Information security maturity model for NIST cyber security framework S Almuhammadi, M Alsaleh Computer Science & Information Technology (CS & IT) 7 (3), 51-62, 2017 | 78 | 2017 |
A comparative analysis of AES common modes of operation S Almuhammadi, I Al-Hejri 2017 IEEE 30th Canadian conference on electrical and computer engineering …, 2017 | 56 | 2017 |
A survey on recent approaches combining cryptography and steganography S Almuhammadi, A Al-Shaaby Computer Science Information Technology (CS IT), 63-74, 2017 | 33 | 2017 |
New single asymmetric error-correcting codes S Al-Bassam, R Venkatesan, S Al-Muhammadi IEEE Transactions on Information Theory 43 (5), 1619-1623, 1997 | 27 | 1997 |
Security and privacy using one-round zero-knowledge proofs S Almuhammadi, C Neuman Seventh IEEE International Conference on E-Commerce Technology (CEC'05), 435-438, 2005 | 25 | 2005 |
Better privacy and security in e-commerce: using elliptic curve-based zero knowledge proofs S Almuhammadi, NT Sui, D McLeod Proceedings. IEEE International Conference on e-Commerce Technology, 2004 …, 2004 | 23 | 2004 |
Detecting malicious user accounts using Canvas Fingerprint A Abouollo, S Almuhammadi 2017 8th International Conference on Information and Communication Systems …, 2017 | 14 | 2017 |
A model for work distribution in global software development based on machine learning techniques A Alsri, S Almuhammadi, S Mahmood 2014 Science and Information Conference, 399-403, 2014 | 9 | 2014 |
Vulnerability of virtual private networks to web fingerprinting attack KMA Kamal, S Almuhammadi Advances in Security, Networks, and Internet of Things: Proceedings from SAM …, 2021 | 8 | 2021 |
QUIC Network traffic classification using ensemble machine learning techniques S Almuhammadi, A Alnajim, M Ayub Applied Sciences 13 (8), 4725, 2023 | 7 | 2023 |
The future of cryptocurrency blockchains in the quantum era S Alghamdi, S Almuhammadi 2021 IEEE International Conference on Blockchain (Blockchain), 544-551, 2021 | 7 | 2021 |
A single asymmetric error-correcting code with 2/sup 13/codewords of dimension 17 SA Al-Bassam, S Al-Muhammadi IEEE Transactions on Information Theory 46 (1), 269-271, 2000 | 7 | 2000 |
Intrusion detection on Quic Traffic: A machine learning approach L Al-Bakhat, S Almuhammadi 2022 7th International Conference on Data Science and Machine Learning …, 2022 | 6 | 2022 |
Anomaly detection: Firewalls capabilities and limitations S Alsehibani, S Almuhammadi 2018 International Conference on Computing Sciences and Engineering (ICCSE), 1-5, 2018 | 6 | 2018 |
Double-hashing operation mode for encryption SA Almuhammadi, A Amro US Patent 10,887,080, 2021 | 5 | 2021 |
Double-hashing operation mode for encryption S Almuhammadi, A Amro 2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 | 5 | 2017 |
NLFSR functions with optimal periods S Almuhammadi, I Al-Hejri, GB Talib, A Gaamel Computational Science and Its Applications–ICCSA 2018: 18th International …, 2018 | 4 | 2018 |
NetInfoMiner: High-level information extraction from network traffic A Amro, S Almuhammadi, S Zhioua 2017 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2017 | 4 | 2017 |
Performance and Security Tradeoffs in Cryptographic Hash Functions S Almuhammadi, OM Bawazeer International Journal of Interdisciplinary Telecommunications and Networking …, 2020 | 3 | 2020 |
Constructing new NLFSR functions with optimal periods I Al-Hejri, S Almuhammadi International Journal of Interdisciplinary Telecommunications and Networking …, 2020 | 2 | 2020 |