Follow
Mahathir Almashor
Mahathir Almashor
Senior Engineer, CSIRO Energy
Verified email at csiro.au - Homepage
Title
Cited by
Cited by
Year
Simulation of wildfire evacuation with dynamic factors and model composition
A Beloglazov, M Almashor, E Abebe, J Richter, KCB Steer
Simulation Modelling Practice and Theory 60, 144-159, 2016
952016
Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things
AP Kalapaaking, I Khalil, MS Rahman, M Atiquzzaman, X Yi, M Almashor
IEEE Transactions on Industrial Informatics 19 (2), 1703-1714, 2022
402022
Spectral analysis of EEG during microsleep events annotated via driver monitoring system to characterize drowsiness
C Wang, B Guragain, AK Verma, L Archer, S Majumder, A Mohamud, ...
IEEE Transactions on Aerospace and Electronic Systems 56 (2), 1346-1356, 2019
292019
On the utility of shelters in wildfire evacuations
K Steer, E Abebe, M Almashor, A Beloglazov, X Zhong
Fire safety journal 94, 22-32, 2017
192017
Enhancing availability in content delivery networks for mobile platforms
M Almashor, I Khalil, Z Tari, AY Zomaya, S Sahni
IEEE Transactions on Parallel and Distributed Systems 26 (8), 2247-2257, 2014
192014
Evaluation of federated learning in phishing email detection
C Thapa, JW Tang, A Abuadbba, Y Gao, S Camtepe, S Nepal, ...
Sensors 23 (9), 4346, 2023
102023
IoT based smart agriculture monitoring, automation and intrusion detection system
AF Suhaimi, N Yaakob, SA Saad, KA Sidek, ME Elshaikh, AKY Dafhalla, ...
Journal of Physics: Conference Series 1962 (1), 012016, 2021
102021
Smpc-based federated learning for 6g-enabled internet of medical things
AP Kalapaaking, V Stephanie, I Khalil, M Atiquzzaman, X Yi, M Almashor
IEEE Network 36 (4), 182-189, 2022
92022
Automatic and autonomous load management in peer-to-peer virtual environments
M Almashor, I Khalil, Z Tari, AY Zomaya
IEEE Journal on Selected Areas in Communications 31 (9), 310-324, 2013
82013
Towards web phishing detection limitations and mitigation
A Abuadbba, S Wang, M Almashor, ME Ahmed, R Gaire, S Camtepe, ...
arXiv preprint arXiv:2204.00985, 2022
72022
Radial basis function network with differential privacy
N Bugshan, I Khalil, N Moustafa, M Almashor, A Abuadbba
Future Generation Computer Systems 127, 473-486, 2022
72022
Characterizing malicious url campaigns
M Almashor, E Ahmed, B Pick, S Abuadbba, R Gaire, S Camtepe, S Nepal
arXiv preprint arXiv:2108.12726, 2021
72021
Resource planning having improved visualization
MBA Almashor, H Anjomshoa, A Eberbach, OJ Smith, AJ Swan
US Patent 11,315,056, 2022
62022
Load-balancing properties of 3D Voronoi diagrams in peer-to-peer virtual environments
M Almashor, I Khalil
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
52010
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
R Zelenkova, J Swallow, MAP Chamikara, D Liu, MB Chhetri, S Camtepe, ...
arXiv preprint arXiv:2202.10320, 2022
42022
Reducing network load in large-scale, peer-to-peer virtual environments with 3d voronoi diagrams
M Almashor, I Khalil
2010 International Conference on High Performance Computing, 1-10, 2010
42010
IoT-Based Automated and Contactless Shopping Cart During Pandemic Diseases Outbreak
HY Faang, N Yaakob, ME Elshaikh, AK Sidek, OB Lynn, M Almashor
Journal of Physics: Conference Series 1962 (1), 012051, 2021
32021
Fully peer-to-peer virtual environments with 3D Voronoi diagrams
M Almashor, I Khalil
Computing 94, 679-700, 2012
32012
Dynamic game-play arbitrators with 3d voronoi diagrams
M Almashor, I Khalil, G Leach
2010 Ninth IEEE International Symposium on Network Computing and …, 2010
32010
PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
A Wong, A Abuadbba, M Almashor, S Kanhere
arXiv preprint arXiv:2209.01582, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20