default search action
Albandari Alsumayt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Fatemah H. Alghamedy, Nahla El-Haggar, Albandari Alsumayt, Zeyad M. Alfawaer, Majid Alshammari, Lobna Amouri, Sumayh S. Aljameel, Sarah Albassam:
Unlocking a Promising Future: Integrating Blockchain Technology and FL-IoT in the Journey to 6G. IEEE Access 12: 115411-115447 (2024) - [j6]Albandari Alsumayt, Majid Alshammari, Zeyad M. Alfawaer, Fahd N. Al-Wesabi, Nahla El-Haggar, Sumayh S. Aljameel, Sarah Albassam, Shahad AlGhareeb, Nouf Mohammed Alghamdi, Nawir Aldossary:
Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT). PeerJ Comput. Sci. 10: e2091 (2024) - [j5]Mohammed Aljebreen, Hayam Alamro, Fuad Al-Mutiri, Kamal M. Othman, Albandari Alsumayt, Sana Alazwari, Manar Ahmed Hamza, Gouse Pasha Mohammed:
Enhancing Traffic Flow Prediction in Intelligent Cyber-Physical Systems: A Novel Bi-LSTM-Based Approach With Kalman Filter Integration. IEEE Trans. Consumer Electron. 70(1): 1889-1902 (2024) - 2023
- [j4]Sumayh S. Aljameel, Manar Alzahrani, Reem Almusharraf, Majd Altukhais, Sadeem Alshaia, Hanan S. Altamimi, Nida Aslam, Irfan Ullah Khan, Dina A. Alabbad, Albandari Alsumayt:
Prediction of Preeclampsia Using Machine Learning and Deep Learning Models: A Review. Big Data Cogn. Comput. 7(1): 32 (2023) - [j3]Albandari Alsumayt, Nahla El-Haggar, Lobna Amouri, Zeyad M. Alfawaer, Sumayh S. Aljameel:
Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones. Sensors 23(11): 5148 (2023) - [j2]Mohammed Aljebreen, Manal Abdullah Alohali, Hany Mahgoub, Sumayh S. Aljameel, Albandari Alsumayt, Ahmed Sayed:
Multi-Objective Seagull Optimization Algorithm with Deep Learning-Enabled Vulnerability Detection for Secure Cloud Environments. Sensors 23(23): 9383 (2023) - 2020
- [c4]Albandari Alsumayt:
Control of DoS Attacks During Merging Process Over the Internet of Things. AINA Workshops 2020: 822-833
2010 – 2019
- 2017
- [j1]Albandari Alsumayt, John Haggerty, Ahmad Lotfi:
Using trust to detect denial of service attacks in the internet of things over MANETs. Int. J. Space Based Situated Comput. 7(1): 43-56 (2017) - 2016
- [c3]Albandari Alsumayt, John Haggerty, Ahmad Lotfi:
Detect DoS Attack Using MrDR Method in Merging Two MANETs. AINA Workshops 2016: 889-895 - 2015
- [c2]Albandari Alsumayt, John Haggerty, Ahmad Lotfi:
Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET. EISIC 2015: 121-124 - 2014
- [c1]Albandari Fahad Alsumayt, John Haggerty:
A Taxonomy of Defence Mechanisms to Mitigate DoS Attacks in MANETs. INC 2014: 3-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint