Enhanced-AODV: A robust three phase priority-based traffic load balancing scheme for internet of things M Adil, H Song, J Ali, MA Jan, M Attique, S Abbas, A Farouk IEEE Internet of Things Journal 9 (16), 14426-14437, 2021 | 82 | 2021 |
Hash-mac-dsdv: Mutual authentication for intelligent iot-based cyber–physical systems M Adil, MA Jan, S Mastorakis, H Song, MM Jadoon, S Abbas, A Farouk IEEE Internet of Things Journal 9 (22), 22173-22183, 2021 | 71 | 2021 |
Intelligent cloud algorithms for load balancing problems: A survey AAS Farrag, SA Mahmoud, M El Sayed 2015 IEEE Seventh International Conference on Intelligent Computing and …, 2015 | 48 | 2015 |
Three byte-based mutual authentication scheme for autonomous Internet of Vehicles M Adil, J Ali, M Attique, MM Jadoon, S Abbas, SR Alotaibi, VG Menon, ... IEEE Transactions on Intelligent Transportation Systems 23 (7), 9358-9369, 2021 | 30 | 2021 |
Developing an Argument Learning Environment Using Agent-Based ITS (ALES). S Abbas, H Sawamura International Working Group on Educational Data Mining, 2009 | 27 | 2009 |
A blind and high-capacity data hiding of DICOM medical images based on fuzzification concepts A Elhadad, A Ghareeb, S Abbas Alexandria engineering journal 60 (2), 2471-2482, 2021 | 25 | 2021 |
Improving the security of multi-party quantum key agreement with five-qubit Brown states A Elhadad, S Abbas, H Abulkasim, S Hamad Computer Communications 159, 155-160, 2020 | 25 | 2020 |
Deposit subscribe prediction using data mining techniques based real marketing dataset S Abbas arXiv preprint arXiv:1503.04344, 2015 | 24 | 2015 |
Statistical analysis for random bits generation on quantum key distribution OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem 2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014 | 22 | 2014 |
The PDBO algorithm for discrete time, cost and quality trade-off in software projects with expressing quality by defects A Saif, S Abbas, Z Fayed Procedia computer science 65, 930-939, 2015 | 21 | 2015 |
A comparative study between modern encryption algorithms based on cloud computing environment OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem 8th International Conference for Internet Technology and Secured …, 2013 | 20 | 2013 |
Efficiency of modern encryption algorithms in cloud computing OK Jasim, S Abbas, ESM El-Horbaty, ABM Salem International Journal of Emerging Trends & Technology in Computer Science …, 2013 | 20 | 2013 |
A first step towards argument mining and its use in arguing agents S Abbas, H Sawamura Knowledge-Based Intelligent Information and Engineering Systems: 12th …, 2008 | 19* | 2008 |
& Farouk, A.(2021). Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles M Adil, J Ali, M Attique, MM Jadoon, S Abbas, SR Alotaibi IEEE Transactions on Intelligent Transportation Systems, 0 | 18 | |
Lightweight authenticated privacy-preserving secure framework for the Internet of vehicles M Jamjoom, H Abulkasim, S Abbas Security and Communication Networks 2022, 2022 | 17 | 2022 |
Quantum key distribution: simulation and characterizations OK Jasim, S Abbas, ESM El-Horbaty, ABM Salem Procedia Computer Science 65, 701-710, 2015 | 17 | 2015 |
Evolution of an emerging symmetric quantum cryptographic algorithm OK Jasim, S Abbas, ESM Horbaty, ABM Salem arXiv preprint arXiv:1503.04796, 2015 | 14 | 2015 |
Securing Copyright Using 3D Objects Blind Watermarking Scheme. H Abulkasim, M Jamjoom, S Abbas Computers, Materials & Continua 72 (3), 2022 | 13 | 2022 |
Innovative Method for enhancing Key generation and management in the AES-algorithm OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem arXiv preprint arXiv:1504.03406, 2015 | 13 | 2015 |
Cryptographic cloud computing environment as a more trusted communication environment OK Jasim, S Abbas, ESM El-Horbaty, ABM Salem International Journal of Grid and High Performance Computing (IJGHPC) 6 (2 …, 2014 | 13 | 2014 |