A multi-layer of multi factors authentication model for online banking services MM Mohammed, M Elsadig 2013 International Conference on Computing, Electrical and Electronic …, 2013 | 36 | 2013 |
Intelligent deep machine learning cyber phishing url detection based on bert features extraction M Elsadig, AO Ibrahim, S Basheer, MA Alohali, S Alshunaifi, H Alqahtani, ... Electronics 11 (22), 3647, 2022 | 23 | 2022 |
Immune multi agent system for intrusion prevention and self healing system implement a non-linear classification M Elsadig, A Abdullah, BB Samir 2010 International Symposium on Information Technology 3, 1-6, 2010 | 12 | 2010 |
Evaluation of healthcare information system using Delone and McLean quality model, case study ksa M Elsdaig, N Dua'A International Journal of Advanced Trends in Computer Science and Engineering …, 2019 | 11 | 2019 |
Biological intrusion prevention and self-healing model for network security M Elsadig, A Abduallah 2010 Second International Conference on Future Networks, 337-342, 2010 | 10 | 2010 |
Biological inspired intrusion prevention and self-healing system for network security based on danger theory M Elsadig, A Abdullah International Journal of Video & Image Processing and Network Security 9 (9 …, 2009 | 9 | 2009 |
Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system MA Alohali, M Elsadig, FN Al-Wesabi, M Al Duhayyim, AM Hilal, ... Computers and Electrical Engineering 108, 108676, 2023 | 8 | 2023 |
Enhanced chimp optimization-based feature selection with fuzzy logic-based intrusion detection system in cloud environment MA Alohali, M Elsadig, FN Al-Wesabi, M Al Duhayyim, A Mustafa Hilal, ... Applied Sciences 13 (4), 2580, 2023 | 8 | 2023 |
Quality assessment of business process models: Case of accreditation process in higher education LJ Menzli, S Ayouni, M Elsadig Int. J. Civil Eng. Technol. 10, 874-884, 2019 | 6 | 2019 |
Intrusion Prevention and self-healing algorithms inspired by danger theory M Elsadig, A Abdullah, BB Samir 2010 The 2nd International Conference on Computer and Automation Engineering …, 2010 | 5 | 2010 |
Healthcare information system assessment case study riyadh’s hospitals-KSA M Elsadig, DA Nassar, LJ Menzli Advances in Data Science, Cyber Security and IT Applications: First …, 2019 | 4 | 2019 |
Immune multiagent system for network intrusion detection using non-linear classification algorithm ME Mohamed, BB Samir, A Abdullah International Journal of Computer Applications 12 (7), 7-12, 2010 | 4 | 2010 |
Biological inspired approach in parallel immunology system for network security M Elsadig, A Abdullah 2008 International Symposium on Information Technology 1, 1-6, 2008 | 4 | 2008 |
Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment. MA Alohali, M Elsadig, FN Al-Wesabi, M Al Duhayyim, AM Hilal, ... Computer Systems Science & Engineering 46 (3), 2023 | 3 | 2023 |
Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme. MA Alohali, M Elsadig, FN Al-Wesabi, M Al Duhayyim, AM Hilal, ... Comput. Syst. Sci. Eng. 46 (3), 3583-3598, 2023 | 2 | 2023 |
An Advanced Strategy for Addressing Heterogeneity in SDN-IoT Networks for Ensuring QoS A Zafar, F Samad, HJ Syed, AO Ibrahim, M Alohaly, M Elsadig Applied Sciences 13 (13), 7856, 2023 | 2 | 2023 |
Hybrid conceptual framework for artificial immune system MEM Ahmed Computing, Electrical and Electronics Engineering (ICCEEE), 2013 …, 2013 | 2 | 2013 |
SHC: 8-bit Compact and Efficient S-box Structure for Lightweight Cryptography S Kumar, D Kumar, H Lamkuche, VS Sharma, HK Alkahtani, M Elsadig, ... IEEE Access, 2024 | 1 | 2024 |
Exploring Performance Degradation in Virtual Machines Sharing a Cloud Server ME Hamza Ahmed , Hassan Jamil Syed , Amin Sadiq 1 , Ashraf Osman Ibrahim ... Applied Science 13 (16), 2023 | 1 | 2023 |
Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF A Sadiq, HJ Syed, AA Ansari, AO Ibrahim, M Alohaly, M Elsadig Applied Sciences 13 (8), 4700, 2023 | 1 | 2023 |