Follow
Shereen Ismail
Title
Cited by
Cited by
Year
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks
KA Darabkh, SS Ismail, M Al-Shurman, IF Jafar, E Alkhader, ...
Journal of Network and Computer Applications 35 (6), 2068-2080, 2012
922012
Dynamic selection techniques for detecting GPS spoofing attacks on UAVs
T Talaei Khoei, S Ismail, N Kaabouch
Sensors 22 (2), 662, 2022
482022
Static clustering for target tracking in wireless sensor networks
SS Ismail, AI Al Khader, KA Darabkh
Global Journal on Technology (Selected Paper of COMENG-2014) 8, 167-173, 2015
292015
A comparative study of machine learning models for cyber-attacks detection in wireless sensor networks
S Ismail, TT Khoei, R Marsh, N Kaabouch
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021
242021
Evaluation of naïve bayesian algorithms for cyber-attacks detection in wireless sensor networks
S Ismail, H Reza
2022 IEEE World AI IoT Congress (AIIoT), 283-289, 2022
212022
IoT-based water management systems: survey and future research direction
S Ismail, DW Dawoud, N Ismail, R Marsh, AS Alshami
IEEE Access 10, 35942-35952, 2022
212022
A lightweight multilayer machine learning detection system for cyber-attacks in WSN
S Ismail, D Dawoud, H Reza
2022 IEEE 12th annual computing and communication workshop and conference …, 2022
162022
Boosting-based models with tree-structured parzen estimator optimization to detect intrusion attacks on smart grid
TT Khoei, S Ismail, N Kaabouch
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021
162021
Prison Perimeter Surveillance System Using WSN
AA Shereen S. Ismail, Eman Alkhader
Journal of Computer Science 13 (11), 674-679, 2017
152017
Object Tracking in Wireless Sensor Networks: Challenges and Solutions.
SS Ismail, E Alkhader, S Elnaffar
J. Comput. Sci. 12 (4), 201-212, 2016
152016
Securing wireless sensor networks using machine learning and blockchain: A review
S Ismail, DW Dawoud, H Reza
Future Internet 15 (6), 200, 2023
132023
Toward an intelligent blockchain ioT-enabled fish supply chain: A review and conceptual framework
S Ismail, H Reza, K Salameh, H Kashani Zadeh, F Vasefi
Sensors 23 (11), 5136, 2023
132023
User selective encryption method for securing MANETs
A Ahmad, S Ismail
International Journal of Electrical and Computer Engineering (IJECE) 8 (5 …, 2018
132018
Security vulnerabilities related to web-based data
M Awad, M Ali, M Takruri, S Ismail
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (2), 852-856, 2019
122019
Towards a lightweight identity management and secure authentication for IoT using blockchain
S Ismail, D Dawoud, H Reza
2022 IEEE World AI IoT Congress (AIIoT), 077-083, 2022
112022
An ensemble-based machine learning approach for cyber-attacks detection in wireless sensor networks
S Ismail, Z El Mrabet, H Reza
Applied Sciences 13 (1), 30, 2022
92022
Vehicle safety distance alarming system
HA Attia, S Ismail, HY Ali
2016 5th International Conference on Electronic Devices, Systems and …, 2016
92016
Toward management of uncertainty in self-adaptive software systems: IoT case study
S Ismail, K Shah, H Reza, R Marsh, E Grant
Computers 10 (3), 27, 2021
82021
Performance optimization of fractional frequency reuse in long term evolution (LTE) systems using cuckoo search algorithm
ES Abushabab, M Khodier, SS Ismail
2016 5th International Conference on Electronic Devices, Systems and …, 2016
82016
Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles
T Talaei Khoei, S Ismail, KA Shamaileh, VK Devabhaktuni, N Kaabouch
Applied Sciences 13 (1), 383, 2022
72022
The system can't perform the operation now. Try again later.
Articles 1–20