Muath AlShaikhMuath AlShaikhWaleed AlsemaihSultan AlamriQusai RamadanUsing Supervised Learning to Detect Command and Control Attacks in IoT.1-19202414Int. J. Cloud Appl. Comput.1https://doi.org/10.4018/ijcac.334214db/journals/ijcac/ijcac14.html#AlShaikhAAR24Mutasem K. AlsmadiRami Mustafa A. MohammadMalek AlzaqebahSana JawarnehMuath AlShaikhAhmad Al SmadiFahad A. AlghamdiJehad Saad AlqurniHayat AlfaghamIntrusion Detection Using an Improved Cuckoo Search Optimization Algorithm.73-93202415J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.2https://doi.org/10.58346/jowua.2024.i2.006db/journals/jowua/jowua15.html#AlsmadiMAJASAAA24Mohammed Elhabib KahlaMounir BeggasAbdelkader LaouidMuath AlShaikhMohammad HammoudehAn IoMT image crypto-system based on spatial watermarking and asymmetric encryption.86681-867062024November83Multim. Tools Appl.39https://doi.org/10.1007/s11042-024-19632-8db/journals/mta/mta83.html#KahlaBLAH24streams/journals/mtaMuath AlShaikhRobust and Recovery Watermarking Approach Based on SVD and OTP Encryption.385-3992024July96J. Signal Process. Syst.6-7https://doi.org/10.1007/s11265-024-01919-6db/journals/vlsisp/vlsisp96.html#AlShaikh24Brahim FerikLaimeche LakhdarAbdallah MeraoumiaAbdelkader LaouidKhaled ChaitMuath AlShaikhA Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations.1-82024PAIShttps://doi.org/10.1109/PAIS62114.2024.10541138conf/pais/2024db/conf/pais/pais2024.html#FerikLMLCA24Qusai RamadanZeyd BoukhersMuath AlShaikhChristoph Lange 0002Jan JürjensData Trading and Monetization: Challenges and Open Research Directions.2024abs/2401.09199CoRRhttps://doi.org/10.48550/arXiv.2401.09199db/journals/corr/corr2401.html#abs-2401-09199Muath AlShaikhA Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis.1749-17602023July66Comput. J.7https://doi.org/10.1093/comjnl/bxac038db/journals/cj/cj66.html#AlShaikh23Mostefa KaraAbdelkader LaouidAhcène BounceurMohammad HammoudehMuath AlShaikhPerfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key.183-195202339J. Inf. Sci. Eng.1http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=191_2580db/journals/jise/jise39.html#KaraLBHA23Muath AlShaikhMalek AlzaqebahSana JawarnehRobust watermarking based on modified Pigeon algorithm in DCT domain.3033-3053202382Multim. Tools Appl.2https://doi.org/10.1007/s11042-022-13233-zdb/journals/mta/mta82.html#AlShaikhAJ23Muath AlShaikhA novel tamper detection watermarking approach for improving image integrity.10039-100602023March82Multim. Tools Appl.7https://doi.org/10.1007/s11042-021-11840-wdb/journals/mta/mta82.html#AlShaikh23Ismail KertiouAbdelkader LaouidSaber BenharzallahMohammad HammoudehMuath AlShaikhA P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments.e168220239PeerJ Comput. Sci.https://doi.org/10.7717/peerj-cs.1682db/journals/peerj-cs/peerj-cs9.html#KertiouLBHA23Qusai RamadanZeyd BoukhersMuath AlShaikhChristoph Lange 0002Jan JürjensData Trading and Monetization: Challenges and Open Research Directions.344-3512023ICFNDShttps://doi.org/10.1145/3644713.3644758conf/icfnds/2023db/conf/icfnds/icfnds2023.html#RamadanBA0J23Brahim FerikLaimeche LakhdarAbdallah MeraoumiaAbdelkader LaouidMuath AlShaikhKhaled ChaitAn Adaptive Image Watermarking based on Bellman-Ford Algorithm.357-3652023ICFNDShttps://doi.org/10.1145/3644713.3644762conf/icfnds/2023db/conf/icfnds/icfnds2023.html#FerikLMLAC23Mostefa KaraAbdelkader LaouidMohammad HammoudehMuath AlShaikhAhcène BounceurProof of Chance: A Lightweight Consensus Algorithm for the Internet of Things.8336-8345202218IEEE Trans. Ind. Informatics11https://doi.org/10.1109/TII.2022.3168747https://www.wikidata.org/entity/Q114628662db/journals/tii/tii18.html#KaraLHAB22Sadok HaniPr Mohmmed Lakhdar KiramAbdelkader LaouidMuath AlShaikhThe impact of digital transformation on the work of the Algerian local administration during the Corona-Covid 19 Pandemic.1-62021AI-CSPhttps://doi.org/10.1109/AI-CSP52968.2021.9671114conf/aicsp/2021db/conf/aicsp/aicsp2021.html#HaniKLA21Mohammed Elhabib KahlaMounir BeggasAbdelkader LaouidMostefa KaraMuath AlShaikhAsymmetric Image Encryption Based on Twin Message Fusion.1-52021AI-CSPhttps://doi.org/10.1109/AI-CSP52968.2021.9671161conf/aicsp/2021db/conf/aicsp/aicsp2021.html#KahlaBLKA21Mostefa KaraAbdelkader LaouidAhcène BounceurFarid LalemMuath AlShaikhRomaissa KebacheZaoui SayahA Novel Delegated Proof of Work Consensus Protocol.1-72021AI-CSPhttps://doi.org/10.1109/AI-CSP52968.2021.9671096conf/aicsp/2021db/conf/aicsp/aicsp2021.html#KaraLBLAKS21Mostefa KaraAbdelkader LaouidAhcène BounceurMohammad HammoudehMuath AlShaikhRomaissa KebacheSemi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions.64-692021ICFNDShttps://doi.org/10.1145/3508072.3508083conf/icfnds/2021db/conf/icfnds/icfnds2021.html#KaraLBHAK21Saci MedilehAbdelkader LaouidEl Moatez Billah NagoudiReinhardt EulerAhcène BounceurMohammad HammoudehMuath AlShaikhAmna EleyanOsama Ahmed KhashanA flexible encryption technique for the internet of things environment.1022402020106Ad Hoc Networkshttps://doi.org/10.1016/j.adhoc.2020.102240db/journals/adhoc/adhoc106.html#MedilehLNEBHAEK20Osama Ahmed KhashanMuath AlShaikhEdge-based lightweight selective encryption scheme for digital medical images.26369-26388202079Multim. Tools Appl.35-36https://doi.org/10.1007/s11042-020-09264-zhttps://www.wikidata.org/entity/Q123018091db/journals/mta/mta79.html#KhashanA20Muath AlShaikhLamri LaouamerAbdelkader LaouidAhcène BounceurMohammad HammoudehRobust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm.1:1-1:62019ICFNDShttps://doi.org/10.1145/3341325.3341991conf/icfnds/2019db/conf/icfnds/icfnds2019.html#AlShaikhLLBH19Mohammed Amine YagoubAbdelkader LaouidAhcène BounceurMuath AlShaikhAn Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms.21:1-21:72019ICFNDShttps://doi.org/10.1145/3341325.3342012conf/icfnds/2019db/conf/icfnds/icfnds2019.html#YagoubLBA19Abdelkader LaouidMuath AlShaikhFarid LalemAhcène BounceurReinhardt EulerMadani BezouiHabib AissaouaAbdelkamel TariA distributed security protocol designed for the context of internet of things.26:1-26:52018ICFNDShttps://doi.org/10.1145/3231053.3231079conf/icfnds/2018db/conf/icfnds/icfnds2018.html#LaouidALBEBAT18Mohammed Amine YagoubAbdelkader LaouidOkba KazarAhcène BounceurReinhardt EulerMuath AlShaikhAn adaptive and efficient fully homomorphic encryption technique.35:1-35:62018ICFNDShttps://doi.org/10.1145/3231053.3231088conf/icfnds/2018db/conf/icfnds/icfnds2018.html#YagoubLKBEA18Muath AlShaikhLamri LaouamerLaurent NanaAnca Christine PascuEfficient and robust encryption and watermarking technique based on a new chaotic map approach.8937-8950201776Multim. Tools Appl.6https://doi.org/10.1007/s11042-016-3499-7https://www.wikidata.org/entity/Q121781887db/journals/mta/mta76.html#AlShaikhLNP17Lamri LaouamerMuath AlShaikhLaurent NanaAnca Christine PascuGenerating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images.262-28420168Int. J. Electron. Secur. Digit. Forensics3https://doi.org/10.1504/IJESDF.2016.077451https://www.wikidata.org/entity/Q114965183db/journals/ijesdf/ijesdf8.html#LaouamerANP16Farid LalemMuath AlShaikhAhcène BounceurReinhardt EulerLamri LaouamerLaurent NanaAnca PascuData Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach.282-2872016FLAIRShttp://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS16/paper/view/12796conf/flairs/2016db/conf/flairs/flairs2016.html#LalemABELNP16Lamri LaouamerMuath AlShaikhLaurent NanaAnca Christine PascuRobust watermarking scheme and tamper detection based on threshold versus intensity.1-1220152J. Innov. Digit. Ecosyst.1-2https://doi.org/10.1016/j.jides.2015.10.001db/journals/jides/jides2.html#LaouamerANP15Muath AlShaikhLamri LaouamerLaurent NanaAnca Christine PascuA novel robust informed watermarking approach and tamper detection based on weber differential excitation descriptor.194-1982015ISPACShttps://doi.org/10.1109/ISPACS.2015.7432764conf/ispacs/2015db/conf/ispacs/ispacs2015.html#AlShaikhLNP15Habib AissaouaSultan AlamriHayat AlfaghamFahad A. AlghamdiJehad Saad AlqurniWaleed AlsemaihMutasem AlsmadiMutasem K. AlsmadiMalek AlzaqebahMounir BeggasSaber BenharzallahMadani BezouiZeyd BoukhersAhcène BounceurKhaled ChaitAmna EleyanReinhardt EulerBrahim FerikMohammad HammoudehSadok HaniSana JawarnehJan JürjensMohammed Elhabib KahlaMostefa KaraOkba KazarRomaissa KebacheIsmail KertiouOsama Ahmed KhashanPr Mohmmed Lakhdar KiramLaimeche LakhdarFarid LalemChristoph Lange 0002Lamri LaouamerAbdelkader LaouidSaci MedilehAbdallah MeraoumiaRami Mustafa A. MohammadEl Moatez Billah NagoudiLaurent NanaAnca PascuAnca Christine PascuQusai RamadanZaoui SayahAhmad Al SmadiAbdelkamel TariMohammed Amine Yagoub