The internet of things security: A survey encompassing unexplored areas and new insights AE Omolara, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ... Computers & Security 112, 102494, 2022 | 58 | 2022 |
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities EO Abiodun, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ... Neural Computing and Applications 33 (22), 15091-15118, 2021 | 29 | 2021 |
Analysing and attacking the 4-way handshake of IEEE 802.11 i standard A Alabdulatif, X Ma, L Nolle 8th International Conference for Internet Technology and Secured …, 2013 | 16 | 2013 |
Blockchain in Education–Track ability and Traceability MA Hashmani, AZ Junejo, AA Alabdulatif, SH Adil 2020 International Conference on Computational Intelligence (ICCI), 40-44, 2020 | 9 | 2020 |
A Survey on Privacy Vulnerabilities in Permissionless Blockchains AZ Junejo, MA Hashmani, AA Alabdulatif International Journal of Advanced Computer Science and Applications(IJACSA …, 2020 | 8 | 2020 |
Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11i Standard A Alabdulatif, X Me International Journal for Information Security Research (IJISR) 3 (3/4), 439 …, 2013 | 5 | 2013 |
Design and Implementation: An IoT-Framework-Based Automated Wastewater Irrigation System S Habib, S Alyahya, M Islam, AM Alnajim, A Alabdulatif, A Alabdulatif Electronics 12 (1), 28, 2022 | 3 | 2022 |
A framework for proving the correctness of cryptographic protocol properties by linear temporal logic X Ma International Journal of Digital Society (IJDS) 41 (12), 749-757, 2013 | 3 | 2013 |
RZee: Cryptographic and statistical model for adversary detection and filtration to preserve blockchain privacy AZ Junejo, MA Hashmani, AA Alabdulatif, MM Memon, SR Jaffari, ... Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 2 | 2022 |
Optimal Machine Learning Models for Kitsune to Detect Mirai Botnet Malware Attack A Alabdulatif, SSH Rizvi, MA Hashmani Journal of Hunan University Natural Sciences 48 (6), 2021 | 2 | 2021 |
Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure AA Alabdulatif International Conference of Reliable Information and Communication …, 2019 | 2 | 2019 |
A framework for cryptographic protocol analysis using linear temporal logic A Alabdulatif, X Ma, L Nolle International Conference on Information Society (i-Society 2012), 525-530, 2012 | 2 | 2012 |
Machine Learning Approach for Improvement in Kitsune NID. A Alabdulatif, SSH Rizvi Intelligent Automation & Soft Computing 32 (2), 2022 | 1 | 2022 |
Optimal Routing Protocol for Wireless Sensor Network Using Genetic Fuzzy Logic System SZ Beevi, A Alabdulatif CMC-COMPUTERS MATERIALS & CONTINUA 70 (2), 4107-4122, 2022 | 1 | 2022 |
Blockchain-Based Transparent and Traceable Halal Food Supply Chain Management Systems AZ Junejo, MA Hashmani, AA Alabdulatif Handbook of Research on Disruptive Innovation and Digital Transformation in …, 2021 | 1 | 2021 |
Awareness of data privacy on social networks by students at Qassim University A Alabdulatif, F Alturise International Journal of Advanced Computer Research 10 (50), 194-205, 2020 | 1 | 2020 |
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard AA Alabdulatif International Journal of Computer Science and Information Security, 91-98, 2020 | 1 | 2020 |
Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges A Alabdulatif, NN Thilakarathne, ZK Lawal, KE Fahim, RY Zakari Sensors 23 (5), 2807, 2023 | | 2023 |
The internet of things security: A survey encompassing unexplored areas and new insights A Esther Omolara, A Alabdulatif, O Isaac Abiodun, M Alawida, ... Elsevier, 2022 | | 2022 |
Potential Security Vulnerabilities of the IEEE 802.15. 4 Standard and a Proposed Solution Against the Dissociation Process. A ALABDULATIF International Journal of Advances in Soft Computing & Its Applications 13 (3), 2021 | | 2021 |