Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks KA Darabkh, SS Ismail, M Al-Shurman, IF Jafar, E Alkhader, ... Journal of Network and Computer Applications 35 (6), 2068-2080, 2012 | 92 | 2012 |
Dynamic selection techniques for detecting GPS spoofing attacks on UAVs T Talaei Khoei, S Ismail, N Kaabouch Sensors 22 (2), 662, 2022 | 52 | 2022 |
Static clustering for target tracking in wireless sensor networks SS Ismail, AI Al Khader, KA Darabkh Global Journal on Technology (Selected Paper of COMENG-2014) 8, 167-173, 2015 | 29 | 2015 |
A comparative study of machine learning models for cyber-attacks detection in wireless sensor networks S Ismail, TT Khoei, R Marsh, N Kaabouch 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021 | 27 | 2021 |
IoT-based water management systems: survey and future research direction S Ismail, DW Dawoud, N Ismail, R Marsh, AS Alshami IEEE Access 10, 35942-35952, 2022 | 25 | 2022 |
Evaluation of naïve bayesian algorithms for cyber-attacks detection in wireless sensor networks S Ismail, H Reza 2022 IEEE World AI IoT Congress (AIIoT), 283-289, 2022 | 24 | 2022 |
Boosting-based models with tree-structured parzen estimator optimization to detect intrusion attacks on smart grid TT Khoei, S Ismail, N Kaabouch 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021 | 17 | 2021 |
Toward an intelligent blockchain ioT-enabled fish supply chain: A review and conceptual framework S Ismail, H Reza, K Salameh, H Kashani Zadeh, F Vasefi Sensors 23 (11), 5136, 2023 | 16 | 2023 |
A lightweight multilayer machine learning detection system for cyber-attacks in WSN S Ismail, D Dawoud, H Reza 2022 IEEE 12th annual computing and communication workshop and conference …, 2022 | 16 | 2022 |
Prison Perimeter Surveillance System Using WSN AA Shereen S. Ismail, Eman Alkhader Journal of Computer Science 13 (11), 674-679, 2017 | 15 | 2017 |
Object Tracking in Wireless Sensor Networks: Challenges and Solutions. SS Ismail, E Alkhader, S Elnaffar J. Comput. Sci. 12 (4), 201-212, 2016 | 15 | 2016 |
Securing wireless sensor networks using machine learning and blockchain: A review S Ismail, DW Dawoud, H Reza Future Internet 15 (6), 200, 2023 | 13 | 2023 |
User selective encryption method for securing MANETs A Ahmad, S Ismail International Journal of Electrical and Computer Engineering (IJECE) 8 (5 …, 2018 | 13 | 2018 |
Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles T Talaei Khoei, S Ismail, KA Shamaileh, VK Devabhaktuni, N Kaabouch Applied Sciences 13 (1), 383, 2022 | 12 | 2022 |
Security vulnerabilities related to web-based data M Awad, M Ali, M Takruri, S Ismail TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (2), 852-856, 2019 | 12 | 2019 |
An ensemble-based machine learning approach for cyber-attacks detection in wireless sensor networks S Ismail, Z El Mrabet, H Reza Applied Sciences 13 (1), 30, 2022 | 11 | 2022 |
Towards a lightweight identity management and secure authentication for IoT using blockchain S Ismail, D Dawoud, H Reza 2022 IEEE World AI IoT Congress (AIIoT), 077-083, 2022 | 11 | 2022 |
A Blockchain-based IoT Security Solution Using Multichain S Ismail, H Reza, HK Zadeh, F Vasefi 2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023 | 9 | 2023 |
Toward management of uncertainty in self-adaptive software systems: IoT case study S Ismail, K Shah, H Reza, R Marsh, E Grant Computers 10 (3), 27, 2021 | 9 | 2021 |
Vehicle safety distance alarming system HA Attia, S Ismail, HY Ali 2016 5th International Conference on Electronic Devices, Systems and …, 2016 | 9 | 2016 |