default search action
Bander Ali Saleh Al-rimy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Umara Urooj, Bander Ali Saleh Al-Rimy, Anazida Binti Zainal, Faisal Saeed, Abdelzahir Abdelmaboud, Wamda Nagmeldin:
Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks. IEEE Access 12: 3910-3925 (2024) - 2023
- [j21]Aitizaz Ali, Bander Ali Saleh Al-rimy, Faisal Alsubaei, Abdulwahab Ali Almazroi, Abdulaleem Ali Almazroi:
HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications. Sensors 23(15): 6762 (2023) - [j20]Aitizaz Ali, Bander Ali Saleh Al-rimy, Abdulwahab Ali Almazroi, Faisal Alsubaei, Abdulaleem Ali Almazroi, Faisal Saeed:
Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain. Sensors 23(16): 7162 (2023) - [j19]Aitizaz Ali, Bander Ali Saleh Al-rimy, Tin Tin Ting, Saad Nasser Altamimi, Sultan Noman Qasem, Faisal Saeed:
Empowering Precision Medicine: Unlocking Revolutionary Insights through Blockchain-Enabled Federated Learning and Electronic Medical Records. Sensors 23(17): 7476 (2023) - 2022
- [j18]Hong-Seng Gan, Muhammad Hanif Ramlee, Bander Ali Saleh Al-Rimy, Yeng-Seng Lee, Prayoot Akkaraekthalin:
Hierarchical Knee Image Synthesis Framework for Generative Adversarial Network: Data From the Osteoarthritis Initiative. IEEE Access 10: 55051-55061 (2022) - [j17]Fuad A. Ghaleb, Faisal Saeed, Eman H. Alkhammash, Norah Saleh Alghamdi, Bander Ali Saleh Al-rimy:
A Fuzzy-Based Context-Aware Misbehavior Detecting Scheme for Detecting Rogue Nodes in Vehicular Ad Hoc Network. Sensors 22(7): 2810 (2022) - [j16]Abdullah Marish Ali, Fuad A. Ghaleb, Bander Ali Saleh Al-Rimy, Fawaz Jaber Alsolami, Asif Irshad Khan:
Deep Ensemble Fake News Detection Model Using Sequential Deep Learning Technique. Sensors 22(18): 6970 (2022) - 2021
- [j15]Muaadh A. Alsoufi, Shukor Abd Razak, Maheyzah Md Siraj, Bander Ali Saleh Al-rimy, Abdul-Rahman Al-Ali, Maged Nasser, Salah Abdo:
A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques. Adv. Data Sci. Adapt. Anal. 13(3&4): 2143001:1-2143001:21 (2021) - [j14]Shafiza Ariffin Kashinath, Salama A. Mostafa, Aida Mustapha, Hairulnizam Mahdin, David Lim, Moamin A. Mahmoud, Mazin Abed Mohammed, Bander Ali Saleh Al-rimy, Mohd Farhan Md Fudzee, Tan Jhon Yang:
Review of Data Fusion Methods for Real-Time and Multi-Sensor Traffic Flow Analysis. IEEE Access 9: 51258-51276 (2021) - [j13]Arafat Al-Dhaqm, Richard Adeyemi Ikuesan, Victor R. Kebande, Shukor Abd Razak, George Grispos, Kim-Kwang Raymond Choo, Bander Ali Saleh Al-Rimy, Abdul Rahman A. Alsewari:
Digital Forensics Subdomains: The State of the Art and Future Directions. IEEE Access 9: 152476-152502 (2021) - [j12]Fuad A. Ghaleb, Bander Ali Saleh Al-Rimy, Wadii Boulila, Faisal Saeed, Maznah Kamat, Mohd. Foad Rohani, Shukor Abd Razak:
Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks. Comput. Intell. Neurosci. 2021: 2977954:1-2977954:19 (2021) - [j11]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Abdulmohsen Almalawi, Abdullah Marish Ali, Tawfik Al Hadhrami:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection. Future Gener. Comput. Syst. 115: 641-658 (2021) - [j10]Bashar Ahmad Khalaf, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny, Adam Marks:
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments. Secur. Commun. Networks 2021: 5542919:1-5542919:17 (2021) - [j9]Saddam Hussain, Mohd Wazir Mustafa, Khalil Hamdi Ateyeh Al-Shqeerat, Faisal Saeed, Bander Ali Saleh Al-rimy:
A Novel Feature-Engineered-NGBoost Machine-Learning Framework for Fraud Detection in Electric Power Consumption Data. Sensors 21(24): 8423 (2021) - [c2]Mohammad N. Olaimat, Mohd Aizaini Maarof, Bander Ali Saleh Al-rimy:
Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research Directions. CRC 2021: 1-6 - [c1]Umara Urooj, Mohd. Aizani Bin Maarof, Bander Ali Saleh Al-rimy:
A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model. CRC 2021: 1-6 - 2020
- [j8]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Fawaz Alsolami, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Tawfik Al Hadhrami, Abdullah Marish Ali:
A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction. IEEE Access 8: 140586-140598 (2020) - [j7]Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Abdulmohsen Almalawi, Abdullah Marish Ali, Anazida Binti Zainal, Murad A. Rassam, Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof:
Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach. IEEE Access 8: 217744-217761 (2020) - [j6]Yahye Abukar Ahmed, Baris Koçer, Bander Ali Saleh Al-rimy:
Automated Analysis Approach for the Detection of High Survivable Ransomware. KSII Trans. Internet Inf. Syst. 14(5): 2236-2257 (2020) - [j5]Yahye Abukar Ahmed, Baris Koçer, Md. Shamsul Huda, Bander Ali Saleh Al-rimy, Mohammad Mehedi Hassan:
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection. J. Netw. Comput. Appl. 167: 102753 (2020) - [i2]Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Maznah Kamat, Mohd. Foad Rohani, Shukor Abd Razak:
Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network. CoRR abs/2006.09655 (2020)
2010 – 2019
- 2019
- [j4]Fuad A. Ghaleb, Mohd Aizaini Maarof, Anazida Binti Zainal, Bander Ali Saleh Al-rimy, Faisal Saeed, Tawfik Al Hadhrami:
Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. IEEE Access 7: 159119-159140 (2019) - [j3]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection. Future Gener. Comput. Syst. 101: 476-491 (2019) - [j2]Fuad A. Ghaleb, Mohd Aizaini Maarof, Anazida Binti Zainal, Bander Ali Saleh Al-rimy, Abdullah Alsaeedi, Wadii Boulila:
Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. Remote. Sens. 11(23): 2852 (2019) - 2018
- [j1]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Comput. Secur. 74: 144-166 (2018) - [i1]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection. CoRR abs/1807.09574 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint