Folgen
M. Omar Al-Kadri
M. Omar Al-Kadri
Sonstige NamenMhd Omar Al Kadri
University of Doha for Science and Technology
Bestätigte E-Mail-Adresse bei udst.edu.qa
Titel
Zitiert von
Zitiert von
Jahr
A survey on wireless body area networks: Architecture, security challenges and research opportunities
MS Hajar, MO Al-Kadri, HK Kalutarage
Computers & Security 104, 102211, 2021
1212021
Android mobile malware detection using machine learning: A systematic review
J Senanayake, H Kalutarage, MO Al-Kadri
Electronics 10 (13), 1606, 2021
682021
Ai-based intrusion detection systems for in-vehicle networks: A survey
S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo, ...
ACM Computing Surveys 55 (11), 1-40, 2023
522023
Full-duplex small cells for next generation heterogeneous cellular networks: A case study of outage and rate coverage analysis
MO Al-Kadri, Y Deng, A Aijaz, A Nallanathan
IEEE Access 5, 8025-8038, 2017
442017
An energy-efficient full-duplex MAC protocol for distributed wireless networks
MO Al-Kadri, A Aijaz, A Nallanathan
IEEE Wireless Communications Letters 5 (1), 44-47, 2015
422015
Android source code vulnerability detection: a systematic literature review
J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras
ACM Computing Surveys 55 (9), 1-37, 2023
322023
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus
HK Kalutarage, MO Al-Kadri, M Cheah, G Madzudzo
Proceedings of the 3rd ACM Computer Science in Cars Symposium, 1-8, 2019
222019
Keep the moving vehicle secure: Context-aware intrusion detection system for in-vehicle CAN bus security
S Rajapaksha, H Kalutarage, MO Al-Kadri, G Madzudzo, AV Petrovski
2022 14th International Conference on Cyber Conflict: Keep Moving!(CyCon …, 2022
202022
Developing secured android applications by mitigating code vulnerabilities with machine learning
J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
142022
Ltms: A lightweight trust management system for wireless medical sensor networks
MS Hajar, MO Al-Kadri, H Kalutarage
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
122020
Ai-powered vulnerability detection for secure source code development
S Rajapaksha, J Senanayake, H Kalutarage, MO Al-Kadri
International Conference on Information Technology and Communications …, 2022
92022
Resource efficient boosting method for IoT security monitoring
I Zakariyya, MO Al-Kadri, H Kalutarage
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
92021
On Full Duplex Wireless Networks: PHY, MAC and Network Layers Perspective
MO Alkadri
King's College London, 2017
9*2017
Ergodic capacity of interference coordinated hetnet with full-duplex small cells
MO Al-Kadri, A Aijaz, A Nallanathan
Proceedings of European Wireless 2015; 21th European Wireless Conference, 1-6, 2015
82015
X-FDR: A cross-layer routing protocol for multihop full-duplex wireless networks
MO Al-Kadri, A Aijaz, A Nallanathan
IEEE wireless communications 26 (2), 70-77, 2018
62018
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin
J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras
IFIP Annual Conference on Data and Applications Security and Privacy, 339-357, 2023
52023
Improving in-vehicle networks intrusion detection using on-device transfer learning
S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo
Symposium on vehicles security and privacy 10, 2023
52023
Etaree: An effective trend-aware reputation evaluation engine for wireless medical sensor networks
MS Hajar, MO Al-Kadri, H Kalutarage
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
52020
Resource efficient federated deep learning for IoT security monitoring
I Zakariyya, H Kalutarage, MO Al-Kadri
International Workshop on Attacks and Defenses for Internet-of-Things, 122-142, 2022
42022
Framework for Detecting APTs Based on Steps Analysis and Correlation
HN Eke, A Petrovski, H Ahriz, MO Al-Kadri
Security and Resilience in Cyber-Physical Systems: Detection, Estimation and …, 2022
42022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20