Muder Almiani
Orcid: 0000-0003-0021-2364
According to our database1,
Muder Almiani
authored at least 48 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks.
Clust. Comput., July, 2024
DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement.
Clust. Comput., July, 2024
Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer's Disease diagnosis.
Clust. Comput., June, 2024
Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing.
Internet Things, April, 2024
Proceedings of the Fifth International Conference on Intelligent Data Science Technologies and Applications, 2024
2023
Incorporating Time-Series Forecasting Techniques to Predict Logistics Companies' Staffing Needs and Order Volume.
Comput., June, 2023
Parallel Metaheuristic Algorithms for Solving Imbalanced Data Classification Problems.
IEEE Access, 2023
Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023
Securing the Digital Fortress: Unveiling the Modern Battleground for Sustainable OSs and the Digital Threatscape.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
2022
Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm.
J. Supercomput., 2022
Sustain. Comput. Informatics Syst., 2022
Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing.
Simul. Model. Pract. Theory, 2022
State-of-art review of information diffusion models and their impact on social network vulnerabilities.
J. King Saud Univ. Comput. Inf. Sci., 2022
Future Gener. Comput. Syst., 2022
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification.
Sensors, 2021
DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network.
Int. J. Mach. Learn. Cybern., 2021
Future Gener. Comput. Syst., 2021
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021
Proceedings of the Eighth International Conference on Software Defined Systems, 2021
2020
A deep recurrent Q network towards self-adapting distributed microservice architecture.
Softw. Pract. Exp., 2020
Simul. Model. Pract. Theory, 2020
Concurr. Comput. Pract. Exp., 2020
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography.
IEEE Access, 2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
2019
Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms.
Future Internet, 2019
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
2018
Int. J. High Perform. Comput. Netw., 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Energy saving and maximize utilization cloud resources allocation via online multi-dimensional vector bin packing.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
2016
Int. J. Inf. Technol. Web Eng., 2016