default search action
Wajdi Alhakami
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Abdullah Ayub Khan, Sami Dhabi, Jing Yang, Wajdi Alhakami, Sami Bourouis, Lip Yee Por:
B-LPoET: A middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology. Comput. Electr. Eng. 118: 109343 (2024) - [c4]Sudha Anbalagan, Wajdi Alhakami, Mugundh Jambukeswaran Bhooma, Vijai Suria Marimuthu, Kapal Dev, Gunasekaran Raja:
Next-Gen Security: Enhanced DDoS Attack Detection for Autonomous Vehicles in 6G Networks. VTC Spring 2024: 1-5 - 2023
- [j26]Poongodi Manoharan, Ranjan Walia, Celestine Iwendi, Tariq Ahamed Ahanger, S. T. Suganthi, M. M. Kamruzzaman, Sami Bourouis, Wajdi Alhakami, Mounir Hamdi:
SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j25]Bashayer Othman Aloufi, Wajdi Alhakami:
A Lightweight Authentication MAC Protocol for CR-WSNs. Sensors 23(4): 2015 (2023) - [j24]Muhammad Asghar Khan, Hosam Alhakami, Wajdi Alhakami, Alexey V. Shvetsov, Insaf Ullah:
A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System. Sensors 23(12): 5419 (2023) - [j23]Mawloud Omar, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami:
Reliable and Secure X2V Energy Trading Framework for Highly Dynamic Connected Electric Vehicles. IEEE Trans. Veh. Technol. 72(7): 8526-8540 (2023) - [c3]Sudha Anbalagan, Wajdi Alhakami, Abhishek Manoharan, Sai Ganesh Senthivel, Anushka Nehra, Hosam Alhakami, Gunasekaran Raja:
TVUB: Thermal Vision-based UAV and Blockchain-aided Poaching Prevention System. GLOBECOM 2023: 1296-1301 - 2022
- [j22]Wajdi Alhakami, Hala S. El-sayed, Osama S. Faragallah, Mohamed G. El-Mashed:
Efficient Security Architecture for Physical Layer in mmWave Communication Systems. IEEE Access 10: 113923-113934 (2022) - [j21]Manjari Singh Rathore, M. Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor, Mounir Hamdi:
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography. Comput. Electr. Eng. 102: 108205 (2022) - [j20]Manjari Singh Rathore, M. Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor, Mounir Hamdi:
Corrigendum to "A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography" CAEE, Volume 102, September 2022, 108205. Comput. Electr. Eng. 103: 108387 (2022) - [j19]M. Poongodi, Sami Bourouis, Ahmed Najat Ahmed, Vijayaragavan M., Venkatesan K. G. S., Wajdi Alhakami, Mounir Hamdi:
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework. Comput. Commun. 192: 48-56 (2022) - [j18]Bayan Al-Amri, Gofran Sami, Wajdi Alhakami:
An Effective Secure MAC Protocol for Cognitive Radio Networks. Comput. Syst. Sci. Eng. 42(1): 133-148 (2022) - [j17]Hosam Alhakami, Abdullah Baz, Wajdi Alhakami, Abhishek Kumar Pandey, Alka Agrawal, Raees Ahmad Khan:
A Usability Management Framework for Securing Healthcare Information System. Comput. Syst. Sci. Eng. 42(3): 1015-1030 (2022) - [j16]Hosam Alhakami, Naveed Ahmad Khan, Muhammad Sulaiman, Wajdi Alhakami, Abdullah Baz:
On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach. Entropy 24(9): 1280 (2022) - [j15]Hosam Alhakami, Muhammad Umar, Muhammad Sulaiman, Wajdi Alhakami, Abdullah Baz:
A Numerical Study of the Dynamics of Vector-Born Viral Plant Disorders Using a Hybrid Artificial Neural Network Approach. Entropy 24(11): 1511 (2022) - [j14]Xiaowei Wang, Shoulin Yin, Muhammad Shafiq, Asif Ali Laghari, Shahid Karim, Omar Cheikhrouhou, Wajdi Alhakami, Habib Hamam:
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption. Secur. Commun. Networks 2022: 4260804:1-4260804:14 (2022) - [j13]Ghada Sultan Aljumaie, Wajdi Alhakami:
A Secure LEACH-PRO Protocol Based on Blockchain. Sensors 22(21): 8431 (2022) - [j12]Hosam Alhakami, Mustafa Kamal, Muhammad Sulaiman, Wajdi Alhakami, Abdullah Baz:
A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems. Symmetry 14(10): 2023 (2022) - 2021
- [j11]Hamza Turabieh, Sana Al Azwari, Mahmoud Rokaya, Wael Alosaimi, Abdullah Alharbi, Wajdi Alhakami, Mrim Alnfiai:
Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance. Computing 103(7): 1417-1438 (2021) - [j10]Wajdi Alhakami, Ahmed Binmahfoudh, Abdullah Baz, Hosam Alhakami, Md Tarique Jamal Ansari, Raees Ahmad Khan:
Atrocious Impinging of COVID-19 Pandemic on Software Development Industries. Comput. Syst. Sci. Eng. 36(2): 323-338 (2021) - [c2]Omar Sami Oubbati, Mohammed Atiquzzaman, Abderrahmane Lakas, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami:
Multi-UAV-enabled AoI-aware WPCN: A Multi-agent Reinforcement Learning Strategy. INFOCOM Workshops 2021: 1-6 - 2020
- [j9]Rajeev Kumar, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami, Mohammed Baz, Alka Agrawal, Raees Ahmad Khan:
A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software. IEEE Access 8: 72694-72712 (2020) - [j8]Mazin Abed Mohammed, Karrar Hameed Abdulkareem, Alaa S. Al-Waisy, Salama A. Mostafa, Shumoos Al-Fahdawi, Ahmed Musa Dinar, Wajdi Alhakami, Abdullah Baz, Mohammed Nasser Al-Mhiqani, Hosam Alhakami, Nureize Arbaiy, Mashael S. Maashi, Ammar Awad Mutlag, Begoña García Zapirain, Isabel de la Torre Díez:
Benchmarking Methodology for Selection of Optimal COVID-19 Diagnostic Model Based on Entropy and TOPSIS Methods. IEEE Access 8: 99115-99131 (2020) - [j7]Musheer Ahmad, Ishfaq Ahmad Khaja, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami:
Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications. IEEE Access 8: 116132-116147 (2020) - [j6]Alka Agrawal, Abhishek Kumar Pandey, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami, Rajeev Kumar, Raees Ahmad Khan:
Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis. IEEE Access 8: 135770-135783 (2020) - [j5]Alka Agrawal, Adil Hussain Seh, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami, Mohammed Baz, Rajeev Kumar, Raees Ahmad Khan:
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective. Symmetry 12(4): 598 (2020) - [j4]Rajeev Kumar, Abhishek Kumar Pandey, Abdullah Baz, Hosam Alhakami, Wajdi Alhakami, Alka Agrawal, Raees Ahmad Khan:
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security. Symmetry 12(4): 664 (2020) - [j3]Farooq Sijal Shawqi, Lukman Audah, Salama A. Mostafa, Saraswathy Shamini Gunasekaran, Abdullah Baz, Ahmed Talaat Hammoodi, Hosam Alhakami, Mustafa Hamid Hassan, Mohammed Ahmed Jubair, Wajdi Alhakami:
A New SLM-UFMC Model for Universal Filtered Multi-Carrier to Reduce Cubic Metric and Peak to Average Power Ratio in 5G Technology. Symmetry 12(6): 909 (2020) - [j2]Wajdi Alhakami, Abdullah Baz, Hosam Alhakami, Abhishek Kumar Pandey, Raees Ahmad Khan:
Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective. Symmetry 12(12): 2089 (2020)
2010 – 2019
- 2019
- [j1]Wajdi Alhakami, Abdullah Alharbi, Sami Bourouis, Roobaea Alroobaea, Nizar Bouguila:
Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection. IEEE Access 7: 52181-52190 (2019) - 2014
- [c1]Wajdi Alhakami, Ali Mansour, Ghazanfar Ali Safdar:
Shared-Key Based Secure MAC Protocol for CRNs. NGMAST 2014: 266-271
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint