Follow
Fahd Al-Haidari
Fahd Al-Haidari
Associate Professor at College of Computer Science and Information Technology CCSIT, NC department
Verified email at iau.edu.sa
Title
Cited by
Cited by
Year
Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing
MH Sqalli, F Al-Haidari, K Salah
2011 Fourth IEEE international conference on utility and cloud computing, 49-56, 2011
1782011
A survey of consensus algorithms for blockchain technology
SJ Alsunaidi, FA Alhaidari
2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019
1122019
Impact of cpu utilization thresholds and scaling size on autoscaling cloud resources
F Al-Haidari, M Sqalli, K Salah
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
1012013
Applications of big data analytics to control COVID-19 pandemic
SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ...
Sensors 21 (7), 2282, 2021
792021
Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses
F Al-Haidari, MH Sqalli, K Salah
2012 IEEE 11th international conference on trust, security and privacy in …, 2012
772012
Improving security and capacity for arabic text steganography using ‘Kashida’extensions
F Al-Haidari, A Gutub, K Al-Kahsah, J Hamodi
2009 IEEE/ACS International Conference on Computer Systems and Applications …, 2009
752009
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing
A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi
Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010
652010
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing
A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi
Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010
652010
Evaluation of the impact of EDoS attacks against cloud computing services
F Al-Haidari, M Sqalli, K Salah
Arabian Journal for Science and Engineering 40, 773-785, 2015
522015
Machine learning techniques to detect DDoS attacks on VANET system: a survey
AM Alrehan, FA Alhaidari
2019 2nd International Conference on Computer Applications & Information …, 2019
452019
Survey for anomaly detection of IoT botnets using machine learning auto-encoders
R Alhajri, R Zagrouba, F Al-Haidari
Int. J. Appl. Eng. Res 14 (10), 2417-2421, 2019
362019
Exploit Kashida adding to Arabic e-text for high capacity steganography
A Al-Nazer, A Gutub
2009 Third International Conference on Network and System Security, 447-451, 2009
352009
Cough sound detection and diagnosis using artificial intelligence techniques: challenges and opportunities
KS Alqudaihi, N Aslam, IU Khan, AM Almuhaideb, SJ Alsunaidi, ...
Ieee Access 9, 102327-102344, 2021
332021
Round robin scheduling algorithm in CPU and cloud computing: a review
T Balharith, F Alhaidari
2019 2nd International Conference on Computer Applications & Information …, 2019
312019
Cloud of Things: architecture, applications and challenges
F Alhaidari, A Rahman, R Zagrouba
Journal of Ambient Intelligence and Humanized Computing, 1-19, 2020
302020
Intelligent software-defined network for cognitive routing optimization using deep extreme learning machine approach
F Alhaidari, SH Almotiri, MA Al Ghamdi, MA Khan, A Rehman, S Abbas, ...
TECH SCIENCE PRESS, 2021
272021
Enhanced query processing over semantic cache for cloud based relational databases
M Ahmad, MA Qadir, A Rahman, R Zagrouba, F Alhaidari, T Ali, F Zahid
Journal of Ambient Intelligence and Humanized Computing, 1-19, 2020
242020
New approach to determine DDoS attack patterns on SCADA system using machine learning
FA Alhaidari, EM AL-Dahasi
2019 International conference on computer and information sciences (ICCIS), 1-6, 2019
242019
Enhanced round-robin algorithm in the cloud computing environment for optimal task scheduling
F Alhaidari, TZ Balharith
Computers 10 (5), 63, 2021
222021
The digital library and the archiving system for educational institutes
FA Alhaidari
Pakistan Journal of Information Management and Libraries 20, 94-117, 2019
212019
The system can't perform the operation now. Try again later.
Articles 1–20