default search action
Muath AlShaikh
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, Qusai Ramadan:
Using Supervised Learning to Detect Command and Control Attacks in IoT. Int. J. Cloud Appl. Comput. 14(1): 1-19 (2024) - [j14]Mutasem K. Alsmadi, Rami Mustafa A. Mohammad, Malek Alzaqebah, Sana Jawarneh, Muath AlShaikh, Ahmad Al Smadi, Fahad A. Alghamdi, Jehad Saad Alqurni, Hayat Alfagham:
Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 73-93 (2024) - [j13]Mohammed Elhabib Kahla, Mounir Beggas, Abdelkader Laouid, Muath AlShaikh, Mohammad Hammoudeh:
An IoMT image crypto-system based on spatial watermarking and asymmetric encryption. Multim. Tools Appl. 83(39): 86681-86706 (2024) - [j12]Muath AlShaikh:
Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption. J. Signal Process. Syst. 96(6-7): 385-399 (2024) - [c13]Brahim Ferik, Laimeche Lakhdar, Abdallah Meraoumia, Abdelkader Laouid, Khaled Chait, Muath AlShaikh:
A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations. PAIS 2024: 1-8 - [i1]Qusai Ramadan, Zeyd Boukhers, Muath AlShaikh, Christoph Lange, Jan Jürjens:
Data Trading and Monetization: Challenges and Open Research Directions. CoRR abs/2401.09199 (2024) - 2023
- [j11]Muath AlShaikh:
A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis. Comput. J. 66(7): 1749-1760 (2023) - [j10]Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh:
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. J. Inf. Sci. Eng. 39(1): 183-195 (2023) - [j9]Muath AlShaikh, Malek Alzaqebah, Sana Jawarneh:
Robust watermarking based on modified Pigeon algorithm in DCT domain. Multim. Tools Appl. 82(2): 3033-3053 (2023) - [j8]Muath AlShaikh:
A novel tamper detection watermarking approach for improving image integrity. Multim. Tools Appl. 82(7): 10039-10060 (2023) - [j7]Ismail Kertiou, Abdelkader Laouid, Saber Benharzallah, Mohammad Hammoudeh, Muath AlShaikh:
A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments. PeerJ Comput. Sci. 9: e1682 (2023) - [c12]Qusai Ramadan, Zeyd Boukhers, Muath AlShaikh, Christoph Lange, Jan Jürjens:
Data Trading and Monetization: Challenges and Open Research Directions. ICFNDS 2023: 344-351 - [c11]Brahim Ferik, Laimeche Lakhdar, Abdallah Meraoumia, Abdelkader Laouid, Muath AlShaikh, Khaled Chait:
An Adaptive Image Watermarking based on Bellman-Ford Algorithm. ICFNDS 2023: 357-365 - 2022
- [j6]Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh, Muath AlShaikh, Ahcène Bounceur:
Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things. IEEE Trans. Ind. Informatics 18(11): 8336-8345 (2022) - 2021
- [c10]Sadok Hani, Pr Mohmmed Lakhdar Kiram, Abdelkader Laouid, Muath AlShaikh:
The impact of digital transformation on the work of the Algerian local administration during the Corona-Covid 19 Pandemic. AI-CSP 2021: 1-6 - [c9]Mohammed Elhabib Kahla, Mounir Beggas, Abdelkader Laouid, Mostefa Kara, Muath AlShaikh:
Asymmetric Image Encryption Based on Twin Message Fusion. AI-CSP 2021: 1-5 - [c8]Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Farid Lalem, Muath AlShaikh, Romaissa Kebache, Zaoui Sayah:
A Novel Delegated Proof of Work Consensus Protocol. AI-CSP 2021: 1-7 - [c7]Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh, Romaissa Kebache:
Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions. ICFNDS 2021: 64-69 - 2020
- [j5]Saci Medileh, Abdelkader Laouid, El Moatez Billah Nagoudi, Reinhardt Euler, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh, Amna Eleyan, Osama Ahmed Khashan:
A flexible encryption technique for the internet of things environment. Ad Hoc Networks 106: 102240 (2020) - [j4]Osama Ahmed Khashan, Muath AlShaikh:
Edge-based lightweight selective encryption scheme for digital medical images. Multim. Tools Appl. 79(35-36): 26369-26388 (2020)
2010 – 2019
- 2019
- [c6]Muath AlShaikh, Lamri Laouamer, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh:
Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm. ICFNDS 2019: 1:1-1:6 - [c5]Mohammed Amine Yagoub, Abdelkader Laouid, Ahcène Bounceur, Muath AlShaikh:
An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms. ICFNDS 2019: 21:1-21:7 - 2018
- [c4]Abdelkader Laouid, Muath AlShaikh, Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Madani Bezoui, Habib Aissaoua, Abdelkamel Tari:
A distributed security protocol designed for the context of internet of things. ICFNDS 2018: 26:1-26:5 - [c3]Mohammed Amine Yagoub, Abdelkader Laouid, Okba Kazar, Ahcène Bounceur, Reinhardt Euler, Muath AlShaikh:
An adaptive and efficient fully homomorphic encryption technique. ICFNDS 2018: 35:1-35:6 - 2017
- [j3]Muath AlShaikh, Lamri Laouamer, Laurent Nana, Anca Christine Pascu:
Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multim. Tools Appl. 76(6): 8937-8950 (2017) - 2016
- [j2]Lamri Laouamer, Muath AlShaikh, Laurent Nana, Anca Christine Pascu:
Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images. Int. J. Electron. Secur. Digit. Forensics 8(3): 262-284 (2016) - [c2]Farid Lalem, Muath AlShaikh, Ahcène Bounceur, Reinhardt Euler, Lamri Laouamer, Laurent Nana, Anca Pascu:
Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach. FLAIRS 2016: 282-287 - 2015
- [j1]Lamri Laouamer, Muath AlShaikh, Laurent Nana, Anca Christine Pascu:
Robust watermarking scheme and tamper detection based on threshold versus intensity. J. Innov. Digit. Ecosyst. 2(1-2): 1-12 (2015) - [c1]Muath AlShaikh, Lamri Laouamer, Laurent Nana, Anca Christine Pascu:
A novel robust informed watermarking approach and tamper detection based on weber differential excitation descriptor. ISPACS 2015: 194-198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint