Osama Ahmed Khashan

Orcid: 0000-0003-1965-1869

According to our database1, Osama Ahmed Khashan authored at least 22 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Dual-stage machine learning approach for advanced malicious node detection in WSNs.
Ad Hoc Networks, 2025

2024
Smart Energy-Efficient Encryption for Wireless Multimedia Sensor Networks Using Deep Learning.
IEEE Open J. Commun. Soc., 2024

Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks.
Knowl. Based Syst., 2024

Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks.
IEEE Access, 2024

Online Banking User Authentication Methods: A Systematic Literature Review.
IEEE Access, 2024

PID Controller Tuning Using Multi-Objective Ant Colony Optimization for Blood Glucose Level of a Diabetic Patient.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

2023
Digital image watermarking using discrete cosine transformation based linear modulation.
J. Cloud Comput., December, 2023

A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video.
J. Internet Serv. Inf. Secur., May, 2023

Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors.
Cryptogr., March, 2023

Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems.
J. King Saud Univ. Comput. Inf. Sci., February, 2023

The determinants of reliable smart grid from experts' perspective.
Energy Inform., January, 2023

A Novel Hybrid Prairie Dog Algorithm and Harris Hawks Algorithm for Resource Allocation of Wireless Networks.
IEEE Access, 2023

2022
Fuzzy Clustering Algorithm Based on Improved Global Best-Guided Artificial Bee Colony with New Search Probability Model for Image Segmentation.
Sensors, 2022

2021
An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks.
Ad Hoc Networks, 2021

Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Edge-based lightweight selective encryption scheme for digital medical images.
Multim. Tools Appl., 2020

A flexible encryption technique for the internet of things environment.
Ad Hoc Networks, 2020

Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System.
IEEE Access, 2020

Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment.
IEEE Access, 2020

2018
Secure Stored Images Using Transparent Crypto Filter Driver.
Int. J. Netw. Secur., 2018

2015
ImgFS: a transparent cryptography for stored images using a filesystem in userspace.
Frontiers Inf. Technol. Electron. Eng., 2015

2014
Performance study of selective encryption in comparison to full encryption for still visual images.
J. Zhejiang Univ. Sci. C, 2014


  Loading...