default search action
Wasim Alhamdani 0001
Person information
- affiliation: University of the Cumberlands, Department of Computer Information Sciences, Williamsburg, KY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Zero-day attack detection: a systematic literature review. Artif. Intell. Rev. 56(10): 10733-10811 (2023) - 2022
- [j8]Yasser A. Yasser, Ahmed T. Sadiq, Wasim Alhamdani:
A Proposed Harmony Search Algorithm for Honeyword Generation. Adv. Hum. Comput. Interact. 2022: 9607550:1-9607550:10 (2022) - [j7]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Towards building data analytics benchmarks for IoT intrusion detection. Clust. Comput. 25(3): 2125-2141 (2022) - [j6]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
A comprehensive deep learning benchmark for IoT IDS. Comput. Secur. 114: 102588 (2022) - [j5]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks. J. Inf. Secur. Appl. 67: 103196 (2022) - 2021
- [j4]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark. Future Internet 13(12): 318 (2021) - 2020
- [c17]Salahaldeen Duraibi, Wasim Alhamdani, Frederick T. Sheldon:
Voice Feature Learning using Convolutional Neural Networks Designed to Avoid Replay Attacks. SSCI 2020: 1845-1851
2010 – 2019
- 2014
- [c16]Carlo Labudiong, Wasim A. Al-Hamdani:
Network risk assessment base on multi-core processor architecture. InfoSecCD 2014: 4:1 - [c15]Mauri Martin, Wasim A. Al-Hamdani:
Secure key management in cloud computing. InfoSecCD 2014: 12:1 - 2013
- [j3]David Crowe, Wasim A. Al-Hamdani:
Retained-Key Encryption. Int. J. Interdiscip. Telecommun. Netw. 5(2): 1-17 (2013) - [c14]David Crowe, Wasim A. Al-Hamdani:
Google Privacy: Something for Nothing? InfoSecCD 2013: 27-32 - [c13]Duane Hunt, Wasim A. Al-Hamdani:
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL. InfoSecCD 2013: 33-41 - 2012
- [c12]David Crowe, Wasim A. Al-Hamdani:
System evaluation lifecycle: chasing windmills. InfoSecCD 2012: 57-61 - [c11]David Crowe, Wasim A. Al-Hamdani:
Lightening in a bottle: usable and secure. InfoSecCD 2012: 62-68 - 2011
- [c10]Wasim A. Al-Hamdani:
Elliptic curve for data protection. InfoSecCD 2011: 1-14 - [c9]John C. Roberts II, Wasim A. Al-Hamdani:
Who can you trust in the cloud?: a review of security issues within cloud computing. InfoSecCD 2011: 15-19 - [c8]Christopher Woodward, Wasim A. Al-Hamdani:
PKI and access control in office environments. InfoSecCD 2011: 20-24 - [c7]Durga Vemuri, Wasim A. Al-Hamdani:
Measures to improve security in a microkernel operating system. InfoSecCD 2011: 25-33 - [c6]Rand A. Mahmood, Wasim A. Al-Hamdani:
Is RFID technology secure and private? InfoSecCD 2011: 42-49 - 2010
- [c5]Wasim A. Al-Hamdani:
Cryptography based access control in healthcare web systems. InfoSecCD 2010: 66-79 - [c4]Wasim A. Al-Hamdani:
XML security in healthcare web systems. InfoSecCD 2010: 80-93
2000 – 2009
- 2009
- [j2]Wasim A. Al-Hamdani:
Three Models to Measure Information Security Compliance. Int. J. Inf. Secur. Priv. 3(4): 43-67 (2009) - 2007
- [j1]Wasim A. Al-Hamdani:
Education Organization Baseline Control Protection and Trusted Level Security. J. Digit. Forensics Secur. Law 2(4): 19-42 (2007) - [c3]Wasim A. Al-Hamdani:
Education organization baseline control protection and trusted level security. InfoSecCD 2007: 14:1 - 2006
- [c2]Wasim A. Al-Hamdani:
Knowledge flow with information assurance track. InfoSecCD 2006: 52-57 - [c1]Wasim A. Al-Hamdani:
Assessment of need and method of delivery for information security awareness program. InfoSecCD 2006: 102-108
1980 – 1989
- 1984
- [b1]W. A. K. Al-Hamdani:
Computer architecture description and algorithms. University of East Anglia, Norwich, UK, 1984
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint