Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against DDoS attacks HA Alamri, V Thayananthan IEEE Access 8, 194269-194288, 2020 | 78 | 2020 |
A novel and secure smart parking management system (SPMS) based on integration of WSN, RFID, and IoT O Abdulkader, AM Bamhdi, V Thayananthan, K Jambi, M Alrasheedi 2018 15th Learning and Technology Conference (L&T), 102-106, 2018 | 71 | 2018 |
Big data security issues based on quantum cryptography and privacy with authentication for mobile data center V Thayananthan, A Albeshri Procedia Computer Science 50, 149-156, 2015 | 54 | 2015 |
Fast consensus clustering in complex networks A Tandon, A Albeshri, V Thayananthan, W Alhalabi, S Fortunato Physical Review E 99 (4), 042301, 2019 | 45 | 2019 |
Community detection in networks using graph embeddings A Tandon, A Albeshri, V Thayananthan, W Alhalabi, F Radicchi, ... Physical Review E 103 (2), 022316, 2021 | 43 | 2021 |
Quantitative assessment of cybersecurity risks for mitigating data breaches in business systems AM Algarni, V Thayananthan, YK Malaiya Applied Sciences 11 (8), 3678, 2021 | 40 | 2021 |
A lightweight blockchain based cybersecurity for IoT environments O Abdulkader, AM Bamhdi, V Thayananthan, F Elbouraey, B Al-Ghamdi 2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019 | 31 | 2019 |
Analysis of round-robin load-balancing algorithm with adaptive and predictive approaches F Alam, V Thayananthan, I Katib 2016 UKACC 11th international conference on control (CONTROL), 1-7, 2016 | 26 | 2016 |
Machine Learning for Securing SDN based 5G network HA Alamri, V Thayananthan, J Yazdani Int. J. Comput. Appl 174 (14), 9-16, 2021 | 25 | 2021 |
A Survey: Agent-Based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks, and Challenges B Alluhaybi, MS Alrahhal, A Alzhrani, V Thayananthan | 23 | 2019 |
Design of vending machine using finite state machine and visual automata simulator A Alrehily, R Fallatah, V Thayananthan International Journal of Computer Applications 115 (18), 2015 | 23 | 2015 |
Enhancement of energy conservation technologies in wireless sensor network V Thayananthan, A Alzranhi Procedia Computer Science 34, 79-86, 2014 | 22 | 2014 |
A multi-tier MQTT architecture with multiple brokers based on fog computing for securing industrial IoT H Kurdi, V Thayananthan Applied Sciences 12 (14), 7173, 2022 | 17 | 2022 |
Autonomous vehicles: The cybersecurity vulnerabilities and countermeasures for big data communication A Algarni, V Thayananthan Symmetry 14 (12), 2494, 2022 | 16 | 2022 |
Saudi license plate recognition system using artificial neural network classifier HM Alyahya, MK Alharthi, AM Alattas, V Thayananthan 2017 International Conference on Computer and Applications (ICCA), 220-226, 2017 | 15 | 2017 |
Analysis of machine learning for securing software-defined networking HA Alamri, V Thayananthan Procedia Computer Science 194, 229-236, 2021 | 14 | 2021 |
The 5G network slicing using SDN based technology for managing network traffic D Alotaibi, V Thayananthan, J Yazdani Procedia Computer Science 194, 114-121, 2021 | 14 | 2021 |
Ibmsdc: Intelligent blockchain based management system for protecting digital currencies transactions O Abdulkader, AM Bamhdi, V Thayananthan, F Elbouraey 2019 Third World Conference on Smart Trends in Systems Security and …, 2019 | 14 | 2019 |
Risk-based decision methods for vehicular networks RA Shaikh, V Thayananthan Electronics 8 (6), 627, 2019 | 13 | 2019 |
Healthcare Management using ICT and IoT based 5G V Thayananthan | 13 | 2019 |