iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/177/5094.xml
Muath AlShaikh
Muath AlShaikh Waleed Alsemaih Sultan Alamri Qusai Ramadan Using Supervised Learning to Detect Command and Control Attacks in IoT. 1-19 2024 14 Int. J. Cloud Appl. Comput. 1 https://doi.org/10.4018/ijcac.334214 db/journals/ijcac/ijcac14.html#AlShaikhAAR24
Mutasem K. Alsmadi Rami Mustafa A. Mohammad Malek Alzaqebah Sana Jawarneh Muath AlShaikh Ahmad Al Smadi Fahad A. Alghamdi Jehad Saad Alqurni Hayat Alfagham Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm. 73-93 2024 15 J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 https://doi.org/10.58346/jowua.2024.i2.006 db/journals/jowua/jowua15.html#AlsmadiMAJASAAA24
Mohammed Elhabib Kahla Mounir Beggas Abdelkader Laouid Muath AlShaikh Mohammad Hammoudeh An IoMT image crypto-system based on spatial watermarking and asymmetric encryption. 86681-86706 2024 November 83 Multim. Tools Appl. 39 https://doi.org/10.1007/s11042-024-19632-8 db/journals/mta/mta83.html#KahlaBLAH24 streams/journals/mta
Muath AlShaikh Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption. 385-399 2024 July 96 J. Signal Process. Syst. 6-7 https://doi.org/10.1007/s11265-024-01919-6 db/journals/vlsisp/vlsisp96.html#AlShaikh24
Brahim Ferik Laimeche Lakhdar Abdallah Meraoumia Abdelkader Laouid Khaled Chait Muath AlShaikh A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations. 1-8 2024 PAIS https://doi.org/10.1109/PAIS62114.2024.10541138 conf/pais/2024 db/conf/pais/pais2024.html#FerikLMLCA24
Qusai Ramadan Zeyd Boukhers Muath AlShaikh Christoph Lange 0002 Jan Jürjens Data Trading and Monetization: Challenges and Open Research Directions. 2024 abs/2401.09199 CoRR https://doi.org/10.48550/arXiv.2401.09199 db/journals/corr/corr2401.html#abs-2401-09199
Muath AlShaikh A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis. 1749-1760 2023 July 66 Comput. J. 7 https://doi.org/10.1093/comjnl/bxac038 db/journals/cj/cj66.html#AlShaikh23
Mostefa Kara Abdelkader Laouid Ahcène Bounceur Mohammad Hammoudeh Muath AlShaikh Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. 183-195 2023 39 J. Inf. Sci. Eng. 1 http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=191_2580 db/journals/jise/jise39.html#KaraLBHA23
Muath AlShaikh Malek Alzaqebah Sana Jawarneh Robust watermarking based on modified Pigeon algorithm in DCT domain. 3033-3053 2023 82 Multim. Tools Appl. 2 https://doi.org/10.1007/s11042-022-13233-z db/journals/mta/mta82.html#AlShaikhAJ23
Muath AlShaikh A novel tamper detection watermarking approach for improving image integrity. 10039-10060 2023 March 82 Multim. Tools Appl. 7 https://doi.org/10.1007/s11042-021-11840-w db/journals/mta/mta82.html#AlShaikh23
Ismail Kertiou Abdelkader Laouid Saber Benharzallah Mohammad Hammoudeh Muath AlShaikh A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments. e1682 2023 9 PeerJ Comput. Sci. https://doi.org/10.7717/peerj-cs.1682 db/journals/peerj-cs/peerj-cs9.html#KertiouLBHA23
Qusai Ramadan Zeyd Boukhers Muath AlShaikh Christoph Lange 0002 Jan Jürjens Data Trading and Monetization: Challenges and Open Research Directions. 344-351 2023 ICFNDS https://doi.org/10.1145/3644713.3644758 conf/icfnds/2023 db/conf/icfnds/icfnds2023.html#RamadanBA0J23 Brahim Ferik Laimeche Lakhdar Abdallah Meraoumia Abdelkader Laouid Muath AlShaikh Khaled Chait An Adaptive Image Watermarking based on Bellman-Ford Algorithm. 357-365 2023 ICFNDS https://doi.org/10.1145/3644713.3644762 conf/icfnds/2023 db/conf/icfnds/icfnds2023.html#FerikLMLAC23
Mostefa Kara Abdelkader Laouid Mohammad Hammoudeh Muath AlShaikh Ahcène Bounceur Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things. 8336-8345 2022 18 IEEE Trans. Ind. Informatics 11 https://doi.org/10.1109/TII.2022.3168747 https://www.wikidata.org/entity/Q114628662 db/journals/tii/tii18.html#KaraLHAB22
Sadok Hani Pr Mohmmed Lakhdar Kiram Abdelkader Laouid Muath AlShaikh The impact of digital transformation on the work of the Algerian local administration during the Corona-Covid 19 Pandemic. 1-6 2021 AI-CSP https://doi.org/10.1109/AI-CSP52968.2021.9671114 conf/aicsp/2021 db/conf/aicsp/aicsp2021.html#HaniKLA21 Mohammed Elhabib Kahla Mounir Beggas Abdelkader Laouid Mostefa Kara Muath AlShaikh Asymmetric Image Encryption Based on Twin Message Fusion. 1-5 2021 AI-CSP https://doi.org/10.1109/AI-CSP52968.2021.9671161 conf/aicsp/2021 db/conf/aicsp/aicsp2021.html#KahlaBLKA21 Mostefa Kara Abdelkader Laouid Ahcène Bounceur Farid Lalem Muath AlShaikh Romaissa Kebache Zaoui Sayah A Novel Delegated Proof of Work Consensus Protocol. 1-7 2021 AI-CSP https://doi.org/10.1109/AI-CSP52968.2021.9671096 conf/aicsp/2021 db/conf/aicsp/aicsp2021.html#KaraLBLAKS21 Mostefa Kara Abdelkader Laouid Ahcène Bounceur Mohammad Hammoudeh Muath AlShaikh Romaissa Kebache Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions. 64-69 2021 ICFNDS https://doi.org/10.1145/3508072.3508083 conf/icfnds/2021 db/conf/icfnds/icfnds2021.html#KaraLBHAK21
Saci Medileh Abdelkader Laouid El Moatez Billah Nagoudi Reinhardt Euler Ahcène Bounceur Mohammad Hammoudeh Muath AlShaikh Amna Eleyan Osama Ahmed Khashan A flexible encryption technique for the internet of things environment. 102240 2020 106 Ad Hoc Networks https://doi.org/10.1016/j.adhoc.2020.102240 db/journals/adhoc/adhoc106.html#MedilehLNEBHAEK20
Osama Ahmed Khashan Muath AlShaikh Edge-based lightweight selective encryption scheme for digital medical images. 26369-26388 2020 79 Multim. Tools Appl. 35-36 https://doi.org/10.1007/s11042-020-09264-z https://www.wikidata.org/entity/Q123018091 db/journals/mta/mta79.html#KhashanA20
Muath AlShaikh Lamri Laouamer Abdelkader Laouid Ahcène Bounceur Mohammad Hammoudeh Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm. 1:1-1:6 2019 ICFNDS https://doi.org/10.1145/3341325.3341991 conf/icfnds/2019 db/conf/icfnds/icfnds2019.html#AlShaikhLLBH19 Mohammed Amine Yagoub Abdelkader Laouid Ahcène Bounceur Muath AlShaikh An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms. 21:1-21:7 2019 ICFNDS https://doi.org/10.1145/3341325.3342012 conf/icfnds/2019 db/conf/icfnds/icfnds2019.html#YagoubLBA19 Abdelkader Laouid Muath AlShaikh Farid Lalem Ahcène Bounceur Reinhardt Euler Madani Bezoui Habib Aissaoua Abdelkamel Tari A distributed security protocol designed for the context of internet of things. 26:1-26:5 2018 ICFNDS https://doi.org/10.1145/3231053.3231079 conf/icfnds/2018 db/conf/icfnds/icfnds2018.html#LaouidALBEBAT18 Mohammed Amine Yagoub Abdelkader Laouid Okba Kazar Ahcène Bounceur Reinhardt Euler Muath AlShaikh An adaptive and efficient fully homomorphic encryption technique. 35:1-35:6 2018 ICFNDS https://doi.org/10.1145/3231053.3231088 conf/icfnds/2018 db/conf/icfnds/icfnds2018.html#YagoubLKBEA18
Muath AlShaikh Lamri Laouamer Laurent Nana Anca Christine Pascu Efficient and robust encryption and watermarking technique based on a new chaotic map approach. 8937-8950 2017 76 Multim. Tools Appl. 6 https://doi.org/10.1007/s11042-016-3499-7 https://www.wikidata.org/entity/Q121781887 db/journals/mta/mta76.html#AlShaikhLNP17
Lamri Laouamer Muath AlShaikh Laurent Nana Anca Christine Pascu Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images. 262-284 2016 8 Int. J. Electron. Secur. Digit. Forensics 3 https://doi.org/10.1504/IJESDF.2016.077451 https://www.wikidata.org/entity/Q114965183 db/journals/ijesdf/ijesdf8.html#LaouamerANP16
Farid Lalem Muath AlShaikh Ahcène Bounceur Reinhardt Euler Lamri Laouamer Laurent Nana Anca Pascu Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach. 282-287 2016 FLAIRS http://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS16/paper/view/12796 conf/flairs/2016 db/conf/flairs/flairs2016.html#LalemABELNP16
Lamri Laouamer Muath AlShaikh Laurent Nana Anca Christine Pascu Robust watermarking scheme and tamper detection based on threshold versus intensity. 1-12 2015 2 J. Innov. Digit. Ecosyst. 1-2 https://doi.org/10.1016/j.jides.2015.10.001 db/journals/jides/jides2.html#LaouamerANP15
Muath AlShaikh Lamri Laouamer Laurent Nana Anca Christine Pascu A novel robust informed watermarking approach and tamper detection based on weber differential excitation descriptor. 194-198 2015 ISPACS https://doi.org/10.1109/ISPACS.2015.7432764 conf/ispacs/2015 db/conf/ispacs/ispacs2015.html#AlShaikhLNP15 Habib Aissaoua Sultan Alamri Hayat Alfagham Fahad A. Alghamdi Jehad Saad Alqurni Waleed Alsemaih Mutasem AlsmadiMutasem K. Alsmadi Malek Alzaqebah Mounir Beggas Saber Benharzallah Madani Bezoui Zeyd Boukhers Ahcène Bounceur Khaled Chait Amna Eleyan Reinhardt Euler Brahim Ferik Mohammad Hammoudeh Sadok Hani Sana Jawarneh Jan Jürjens Mohammed Elhabib Kahla Mostefa Kara Okba Kazar Romaissa Kebache Ismail Kertiou Osama Ahmed Khashan Pr Mohmmed Lakhdar Kiram Laimeche Lakhdar Farid Lalem Christoph Lange 0002 Lamri Laouamer Abdelkader Laouid Saci Medileh Abdallah Meraoumia Rami Mustafa A. Mohammad El Moatez Billah Nagoudi Laurent Nana Anca PascuAnca Christine Pascu Qusai Ramadan Zaoui Sayah Ahmad Al Smadi Abdelkamel Tari Mohammed Amine Yagoub