关注
Shikah J. Alsunaidi
Shikah J. Alsunaidi
KFUPM, Department of Information and Computer Science
在 kfupm.edu.sa 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A Survey of Consensus Algorithms for Blockchain Technology
SJ Alsunaidi, FA Alhaidari
2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019
1442019
Applications of Big Data Analytics to Control COVID-19 Pandemic
SJ Alsunaidi, AM Almuhaideb, NM Ibrahim, FS Shaikh, KS Alqudaihi, ...
Sensors 21 (7), 2282, 2021
1112021
Cough Sound Detection and Diagnosis Using Artificial Intelligence Techniques: Challenges and Opportunities
KS Alqudaihi, N Aslam, IU Khan, AM Almuhaideb, SJ Alsunaidi, ...
IEEE Access 9, 102327-102344, 2021
692021
E-Triage Systems for COVID-19 Outbreak: Review and Recommendations
F Alhaidari, A Almuhaideb, S Alsunaidi, N Ibrahim, N Aslam, IU Khan, ...
Sensors 21 (8), 2845, 2021
312021
Machine learning model for predicting the length of stay in the intensive care unit for Covid-19 patients in the eastern province of Saudi Arabia
DA Alabbad, AM Almuhaideb, SJ Alsunaidi, KS Alqudaihi, FA Alamoudi, ...
Informatics in Medicine Unlocked 30, 100937, 2022
262022
Security Methods Against Potential Physical Attacks on Smartphones
SJ Alsunaidi, AM Almuhaideb
2019 2nd International Conference on Computer Applications & Information …, 2019
112019
A comparison of human brainwaves-based biometric authentication systems
SJ Alsunaidi, NA Saqib, KA Alissa
International Journal of Biometrics 12 (4), 411-429, 2020
92020
Homoglyph Attack Detection Model Using Machine Learning and Hash Function
AM Almuhaideb, N Aslam, A Alabdullatif, S Altamimi, S Alothman, ...
Journal of Sensor and Actuator Networks 11 (3), 54, 2022
82022
Blockchain-based Distributed Renewable Energy Management Framework
SJ Alsunaidi, FA Khan
IEEE Access 10, 81888 - 81898, 2022
82022
The Security Risks Associated With IMEIs And Security Solutions
SJ Alsunaidi, AM Almuhaideb
2019 2nd International Conference on Computer Applications & Information …, 2019
72019
Investigation of the Optimal Method for Generating and Verifying the Smartphone's Fingerprint: A Review
SJ Alsunaidi, AM Almuhaideb
Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022
62022
A strong smartphone authentication model to control cellular network access using blockchain
SJ Alsunaidi, AM Almuhaideb
Wireless Networks 27 (4), 2301-2321, 2021
52021
Twitter Spam Accounts Detection Using Machine Learning Models
SJ Alsunaidi, RT Alraddadi, H Aljamaan
2022 14th International Conference on Computational Intelligence and …, 2022
32022
Dynamic Interpretation Approaches for Information Security Risk Assessment
RM Alhajri, SJ Alsunaidi, R Zagrouba, AM Almuhaideb, MA Alqahtani
2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019
32019
Sensor-based identification to detect counterfeit smartphones using Blockchain
AM Almuhaideb, SJ Alsunaidi
Journal of Ambient Intelligence and Humanized Computing 14 (12), 16521-16538, 2023
2023
Performance Evaluation of Machine Learning Models on Apache Spark: An Empirical Study
AZ Yamani, SJ Alsunaidi, I Boudellioua
2022 14th International Conference on Computational Intelligence and …, 2022
2022
A Strong Smartphone Authentication Approach to Control Cellular Network Access
S Alsunaidi
https://drepo.sdl.edu.sa/handle/20.500.14154/119, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–17