Abdullah ِALAbdulatif
Abdullah ِALAbdulatif
Department of Computer, College of Sciences and Arts in Al-Rass, Qassim University, Al-Rass, Saudi
Verified email at
Cited by
Cited by
The internet of things security: A survey encompassing unexplored areas and new insights
AE Omolara, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ...
Computers & Security 112, 102494, 2022
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
EO Abiodun, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ...
Neural Computing and Applications 33 (22), 15091-15118, 2021
Analysing and attacking the 4-way handshake of IEEE 802.11 i standard
A Alabdulatif, X Ma, L Nolle
8th International Conference for Internet Technology and Secured …, 2013
Blockchain in Education–Track ability and Traceability
MA Hashmani, AZ Junejo, AA Alabdulatif, SH Adil
2020 International Conference on Computational Intelligence (ICCI), 40-44, 2020
A Survey on Privacy Vulnerabilities in Permissionless Blockchains
AZ Junejo, MA Hashmani, AA Alabdulatif
International Journal of Advanced Computer Science and Applications(IJACSA …, 2020
Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11i Standard
A Alabdulatif, X Me
International Journal for Information Security Research (IJISR) 3 (3/4), 439 …, 2013
Design and Implementation: An IoT-Framework-Based Automated Wastewater Irrigation System
S Habib, S Alyahya, M Islam, AM Alnajim, A Alabdulatif, A Alabdulatif
Electronics 12 (1), 28, 2022
A framework for proving the correctness of cryptographic protocol properties by linear temporal logic
X Ma
International Journal of Digital Society (IJDS) 41 (12), 749-757, 2013
RZee: Cryptographic and statistical model for adversary detection and filtration to preserve blockchain privacy
AZ Junejo, MA Hashmani, AA Alabdulatif, MM Memon, SR Jaffari, ...
Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022
Optimal Machine Learning Models for Kitsune to Detect Mirai Botnet Malware Attack
A Alabdulatif, SSH Rizvi, MA Hashmani
Journal of Hunan University Natural Sciences 48 (6), 2021
Security Attacks in IEEE 802.15.4: A Review Disassociation Procedure
AA Alabdulatif
International Conference of Reliable Information and Communication …, 2019
A framework for cryptographic protocol analysis using linear temporal logic
A Alabdulatif, X Ma, L Nolle
International Conference on Information Society (i-Society 2012), 525-530, 2012
Machine Learning Approach for Improvement in Kitsune NID.
A Alabdulatif, SSH Rizvi
Intelligent Automation & Soft Computing 32 (2), 2022
Optimal Routing Protocol for Wireless Sensor Network Using Genetic Fuzzy Logic System
SZ Beevi, A Alabdulatif
CMC-COMPUTERS MATERIALS & CONTINUA 70 (2), 4107-4122, 2022
Blockchain-Based Transparent and Traceable Halal Food Supply Chain Management Systems
AZ Junejo, MA Hashmani, AA Alabdulatif
Handbook of Research on Disruptive Innovation and Digital Transformation in …, 2021
Awareness of data privacy on social networks by students at Qassim University
A Alabdulatif, F Alturise
International Journal of Advanced Computer Research 10 (50), 194-205, 2020
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
AA Alabdulatif
International Journal of Computer Science and Information Security, 91-98, 2020
Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges
A Alabdulatif, NN Thilakarathne, ZK Lawal, KE Fahim, RY Zakari
Sensors 23 (5), 2807, 2023
The internet of things security: A survey encompassing unexplored areas and new insights
A Esther Omolara, A Alabdulatif, O Isaac Abiodun, M Alawida, ...
Elsevier, 2022
Potential Security Vulnerabilities of the IEEE 802.15. 4 Standard and a Proposed Solution Against the Dissociation Process.
International Journal of Advances in Soft Computing & Its Applications 13 (3), 2021
The system can't perform the operation now. Try again later.
Articles 1–20