Follow
Fahd Al-Haidari
Fahd Al-Haidari
Associate Professor at College of Computer Science and Information Technology CCSIT, NC department
Verified email at iau.edu.sa
Title
Cited by
Cited by
Year
Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing
MH Sqalli, F Al-Haidari, K Salah
2011 Fourth IEEE international conference on utility and cloud computing, 49-56, 2011
1912011
A survey of consensus algorithms for blockchain technology
SJ Alsunaidi, FA Alhaidari
2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019
1432019
Applications of big data analytics to control COVID-19 pandemic
SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ...
Sensors 21 (7), 2282, 2021
1092021
Impact of cpu utilization thresholds and scaling size on autoscaling cloud resources
F Al-Haidari, M Sqalli, K Salah
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
1032013
Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses
F Al-Haidari, MH Sqalli, K Salah
2012 IEEE 11th international conference on trust, security and privacy in …, 2012
782012
Improving security and capacity for arabic text steganography using ‘Kashida’extensions
F Al-Haidari, A Gutub, K Al-Kahsah, J Hamodi
2009 IEEE/ACS International Conference on Computer Systems and Applications …, 2009
742009
Cough sound detection and diagnosis using artificial intelligence techniques: challenges and opportunities
KS Alqudaihi, N Aslam, IU Khan, AM Almuhaideb, SJ Alsunaidi, ...
Ieee Access 9, 102327-102344, 2021
692021
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing
A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi
Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010
692010
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing
A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi
Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010
692010
Machine learning techniques to detect DDoS attacks on VANET system: A survey
AM Alrehan, FA Alhaidari
2019 2nd International Conference on Computer Applications & Information …, 2019
572019
Round robin scheduling algorithm in CPU and cloud computing: a review
T Balharith, F Alhaidari
2019 2nd international conference on computer applications & information …, 2019
562019
Evaluation of the impact of EDoS attacks against cloud computing services
F Al-Haidari, M Sqalli, K Salah
Arabian Journal for Science and Engineering 40, 773-785, 2015
522015
Survey for anomaly detection of IoT botnets using machine learning auto-encoders
R Alhajri, R Zagrouba, F Al-Haidari
Int. J. Appl. Eng. Res 14 (10), 2417-2421, 2019
452019
Cloud of Things: architecture, applications and challenges
F Alhaidari, A Rahman, R Zagrouba
Journal of Ambient Intelligence and Humanized Computing 14 (5), 5957-5975, 2023
412023
Intelligent software-defined network for cognitive routing optimization using deep extreme learning machine approach
F Alhaidari, SH Almotiri, MA Al Ghamdi, MA Khan, A Rehman, S Abbas, ...
Computers, Materials & Continua 67 (1), 1269-1285, 2021
382021
New approach to determine DDoS attack patterns on SCADA system using machine learning
FA Alhaidari, EM Al-Dahasi
2019 International conference on computer and information sciences (ICCIS), 1-6, 2019
382019
Exploit Kashida adding to Arabic e-text for high capacity steganography
A Al-Nazer, A Gutub
2009 Third International Conference on Network and System Security, 447-451, 2009
372009
A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems
FA Alhaidari, AM Alrehan
International Journal of Distributed Sensor Networks 17 (3), 15501477211000287, 2021
352021
Intrusion detection system using feature extraction with machine learning algorithms in IoT
D Musleh, M Alotaibi, F Alhaidari, A Rahman, RM Mohammad
Journal of Sensor and Actuator Networks 12 (2), 29, 2023
342023
Enhanced round-robin algorithm in the cloud computing environment for optimal task scheduling
F Alhaidari, TZ Balharith
Computers 10 (5), 63, 2021
332021
The system can't perform the operation now. Try again later.
Articles 1–20