Mustafa Kaiiali

Orcid: 0000-0003-0783-2777

According to our database1, Mustafa Kaiiali authored at least 15 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection.
Comput. Secur., 2022

2021
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making.
Int. J. Inf. Secur. Priv., 2021

2020
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning.
Comput. Secur., 2020

2019
A cloud-based architecture for mitigating privacy issues in online social networks.
Int. Arab J. Inf. Technol., 2019

A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware.
IEEE Access, 2019

Cloud computing in the quantum era.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.
Secur. Commun. Networks, 2017

Designing a VM-level vertical scalability service in current cloud platforms: a new hope for wearable computers.
Turkish J. Electr. Eng. Comput. Sci., 2017

Weighted grid authorization graph (WGAG).
Proceedings of the Sixth International Conference on Communications and Networking, 2017

2016
Designing a Secure Exam Management System (SEMS) for M-Learning Environments.
IEEE Trans. Learn. Technol., 2016

2013
Grid Authorization Graph.
Future Gener. Comput. Syst., 2013

2012
Concurrent HCM for Authorizing Grid Resources.
Proceedings of the Distributed Computing and Internet Technology, 2012

2010
A Rough Set based PCM for authorizing grid resources.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Enhancing the Hierarchical Clustering Mechanism of Storing Resources' Security Policies in a Grid Authorization System.
Proceedings of the Distributed Computing and Internet Technology, 2010

2009
Rank-Based Genetic Algorithm with Limited Iteration for Grid Scheduling.
Proceedings of the First International Conference on Computational Intelligence, 2009


  Loading...