An extended review on internet of things (iot) and its promising applications Y Perwej, MA AbouGhaly, B Kerim, HAM Harb Communications on Applied Electronics (CAE), ISSN, 2394-4714, 2019 | 80 | 2019 |
An empirical exploration of the yarn in big data Y Perwej, B Kerim, MS Adrees, OE Sheta International Journal of Applied Information Systems (IJAIS) 12 (9), 19-29, 2017 | 34 | 2017 |
An approach for optimizing ensemble intrusion detection systems D Stiawan, A Heryanto, A Bardadi, DP Rini, IMI Subroto, MYB Idris, ... Ieee Access 9, 6930-6947, 2020 | 33 | 2020 |
A comprehensive overview of privacy and data security for cloud storage N Akhtar, B Kerim, Y Perwej, A Tiwari, S Praveen International Journal of Scientific Research in Science Engineering and …, 2021 | 28 | 2021 |
A comprehend the Apache Flink in big data environments Y Perwej, M Husamuddin, MK Omer, B Kerim IOSR Journal of Computer Engineering (IOSR-JCE) 20 (1), 48-58, 2018 | 17 | 2018 |
Important features of CICIDS-2017 Dataset for anomaly detection in high dimension and imbalanced class dataset K Kurniabudi, D Stiawan, D Darmawijoyo, MYB Idris, B Kerim, R Budiarto Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 9 (2 …, 2021 | 10 | 2021 |
Enhanced Deep Learning Intrusion Detection in IoT Heterogeneous Network with Feature Extraction S Sharipuddin, EA Winanto, B Purnama, K Kurniabudi, D Stiawan, ... Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 9 (3 …, 2021 | 5 | 2021 |
Securing IoT network against DDoS attacks using multi-agent IDS B Kerim Journal of Physics: Conference Series 1898 (1), 012033, 2021 | 5 | 2021 |
Energy-aware optimal clustering in wireless sensor network using Integer/Linear programming Z Eskandari, SAH Seno, D Stiawan, B Kerim, R Budiarto 2016 8th International Conference on Information Technology and Electrical …, 2016 | 4 | 2016 |
Strategical languages of infinite words M Arfi, BOM Lemine, C Selmi Information processing letters 109 (13), 749-753, 2009 | 3 | 2009 |
A Study for Remote Monitoring of Water Points in Mauritania Based on IoT (LoRa) Technology HA Abeidi, B Kerim, MF Nanne Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 10 (2 …, 2022 | 2 | 2022 |
Mixed strategies and closed sets of infinite words M Arfi, BOM Lemine, C Selmi Proceedings of the Conference Words, 14-18, 2009 | 2 | 2009 |
A bi-objective algorithm for a reactive multi-skill project scheduling problem C Dhib, A Soukhal, E Néron, H Mohamed-Babou, B Kerim International Journal of Computers & Technology 15 (11), 7207-7212, 2016 | 1 | 2016 |
Cloud-based retrieval information system using concept for multi-format data I Alghamdi, DAF Alshehri, A Alghamdi, B Kerim, R Budiarto Computer Engineering and Applications Journal 5 (1), 1, 2016 | 1 | 2016 |
Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a Staff Development Course A Berglund, A Pears, A Nylén, F Ahmad, B Alghamdi, K Alghamdi, ... 2015 International Conference on Learning and Teaching in Computing and …, 2015 | 1 | 2015 |
Improving the Accuracy of Under-Fog Driving Assistance System B Kerim Journal of Signal and Information Processing 11 (02), 23, 2020 | | 2020 |
Impact of Mathematics in Computer Science Education B Kerim Paper! Sessions!!, 23, 2015 | | 2015 |
Autonomous-Collaborative Mobile Cloud Resource Management System I Alghamdi, A Alghamdi, B Kerim, R Budiarto ICONIET PROCEEDING 1 (4), 441-446, 2015 | | 2015 |
Jeux répétés et mots infinis B Ould Mohamed Lemine Le Havre, 2010 | | 2010 |
Mixed strategies and closed sets on infinite words C Selmi, M Arfi, BOM Lemine Words 2009, 2009 | | 2009 |