Effective attack detection in internet of medical things smart environment using a deep belief neural network S Manimurugan, S Al-Mutairi, MM Aborokbah, N Chilamkurti, S Ganesan, ... IEEE Access 8, 77396-77404, 2020 | 251 | 2020 |
Two-stage classification model for the prediction of heart disease using IoMT and artificial intelligence S Manimurugan, S Almutairi, MM Aborokbah, C Narmatha, S Ganesan, ... Sensors 22 (2), 476, 2022 | 68 | 2022 |
Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities—A case analysis MM Aborokbah, S Al-Mutairi, AK Sangaiah, OW Samuel Sustainable cities and society 41, 919-924, 2018 | 64 | 2018 |
A new secure transmission scheme between senders and receivers using HVCHC without any loss S Almutairi, M Aborokbah EURASIP Journal on Wireless Communications and Networking 2019 (1), 88, 2019 | 52 | 2019 |
Review of advanced computational approaches on multiple sclerosis segmentation and classification M Shanmuganathan, S Almutairi, MM Aborokbah, S Ganesan, ... IET Signal Processing 14 (6), 333-341, 2020 | 46 | 2020 |
A novel secret image hiding technique for secure transmission S Manimurugan, S Al-Mutairi Journal of Theoretical and Applied Information Technology 95 (1), 166-176, 2017 | 38 | 2017 |
An intrusion detection system using BoT-IoT S Alosaimi, SM Almutairi Applied Sciences 13 (9), 5427, 2023 | 32 | 2023 |
Breast cancer classification using Deep Q Learning (DQL) and gorilla troops optimization (GTO) S Almutairi, S Manimurugan, BG Kim, MM Aborokbah, C Narmatha Applied Soft Computing 142, 110292, 2023 | 27 | 2023 |
The clandestine image transmission scheme to prevent from the intruders S Al-Mutairi, S Manimurugan International Journal of Advanced and Applied Sciences 4 (2), 52-60, 2017 | 27 | 2017 |
Certain Investigations on IoT system for COVID-19 S Jaafari, A Alhasani, SM Almutairi 2020 International Conference on Computing and Information Technology (ICCIT …, 2020 | 23 | 2020 |
Review on the security related issues in context aware system S Almutairi, H Aldabbas, A Abu-Samaha International Journal of Wireless & Mobile Networks 4 (3), 195, 2012 | 22 | 2012 |
Image steganography using LSB and hybrid encryption algorithms M Alanzy, R Alomrani, B Alqarni, S Almutairi Applied Sciences 13 (21), 11771, 2023 | 17 | 2023 |
Specifying security requirements of context aware system using UML S Almutairi, G Bella, A Abu-Samaha Seventh International Conference on Digital Information Management (ICDIM …, 2012 | 16 | 2012 |
Non-divergent traffic management scheme using classification learning for smart transportation systems S Manimurugan, S Almutairi Computers and Electrical Engineering 106, 108581, 2023 | 15 | 2023 |
A survey on cloud security issues and solution S Alatawi, A Alhasani, S Alfaidi, M Albalawi, SM Almutairi 2020 International Conference on Computing and Information Technology (ICCIT …, 2020 | 14 | 2020 |
An Efficient USE‐Net Deep Learning Model for Cancer Detection SM Almutairi, S Manimurugan, MM Aborokbah, C Narmatha, S Ganesan, ... International Journal of Intelligent Systems 2023 (1), 8509433, 2023 | 10 | 2023 |
An enhanced use case diagram to model Context Aware Systems S Almutairi, A Abu-Samaha, G Bell, F Chen 2013 Science and Information Conference, 270-274, 2013 | 10 | 2013 |
A user-based video recommendation approach using CAC filtering, PCA with LDOS-CoMoDa S Manimurugan, S Almutairi The Journal of Supercomputing 78 (7), 9377-9391, 2022 | 9 | 2022 |
An efficient secret image transmission scheme using Dho-encryption technique S Al-Mutairi, S Manimurugan International Journal of Computer Science and Information Security 14 (10), 446, 2016 | 8 | 2016 |
An intrusion detection system in IoT environment using KNN and SVM classifiers AM Alfarshouti, SM Almutairi Webology 19 (1), 3500-3517, 2022 | 6 | 2022 |