.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Android CompCache based on Graphics Processing Unit.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

2019
Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms.
Future Internet, 2019

Pair Data Division Algorithm For Handling Data Classification.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

Fuzzy-GRA Trust Model for Cloud Risk Management.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Intelligent Intrusion Detection Using Radial Basis Function Neural Network.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

A Self Healing Microservices Architecture: A Case Study in Docker Swarm Cluster.
Proceedings of the Advanced Information Networking and Applications, 2019

JMentor: An Ontology-Based Framework for Software Understanding and Reuse.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Location-Based Lattice Mobility Model for Wireless Sensor Networks.
Sensors, 2018

Context-aware latency reduction protocol for secure encryption and decryption.
Int. J. High Perform. Comput. Netw., 2018

Token security for internet of things.
Int. J. Embed. Syst., 2018

Distributed allocating algorithm based on cloud CPU scheme.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Energy saving and maximize utilization cloud resources allocation via online multi-dimensional vector bin packing.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Intelligent intrusion detection system using clustered self organized map.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Naïve Bayesian and Fuzzy C-Means Algorithm for Mobile Malware Detection Precision.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

Enhanced Risk Minimization Framework for Cloud Computing Environment.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2016
Privacy Preserving Framework to Support Mobile Government Services.
Int. J. Inf. Technol. Web Eng., 2016


  Loading...