Security and privacy of electronic health records: Concerns and challenges I Keshta, A Odeh Egyptian Informatics Journal 22 (2), 177-183, 2021 | 299 | 2021 |
Towards implementation of requirements management specific practices (SP1. 3 and SP1. 4) for Saudi Arabian small and medium sized software development organizations I Keshta, M Niazi, M Alshayeb IEEE Access 5, 24162-24183, 2017 | 71 | 2017 |
Machine learningtechniquesfor detection of website phishing: A review for promises and challenges A Odeh, I Keshta, E Abdelfattah 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 68 | 2021 |
Analysis of blockchain in the healthcare sector: application and issues A Odeh, I Keshta, QA Al-Haija Symmetry 14 (9), 1760, 2022 | 57 | 2022 |
An experimental analysis of various machine learning algorithms for hand gesture recognition S Bhushan, M Alshehri, I Keshta, AK Chakraverti, J Rajpurohit, ... Electronics 11 (6), 968, 2022 | 49 | 2022 |
Efficient detection of phishing websites using multilayer perceptron A Odeh, I Keshta, E Abdelfattah International Association of Online Engineering, 2020 | 38 | 2020 |
AI-driven IoT for smart health care: Security and privacy issues I Keshta Informatics in medicine Unlocked 30, 100903, 2022 | 33 | 2022 |
Hybrid disease prediction approach leveraging digital twin and metaverse technologies for health consumer C Kulkarni, A Quraishi, M Raparthi, M Shabaz, MA Khan, RA Varma, ... BMC Medical Informatics and Decision Making 24 (1), 92, 2024 | 27 | 2024 |
Hybrid model for precise hepatitis-C classification using improved random forest and SVM method UK Lilhore, P Manoharan, JK Sandhu, S Simaiya, S Dalal, AM Baqasah, ... Scientific Reports 13 (1), 12473, 2023 | 27 | 2023 |
PHIBOOST-a novel phishing detection model using Adaptive boosting approach A Odeh, I Keshta, E Abdelfattah Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021 | 26 | 2021 |
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice I Keshta Journal of King Saud University-Computer and Information Sciences 34 (2 …, 2022 | 24 | 2022 |
Energy management in wireless sensor networks based on naïve bayes, MLP, and SVM classifications: A comparative study AY Barnawi, IM Keshta Journal of Sensors 2016 (1), 6250319, 2016 | 24 | 2016 |
Towards implementation of process and product quality assurance process area for Saudi Arabian small and medium sized software development organizations I Keshta, M Niazi, M Alshayeb IEEE Access 6, 41643-41675, 2018 | 21 | 2018 |
Software cost estimation approaches: A survey IM Keshta Journal of Software Engineering and Applications 10 (10), 824, 2017 | 21 | 2017 |
Analytic hierarchy process based land suitability for organic farming in the arid region P Mangan, D Pandi, MA Haq, A Sinha, R Nagarajan, T Dasani, I Keshta, ... Sustainability 14 (8), 4542, 2022 | 19 | 2022 |
Smart Implementation of Industrial Internet of Things using Embedded Mechatronic System A Zaidi, I Keshta, Z Gupta, P Pundhir, T Pandey, PK Rai, M Shabaz, ... IEEE Embedded Systems Letters, 2023 | 18 | 2023 |
& Simaiya, S. Optimized LightGBM model for security and privacy issues in cyber‐physical systems S Dalal, M Poongodi, UK Lilhore, F Dahan, T Vaiyapuri, I Keshta Transactions on Emerging Telecommunications Technologies, e4771, 0 | 15 | |
Blockchain aware proxy re-encryption algorithm-based data sharing scheme I Keshta, Y Aoudni, M Sandhu, A Singh, PA Xalikovich, A Rizwan, M Soni, ... Physical Communication 58, 102048, 2023 | 14 | 2023 |
Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22 (2), 177–183 I Keshta, A Odeh | 14 | 2021 |
Machine vision-based human action recognition using spatio-temporal motion features (STMF) with difference intensity distance group pattern (DIDGP) J Arunnehru, S Thalapathiraj, R Dhanasekar, L Vijayaraja, R Kannadasan, ... Electronics 11 (15), 2363, 2022 | 13 | 2022 |