Towards secure mobile cloud computing: A survey AN Khan, MLM Kiah, SU Khan, SA Madani Future generation computer systems 29 (5), 1278-1299, 2013 | 468 | 2013 |
A review of smart home applications based on Internet of Things M Alaa, AA Zaidan, BB Zaidan, M Talal, MLM Kiah Journal of Network and Computer Applications 97, 48-65, 2017 | 281 | 2017 |
Reversible data hiding based on multilevel histogram modification and sequential recovery Z Zhao, H Luo, ZM Lu, JS Pan AEU-International Journal of Electronics and Communications 65 (10), 814-826, 2011 | 219 | 2011 |
Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission D Petković, Ž Ćojbašić, V Nikolić, S Shamshirband, MLM Kiah, NB Anuar, ... Energy 64, 868-874, 2014 | 160 | 2014 |
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ... Journal of Network and Computer Applications 74, 98-120, 2016 | 148 | 2016 |
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique S Shamshirband, NB Anuar, MLM Kiah, A Patel Engineering Applications of Artificial Intelligence 26 (9), 2105-2127, 2013 | 141 | 2013 |
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham Engineering Applications of Artificial Intelligence 32, 228-241, 2014 | 140 | 2014 |
Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS AA Zaidan, BB Zaidan, A Al-Haiqi, MLM Kiah, M Hussain, M Abdulnabi Journal of biomedical informatics 53, 390-404, 2015 | 123 | 2015 |
On the differences between hiding information and cryptography techniques: An overview BB Zaidan, AA Zaidan, AK Al-Frajat, HA Jalab Journal of Applied Sciences 10 (15), 1650-1655, 2010 | 114 | 2010 |
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, MLM Kiah, NB Anuar, ... Computer methods and programs in biomedicine 122 (3), 393-408, 2015 | 109 | 2015 |
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks S Shamshirband, A Amini, NB Anuar, MLM Kiah, YW Teh, S Furnell Measurement 55, 212-226, 2014 | 103 | 2014 |
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ... Journal of Network and Computer Applications 42, 102-117, 2014 | 98 | 2014 |
Multi-criteria analysis for OS-EMR software selection problem: A comparative study AA Zaidan, BB Zaidan, M Hussain, A Haiqi, MLM Kiah, M Abdulnabi Decision Support Systems 78, 15-27, 2015 | 91 | 2015 |
Incremental proxy re-encryption scheme for mobile cloud computing environment AN Khan, MLM Kiah, SA Madani, M Ali, S Shamshirband The Journal of Supercomputing 68 (2), 624-651, 2014 | 89 | 2014 |
Routing protocol design for secure WSN: Review and open research issues SM Zin, NB Anuar, MLM Kiah, ASK Pathan Journal of Network and Computer Applications 41, 517-530, 2014 | 83 | 2014 |
Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission S Shamshirband, D Petković, A Amini, NB Anuar, V Nikolić, Ž Ćojbašić, ... Energy 67, 623-630, 2014 | 80 | 2014 |
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing AN Khan, MLM Kiah, SA Madani, M Ali The Journal of Supercomputing 66 (3), 1687-1706, 2013 | 72 | 2013 |
Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm M Protić, S Shamshirband, D Petković, A Abbasi, MLM Kiah, JA Unar, ... Energy 87, 343-351, 2015 | 70 | 2015 |
RETRACTED: Wind turbine power coefficient estimation by soft computing methodologies: Comparative study S Shamshirband, D Petković, H Saboohi, NB Anuar, I Inayat, S Akib, ... Energy Conversion and Management 81, 520-526, 2014 | 69 | 2014 |
Open source EMR software: Profiling, insights and hands-on analysis MLM Kiah, A Haiqi, BB Zaidan, AA Zaidan Computer methods and programs in biomedicine 117 (2), 360-382, 2014 | 66 | 2014 |