An efficient authentication and key agreement protocol for 4G (LTE) networks KA Alezabi, F Hashim, SJ Hashim, BM Ali Region 10 Symposium, 2014 IEEE, 502-507, 2014 | 78 | 2014 |
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks KA Alezabi, F Hashim, SJ Hashim, BM Ali, A Jamalipour EURASIP Journal on Wireless Communications and Networking 2020, 1-34, 2020 | 28 | 2020 |
Arabic light-based stemmer using new rules H Alshalabi, S Tiun, N Omar, FN Al-Aswadi, KA Alezabi Journal of King Saud University-Computer and Information Sciences 34 (9 …, 2022 | 26 | 2022 |
Normalized advancement based totally opportunistic routing algorithm with void detection and avoiding mechanism for underwater wireless sensor network Z Rahman, F Hashim, MFA Rasid, M Othman, KA Alezabi IEEE access 8, 67484-67500, 2020 | 24 | 2020 |
Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN) HR Shaukat, F Hashim, MA Shaukat, KA Alezabi Sensors 20 (8), 2283, 2020 | 22 | 2020 |
Dynamic job scheduling strategy using jobs characteristics in cloud computing MA Alsaih, R Latip, A Abdullah, SK Subramaniam, KA Alezabi Symmetry 12 (10), 1638, 2020 | 13 | 2020 |
The role of RFID in green IoT: A survey on technologies, challenges and a way forward ZYM Yusoff, MK Ishak, KA Alezabi Adv. Sci. Technol. Eng. Syst. J 6 (1), 17-35, 2021 | 12 | 2021 |
A new tunnelled EAP based authentication method for WiMAX networks KA Alezabi, F Hashim, SJ Hashim, BM Ali 2013 IEEE 11th Malaysia International Conference on Communications (MICC …, 2013 | 12 | 2013 |
Time scheduling and finance management: university student survival kit JL Yeo, PS JosephNg, KA Alezabi, HC Eaw, KY Phan 2020 IEEE Student Conference on Research and Development (SCOReD), 1-6, 2020 | 11 | 2020 |
Pre-authentication design for seamless and secure handover in mobile WiMAX HF Zmezm, S Hashim, A Sali, KA Alezabi International Review on Computers and Software (IRECOS) 10 (7), 764-772, 2015 | 11 | 2015 |
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic MN Munther, F Hashim, NAA Latiff, KA Alezabi, JT Liew Egyptian Informatics Journal 23 (1), 113-126, 2022 | 9 | 2022 |
On the authentication and re‐authentication protocols in LTE‐WLAN interworking architecture KA Alezabi, F Hashim, SJ Hashim, BM Ali, A Jamalipour Transactions on Emerging Telecommunications Technologies 28 (4), e3031, 2017 | 7 | 2017 |
An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks A Saif, KA bin Noordin, K Dimyati, KA Alezabi, NSM Shah, YA Al-Gumaei, ... | 6 | 2021 |
Pseudorandom sequence contention algorithm for IEEE 802.11 ah based internet of things network MA Raouf, F Hashim, JT Liew, KA Alezabi Plos one 15 (8), e0237386, 2020 | 6 | 2020 |
Authentication process enhancements in WiMAX networks KA Alezabi, F Hashim, SJ Hashim, BM Ali, A Jamalipour Security and Communication Networks 9 (17), 4703-4725, 2016 | 4 | 2016 |
Forecasting Malaysian Stock Price using Artificial Neural Networks (ANN) AFS Al-Mashhadani, SS Hishan, H Awang, KA Alezabi Journal of Contemporary Issues in Business and Government Vol 27 (1), 2021 | 3 | 2021 |
The Effectiveness of Arabic Stemmers Using Arabized Word Removal H ALshalabi, S Tiun, N Omar, K Ali Alezabi, FN AL-Aswadi International Journal of Information Science and Management (IJISM) 20 (4 …, 2022 | 2 | 2022 |
The adoption of high contrast graphics and primary colours in developing of educational mobile application (Kiriosity) for preschool children in literacy subject BCW Pei, CS Mon, KAA Alezabi AIP Conference Proceedings 2756 (1), 2023 | | 2023 |
Egyptian Informatics Journal MN Munther, F Hashim, NAA Latiff, KA Alezabi, JT Liew | | 2022 |
OPTIMIZATION-BASED METHOD FOR ESTIMATING THE TRANSMISSION RATE OF COVID-19 DURING THE LOCKDOWN IN MALAYSIA A ALSAYED, MOA AQEL, R KAMIL, H SADIR, A ABUZAITER, ... | | 2022 |