Muder Almi'ani
Gulf University for Science and Technology
H-index: 14
Asia-Kuwait
Top articles of Muder Almi'ani
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing | Internet of Things | Abdul Razaque Meenhoon Khan Joon Yoo Aziz Alotaibi Majid Alshammari | 2024/2/15 |
DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement | Cluster Computing | Bilal Abu-Salih Salihah Alotaibi Ruba Abukhurma Muder Almiani Mohammed Aljaafari | 2024/1/13 |
Parallel metaheuristic algorithms for solving imbalanced data classification problems | IEEE Access | Mohammed Alweshah Muder Almiani Saleh Alkhalaileh Sofian Kassaymeh Essa Abdullah Hezzam | 2023/10/12 |
Securing the Digital Fortress: Unveiling the Modern Battleground for Sustainable OSs and the Digital Threatscape | Shadi AlZu'bi Samar Hendawi Islam Altalahin Muder Almiani Ala Mughaid | 2023/9/18 | |
Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks | Muder Almiani Alia AbuGhazleh Ala Mughaid Yaser Jararweh | 2023/9/18 | |
Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer’s Disease diagnosis | Cluster Computing | Amer Al-Rahayfeh Saleh Atiewi Muder Almiani Mohammad Jararweh Miad Faezipour | 2023/7/23 |
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks | Cluster Computing | Saleh Atiewi Amer Al-Rahayfeh Muder Almiani Abdullah Abuhussein Salman Yussof | 2023/11/28 |
Incorporating Time-Series Forecasting Techniques to Predict Logistics Companies’ Staffing Needs and Order Volume | Computation | Ahmad Alqatawna Bilal Abu-Salih Nadim Obeid Muder Almiani | 2023/7/14 |
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment | Mahmoud Aljamal Ala Mughaid Rabee Alquran Muder Almiani Shadi AlZu'bi | 2023/11/14 | |
Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning | Electronics | Abdul Razaque Mohamed Ben Haj Frej Gulnara Bektemyssova Muder Almi’ani Fathi Amsaad | 2023/2/25 |
Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm | The Journal of Supercomputing | Mohammed Alweshah Saleh Alkhalaileh Majdi Beseiso Muder Almiani Salwani Abdullah | 2022/3/2 |
Credit card-not-present fraud detection and prevention using big data analytics algorithms | Applied Sciences | Abdul Razaque Mohamed Ben Haj Frej Gulnara Bektemyssova Fathi Amsaad Muder Almiani | 2022/12/21 |
Vehicle routing problems based on Harris Hawks optimization | Journal of Big Data | Mohammed Alweshah Muder Almiani Nedaa Almansour Saleh Al Khalaileh Hamza Aldabbas | 2022/4 |
Intelligent Ensemble based System for Rare Attacks Dectection in IoT Networks | Muder Almiani Alia AbuGhazleh Yaser Jararweh Abdul Razaque | 2022/12/4 | |
Energy-efficient and secure mobile fog-based cloud for the Internet of Things | Future Generation Computer Systems | Abdul Razaque Yaser Jararweh Bandar Alotaibi Munif Alotaibi Salim Hariri | 2022/2/1 |
Sentiment Analysis of Arabic Reviews Using a Hybrid Clustering Technique | Mohammed Alweshah Omar Alahmed Saleh Alkhalaileh Muder Almiani Azuraliza Abu Bakar | 2022/9/2 | |
State-of-art review of information diffusion models and their impact on social network vulnerabilities | Abdul Razaque Syed Rizvi Muder Almiani Amer Al Rahayfeh | 2022/1/1 | |
Hybrid energy-efficient algorithm for efficient internet of things deployment | Sustainable Computing: Informatics and Systems | Abdul Razaque Yaser Jararweh Bandar Alotaibi Munif Alotaibi Muder Almiani | 2022/9/1 |
Resilient back propagation neural network security model for containerized cloud computing | Simulation Modelling Practice and Theory | Muder Almiani Alia Abughazleh Yaser Jararweh Abdul Razaque | 2022/7/1 |
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities | Abdul Razaque Vladislav Alexandrov Muder Almiani Bandar Alotaibi Munif Alotaibi | 2021/12/6 |