default search action
Maher Khemakhem
Person information
- affiliation: University of King Abdulaziz, College of Computing and Information Technology, Jeddah, Saudi Arabia
- affiliation: University of Sfax, Tunisia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Asma A. Alhussayen, Kamal Mansur Jambi, Maher Khemakhem, Fathy E. Eassa:
A Blockchain Oracle Interoperability Technique for Permissioned Blockchain. IEEE Access 12: 68130-68148 (2024) - [j19]Ahmad M. Almasabi, Maher Khemakhem, Fathy E. Eassa, Adnan Ahmed Abi Sen, Ahmad B. Alkhodre, Ahmed Harbaoui:
A Smart Framework to Detect Threats and Protect Data of IoT Based on Machine Learning. IEEE Access 12: 176833-176844 (2024) - [j18]Asma A. Alhussayen, Kamal Mansur Jambi, Fathy Eassa, Maher Khemakhem:
Performance evaluation of an oracle-based interoperability for permissioned blockchain. Computing 106(11): 3627-3655 (2024) - [c29]Mohamed Nidhal Abdi, Maher Khemakhem:
Offline Text-Independent Arabic and Chinese Writer Identification Using a Multi-Segmentation Codebook-Based Strategy. ICPRAM 2024: 613-619 - 2023
- [j17]Junaid M. Qurashi, Kamal Mansur Jambi, Fathy E. Eassa, Maher Khemakhem, Fawaz Alsolami, Abdullah Ahmad Basuhail:
Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car. IEEE Access 11: 2652-2673 (2023) - [j16]Zaakki Ahamed, Maher Khemakhem, Fathy Elbouraey Eassa, Fawaz Alsolami, Abdullah Basuhail, Kamal Mansur Jambi:
Deep Reinforcement Learning for Workload Prediction in Federated Cloud Environments. Sensors 23(15): 6911 (2023) - [j15]Ulaa AlHaddad, Abdullah Basuhail, Maher Khemakhem, Fathy Elbouraey Eassa, Kamal Mansur Jambi:
Ensemble Model Based on Hybrid Deep Learning for Intrusion Detection in Smart Grid Networks. Sensors 23(17): 7464 (2023) - [j14]Junaid M. Qurashi, Kamal Mansur Jambi, Fawaz Alsolami, Fathy E. Eassa, Maher Khemakhem, Abdullah Ahmad Basuhail:
Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture. IEEE Trans. Intell. Transp. Syst. 24(11): 11514-11543 (2023) - 2021
- [j13]Khalil Ahmad Alsulbi, Maher Ali Khamakhem, Abdullah Ahmad Basuhail, Fathy E. Eassa, Kamal Mansur Jambi, Khalid Almarhabi:
A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent. Symmetry 13(11): 1990 (2021) - 2020
- [j12]Fathy Elbouraey Eassa, Ahmed Mohammed Alghamdi, Seif Haridi, Maher Khemakhem, Abdullah S. Al-Malaise Al-Ghamdi, Eesa A. Alsolami:
ACC_TEST: Hybrid Testing Approach for OpenACC-Based Programs. IEEE Access 8: 80358-80368 (2020) - [j11]Abdullah Al-Malaise Al-Ghamdi, Ahmed Mohammed Alghamdi, Fathy Elbouraey Eassa, Maher Khemakhem:
ACC_TEST: Hybrid Testing Techniques for MPI-Based Programs. IEEE Access 8: 91488-91500 (2020) - [j10]Mohamed Labidi, Oleg Lodygensky, Gilles Fedak, Maher Khemakhem, Mohamed Jemni:
XtremDew: a platform for cooperative tasks and data schedulers. Int. J. High Perform. Comput. Netw. 16(1): 55-66 (2020) - [j9]Ahmed Mohammed Alghamdi, Fathy Elbouraey Eassa, Maher Ali Khamakhem, Abdullah Saad Al-Malaise Al-Ghamdi, Ahmed S. Alfakeeh, Abdullah S. Alshahrani, Ala Abdulsalam Alarood:
Parallel Hybrid Testing Techniques for the Dual-Programming Models-Based Programs. Symmetry 12(9): 1555 (2020)
2010 – 2019
- 2019
- [j8]Safia Nahhas, Omaimah Bamasag, Maher Khemakhem, Nada Bajnaid:
Bridging Education and Labor Skills by a Novel Competency-Based Course Linked-Data Model. IEEE Access 7: 119087-119098 (2019) - [c28]Khalid Alsubhi, Fawaz Alsolami, Abdullah M. Algarni, E. Albassam, Maher Khemakhem, Fathy Alburaei Eassa, Kamal Mansur Jambi, Muhammad Usman Ashraf:
A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACC. AICCSA 2019: 1-8 - [c27]Sonia Amamou, Zied Trifa, Maher Khemakhem:
Towards a Better Security in Public Cloud Computing. HIS 2019: 441-453 - [c26]Sonia Amamou, Zied Trifa, Maher Khemakhem:
Data protection in cloud computing: A Survey of the State-of-Art. KES 2019: 155-161 - [c25]Hamdi Hassen, Zied Trifa, Maher Khemakhem:
The P2P-Grid-Agent Distributed Platform: A Distributed and Dynamic Platform for Developing and Executing Large-Scale Application Based on Deep Learning Techniques. KES-IDT (2) 2019: 25-35 - 2018
- [j7]Safia Nahhas, Omaimah Bamasag, Maher Khemakhem, Nada Bajnaid:
Added Values of Linked Data in Education: A Survey and Roadmap. Comput. 7(3): 45 (2018) - [j6]Hamdi Hassen, Aisha Zaidan, Maher Khemakhem:
Complementary approaches built as web service for arabic handwriting OCR systems via amazon elastic mapreduce (EMR) model. Int. Arab J. Inf. Technol. 15(3): 419-428 (2018) - [j5]Taha Chaabouni, Maher Khemakhem:
Energy management strategy in cloud computing: a perspective study. J. Supercomput. 74(12): 6569-6597 (2018) - [c24]Hamdi Hassen, Walid Dabour, Maher Khemakhem:
Improving Performance of Robust and Efficient E-Learning Platform Using Distributed Computing Technologies for Saudi Arabia's Institutes. ICCTA 2018: 77-81 - [c23]Khalid Alsubhi, Fawaz Alsolami, Abdullah M. Algarni, Kamal Mansur Jambi, Fathy E. Eassa, Maher Khemakhem:
An Architecture for Translating Sequential Code to Parallel. ICISDM 2018: 88-92 - 2017
- [j4]Hamdi Hassen, Kay Dörnemann, Maher Khemakhem:
Advanced distributed architecture for a complex and large scale Arabic handwriting recognition framework. Int. J. High Perform. Comput. Netw. 10(6): 505-514 (2017) - [c22]Zied Trifa, Maher Khemakhem:
A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks. AICCSA 2017: 128-134 - [c21]Abdullah M. Algarni, Fawaz Alsolami, Fathy Elbouraey Eassa, Khalid Alsubhi, Kamal Mansur Jambi, Maher Khemakhem:
An Open Tool Architecture for Security Testing of NoSQL-Based Applications. AICCSA 2017: 220-225 - [c20]Mohamed Labidi, Mohamed Jemni, Maher Khemakhem:
Co-scheduling Data and Task for a Data-Driven Distribution of Data-Intensive Applications. AICCSA 2017: 407-414 - [c19]Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem:
Pollution Attacks Identification in Structured P2P Overlay Networks. ICICS 2017: 674-686 - 2016
- [j3]Zied Trifa, Maher Khemakhem:
A novel replication technique to attenuate churn effects. Peer-to-Peer Netw. Appl. 9(2): 344-355 (2016) - [c18]Hassanin M. Al-Barhamtoshy, Maher Khemakhem, Kamal Mansur Jambi, F. Essa, Anas M. Fattouh, A. Al-Ghamdi:
Universal metadata repository for document analysis and recognition. AICCSA 2016: 1-6 - [c17]F. Essa, Kamal Mansur Jambi, Anas M. Fattouh, Hassanin M. Al-Barhamtoshy, Maher Khemakhem, A. Al-Ghamdi:
A fedearted E-learning cloud system based on mixed reality. AICCSA 2016: 1-5 - 2015
- [j2]Mohamed Nidhal Abdi, Maher Khemakhem:
A model-based approach to offline text-independent Arabic writer identification and verification. Pattern Recognit. 48(5): 1890-1903 (2015) - 2014
- [c16]Zied Trifa, Maher Khemakhem:
Sybil Nodes as a Mitigation Strategy Against Sybil Attack. ANT/SEIT 2014: 1135-1140 - [c15]Hamdi Hassen, Maher Khemakhem:
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud. ICMCS 2014: 1200-1205 - 2013
- [c14]Zied Trifa, Maher Khemakhem:
Securing Structured P2P Overlay Networks. 3PGCIC 2013: 37-43 - [c13]Faten Kallel Jaiem, Slim Kanoun, Maher Khemakhem, Haikal El Abed, Jihain Kardoun:
Database for Arabic Printed Text Recognition Research. ICIAP (1) 2013: 251-259 - [c12]Anis Mezghani, Slim Kanoun, Souhir Bouaziz, Maher Khemakhem, Haikal El Abed:
Baseline Estimation in Arabic Handwritten Text-Line - Evaluation on AHTID/MW Database. ICPRAM 2013: 430-434 - 2012
- [c11]Mohamed Nidhal Abdi, Maher Khemakhem:
Arabic Writer Identification and Verification Using Template Matching Analysis of Texture. CIT 2012: 592-597 - [c10]Anis Mezghani, Slim Kanoun, Maher Khemakhem, Haikal El Abed:
A Database for Arabic Handwritten Text Image Recognition and Writer Identification. ICFHR 2012: 399-402 - [c9]Mohamed Labidi, Bing Tang, Gilles Fedak, Maher Khemakhem, Mohamed Jemni:
Scheduling Data on Data-Driven Master/Worker Platform. PDCAT 2012: 593-598 - [c8]Zied Trifa, Maher Khemakhem:
Mitigation of Sybil Attacks in Structured P2P Overlay Networks. SKG 2012: 245-248 - [i2]Hamdi Hassen, Maher Khemakhem:
A Comparative study of Arabic handwritten characters invariant feature. CoRR abs/1211.1800 (2012) - 2010
- [i1]Maher Khemakhem, Abdelfettah Belghith:
Towards trusted volunteer grid environments. CoRR abs/1003.3305 (2010)
2000 – 2009
- 2009
- [j1]Maher Khemakhem, Abdelfattah Belghith:
Towards a distributed Arabic OCR based on the DTW algorithm: performance analysis. Int. Arab J. Inf. Technol. 6(2): 153-161 (2009) - [c7]Maher Khemakhem, Abdelfettah Belghith:
Identity federation based on agent technology for secure large scale data storage and processing over volunteer grids. AICCSA 2009: 11-14 - [c6]Mohamed Nidhal Abdi, Maher Khemakhem, Hanêne Ben-Abdallah:
An Effective Combination of MPP Contour-Based Features for Off-Line Text-Independent Arabic Writer Identification. FGIT-SIP 2009: 209-220 - [c5]Wiem Rekik, Maher Khemakhem, Abdelfettah Belghith, Jacques Fayolle:
PKI and UDDI based trust centre: An attempt to improve web service security. ICITST 2009: 1-4 - [c4]Mohamed Nidhal Abdi, Maher Khemakhem, Hanêne Ben-Abdallah:
A novel approach for off-line Arabic writer identification based on stroke feature combination. ISCIS 2009: 597-600 - 2008
- [c3]Maher Khemakhem, Hanêne Ben-Abdallah, Abdelfattah Belghith:
Towards an agent based framework for the design of secure web services. SWS 2008: 81-86 - 2005
- [c2]Maher Khemakhem, Abdelfattah Belghith:
A multipurpose multi-agent system based on a loosely coupled architecture to speedup the DTW algorithm for Arabic printed cursive OCR. AICCSA 2005: 121 - 2004
- [c1]Maher Khemakhem, Abdelfatteh Belghith:
Performance Evaluation of a Multi-Agent Framework for Multiple Document Processing. CCCT (1) 2004: 18-22
Coauthor Index
aka: Abdullah S. Al-Malaise Al-Ghamdi
aka: Abdullah Saad Al-Malaise Al-Ghamdi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 19:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint