Elastic virtual network function placement M Ghaznavi, A Khan, N Shahriar, K Alsubhi, R Ahmed, R Boutaba 2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 255-260, 2015 | 266 | 2015 |
Internet of things cyber attacks detection using machine learning J Alsamiri, K Alsubhi International Journal of Advanced Computer Science and Applications 10 (12), 2019 | 133 | 2019 |
A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks BA Alzahrani, A Irshad, A Albeshri, K Alsubhi Wireless Personal Communications 117 (1), 47-69, 2021 | 100 | 2021 |
Alert prioritization in intrusion detection systems K Alsubhi, E Al-Shaer, R Boutaba NOMS 2008-2008 IEEE Network Operations and Management Symposium, 33-40, 2008 | 88 | 2008 |
Blockchain-based secured access control in an IoT system S Algarni, F Eassa, K Almarhabi, A Almalaise, E Albassam, K Alsubhi, ... Applied Sciences 11 (4), 1772, 2021 | 76 | 2021 |
Man-in-the-Middle attack mitigation in internet of medical things O Salem, K Alsubhi, A Shaafi, M Gheryani, A Mehaoua, R Boutaba IEEE Transactions on Industrial Informatics 18 (3), 2053-2062, 2021 | 75 | 2021 |
Machine learning-based botnet detection in software-defined network: A systematic review K Shinan, K Alsubhi, A Alzahrani, MU Ashraf Symmetry 13 (5), 866, 2021 | 68 | 2021 |
FuzMet: A fuzzy‐logic based alert prioritization engine for intrusion detection systems K Alsubhi, I Aib, R Boutaba International Journal of Network Management 22 (4), 263-284, 2012 | 62 | 2012 |
Botnet detection approach using graph-based machine learning A Alharbi, K Alsubhi Ieee Access 9, 99166-99180, 2021 | 55 | 2021 |
Retracted: An Evolutionary Deep Learning Anomaly Detection Framework for In-Vehicle Networks-CAN Bus Y Lin, C Chen, F Xiao, O Avatefipour, K Alsubhi, A Yunianta IEEE transactions on industry applications, 2020 | 54 | 2020 |
Cyber attack detection process in sensor of DC micro-grids under electric vehicle based on Hilbert–Huang transform and deep learning H Cui, X Dong, H Deng, M Dehghani, K Alsubhi, HMA Aljahdali IEEE Sensors Journal 21 (14), 15885-15894, 2020 | 52 | 2020 |
The effect of fake reviews on e-commerce during and after Covid-19 pandemic: SKL-based fake reviews detection H Tufail, MU Ashraf, K Alsubhi, HM Aljahdali Ieee Access 10, 25555-25564, 2022 | 46 | 2022 |
Solution of combined economic emission dispatch problem using improved and chaotic population-based polar bear optimization algorithm S Fayyaz, MK Sattar, M Waseem, MU Ashraf, A Ahmad, HA Hussain, ... Ieee Access 9, 56152-56167, 2021 | 42 | 2021 |
EEG in game user analysis: A framework for expertise classification during gameplay T Hafeez, SM Umar Saeed, A Arsalan, SM Anwar, MU Ashraf, K Alsubhi Plos one 16 (6), e0246913, 2021 | 34 | 2021 |
An improved lightweight authentication protocol for wireless body area networks BA Alzahrani, A Irshad, A Albeshri, K Alsubhi, M Shafiq IEEE Access 8, 190855-190872, 2020 | 30 | 2020 |
A secure and efficient remote patient‐monitoring authentication protocol for cloud‐IoT BA Alzahrani, A Irshad, K Alsubhi, A Albeshri International Journal of Communication Systems 33 (11), e4423, 2020 | 30 | 2020 |
Markov models for anomaly detection in wireless body area networks for secure health monitoring O Salem, K Alsubhi, A Mehaoua, R Boutaba IEEE Journal on Selected Areas in Communications 39 (2), 526-540, 2020 | 27 | 2020 |
Integrating a high-reliability multicriteria trust evaluation model with task role-based access control for cloud services ST Alshammari, A Albeshri, K Alsubhi Symmetry 13 (3), 492, 2021 | 24 | 2021 |
Performance analysis in intrusion detection and prevention systems K Alsubhi, N Bouabdallah, R Boutaba 12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011 | 22 | 2011 |
Policy-based security configuration management, application to intrusion detection and prevention K Alsubhi, I Aib, J François, R Boutaba 2009 IEEE International Conference on Communications, 1-6, 2009 | 22 | 2009 |