Abdullah M. Almuhaideb, PhD
Abdullah M. Almuhaideb, PhD
Imam Abdulrahman Bin Faisal University, College of Computer Science and Information Technology
Verified email at iau.edu.sa - Homepage
Title
Cited by
Cited by
Year
Information security threats classification pyramid
M Alhabeeb, A Almuhaideb, PD Le, B Srinivasan
IEEE 24th international conference on advanced information networking and …, 2010
362010
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance
A Almuhaideb, M Alhabeeb, PD Le, B Srinivasan
IEEE AINA 2010: The 24th International Conference on Advanced Information …, 2010
82010
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks
A Almuhaideb, PD Le, B Srinivasan
IEEE NCA 2011: The 10th International Symposium onNetwork Computing and …, 2011
52011
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens
AM Almuhaideb, MA Alhabeeb, PD Le, B Srinivasan
Journal of Telecommunications 1 (2), 1-10, 2010
42010
A Survey on Android Malware Detection Techniques Using Machine Learning Algorithms.
EJ Alqahtani, R Zagrouba, A Almuhaideb
2019 Sixth International Conference on Software Defined Systems (SDS), 110-117, 2019
32019
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications
A Almuhaideb, PD Le, B Srinivasan
MobiQuitous 2010: The 7th International ICST Conference on Mobile and …, 2012
32012
Passport-Visa based authentication mechanism for ubiquitous mobile communication
A Almuhaideb, M Alhabeeb, PD Le, B Srinivasan
IEEE The 6th International Conference on Networked Computing (INC), 2010, 1-6, 2010
32010
Toward a Ubiquitous Mobile Access Model: A roaming agreement-less approach
A Almuhaideb, T Alharbi, M Alhabeeb, PD Le, B Srinivasan
IEEE SNPD 2010: The 11th ACIS International Conference on Software …, 2010
22010
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping
MA Alhabeeb, AM Almuhaideb, PD Le
Journal of Telecommunications 1 (1), 14-24, 2010
22010
A Hybrid Mobile Authentication Model for Ubiquitous Networking
A Almuhaideb, B Srinivasan, PD Le, M Alhabeeb, W Alfehaid
IEEE Trustcom 2015: The 14th International Conference on Trust, Security and …, 2015
12015
Authentication in ubiquitous networking
AM Almuhaideb, B Srinivasan
International Journal of Information Security and Privacy (IJISP) 9 (3), 57-83, 2015
12015
Analysis of mobile authentication protocols by SVO logic
A Almuhaideb, B Srinivasan, PD Le, C Wilson, V Malhotra
Proceedings of the 1st International Conference on Security of Internet of …, 2012
12012
Securing mobile access in ubiquitous networking via non-roaming agreement protocol
T Alharbi, A Almuhaideb, P Le
ICICS 2010: The 12th International Conference on Information and …, 2010
12010
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers
M Alhabeeb, S Alsunbul, A Almuhaideb, PD Le, B Srinivasan
IEEE SNPD 2010: The 11th ACIS International Conference on Software …, 2010
12010
Holistic approach for critical system security: Flooding prevention
M Alhabeeb, X Wu, A Almuhaideb, PD Le, B Srinivasan
IEEE INC 2010: The 6th International Conference on Networked Computing, 1-8, 2010
12010
Investigation of the Optimal Method for Generating and Verifying the Smartphone's Fingerprint: A Review
SJ Alsunaidi, AM Almuhaideb
Journal of King Saud University-Computer and Information Sciences, 2020
2020
Methods, computer readable media, and systems for authentication using a text file and a one-time password
RZ Alhawaj, MI Al Qasim, GT Al-Ghussein, NM Alshehri, GM Al-Sahwan, ...
US Patent App. 16/195,972, 2020
2020
Security Methods Against Potential Physical Attacks on Smartphones
SJ Alsunaidi, AM Almuhaideb
2019 2nd International Conference on Computer Applications & Information …, 2019
2019
The Security Risks Associated With IMEIs And Security Solutions
SJ Alsunaidi, AM Almuhaideb
2019 2nd International Conference on Computer Applications & Information …, 2019
2019
Dynamic Interpretation Approaches for Information Security Risk Assessment
RM Alhajri, SJ Alsunaidi, R Zagrouba, AM Almuhaideb, MA Alqahtani
2019 International Conference on Computer and Information Sciences (ICCIS), 1-6, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20