Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing MH Sqalli, F Al-Haidari, K Salah 2011 Fourth IEEE international conference on utility and cloud computing, 49-56, 2011 | 178 | 2011 |
A survey of consensus algorithms for blockchain technology SJ Alsunaidi, FA Alhaidari 2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019 | 112 | 2019 |
Impact of cpu utilization thresholds and scaling size on autoscaling cloud resources F Al-Haidari, M Sqalli, K Salah 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 101 | 2013 |
Applications of big data analytics to control COVID-19 pandemic SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ... Sensors 21 (7), 2282, 2021 | 79 | 2021 |
Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses F Al-Haidari, MH Sqalli, K Salah 2012 IEEE 11th international conference on trust, security and privacy in …, 2012 | 77 | 2012 |
Improving security and capacity for arabic text steganography using ‘Kashida’extensions F Al-Haidari, A Gutub, K Al-Kahsah, J Hamodi 2009 IEEE/ACS International Conference on Computer Systems and Applications …, 2009 | 75 | 2009 |
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010 | 65 | 2010 |
e-Text watermarking: utilizing'Kashida'extensions in Arabic language electronic writing A Gutub, F Al-Haidari, KM Al-Kahsah, J Hamodi Journal of Emerging Technologies in Web Intelligence 2 (1), 48-55, 2010 | 65 | 2010 |
Evaluation of the impact of EDoS attacks against cloud computing services F Al-Haidari, M Sqalli, K Salah Arabian Journal for Science and Engineering 40, 773-785, 2015 | 52 | 2015 |
Machine learning techniques to detect DDoS attacks on VANET system: a survey AM Alrehan, FA Alhaidari 2019 2nd International Conference on Computer Applications & Information …, 2019 | 45 | 2019 |
Survey for anomaly detection of IoT botnets using machine learning auto-encoders R Alhajri, R Zagrouba, F Al-Haidari Int. J. Appl. Eng. Res 14 (10), 2417-2421, 2019 | 36 | 2019 |
Exploit Kashida adding to Arabic e-text for high capacity steganography A Al-Nazer, A Gutub 2009 Third International Conference on Network and System Security, 447-451, 2009 | 35 | 2009 |
Cough sound detection and diagnosis using artificial intelligence techniques: challenges and opportunities KS Alqudaihi, N Aslam, IU Khan, AM Almuhaideb, SJ Alsunaidi, ... Ieee Access 9, 102327-102344, 2021 | 33 | 2021 |
Round robin scheduling algorithm in CPU and cloud computing: a review T Balharith, F Alhaidari 2019 2nd International Conference on Computer Applications & Information …, 2019 | 31 | 2019 |
Cloud of Things: architecture, applications and challenges F Alhaidari, A Rahman, R Zagrouba Journal of Ambient Intelligence and Humanized Computing, 1-19, 2020 | 30 | 2020 |
Intelligent software-defined network for cognitive routing optimization using deep extreme learning machine approach F Alhaidari, SH Almotiri, MA Al Ghamdi, MA Khan, A Rehman, S Abbas, ... TECH SCIENCE PRESS, 2021 | 27 | 2021 |
Enhanced query processing over semantic cache for cloud based relational databases M Ahmad, MA Qadir, A Rahman, R Zagrouba, F Alhaidari, T Ali, F Zahid Journal of Ambient Intelligence and Humanized Computing, 1-19, 2020 | 24 | 2020 |
New approach to determine DDoS attack patterns on SCADA system using machine learning FA Alhaidari, EM AL-Dahasi 2019 International conference on computer and information sciences (ICCIS), 1-6, 2019 | 24 | 2019 |
Enhanced round-robin algorithm in the cloud computing environment for optimal task scheduling F Alhaidari, TZ Balharith Computers 10 (5), 63, 2021 | 22 | 2021 |
The digital library and the archiving system for educational institutes FA Alhaidari Pakistan Journal of Information Management and Libraries 20, 94-117, 2019 | 21 | 2019 |