default search action
Ala Abdulsalam Alarood
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Ala Abdulsalam Alarood, Ahmed Omar Alzahrani:
Interoperable Defensive Strategies of Network Security Evaluation. IEEE Access 12: 33959-33971 (2024) - [j16]Mahmoud Ahmad Al-Khasawneh, Muhammad Faheem, Ala Abdulsalam Alarood, Safa Habibullah, Eesa A. Alsolami:
Toward Multi-Modal Approach for Identification and Detection of Cyberbullying in Social Networks. IEEE Access 12: 90158-90170 (2024) - 2023
- [j15]Mahmoud Ahmad Al-Khasawneh, Muhammad Faheem, Eman Aldhahri, Abdulrahman Alzahrani, Ala Abdulsalam Alarood:
A MapReduce Based Approach for Secure Batch Satellite Image Encryption. IEEE Access 11: 62865-62878 (2023) - [j14]Samina Amin, Muhammad Irfan Uddin, Ala Abdulsalam Alarood, Wali Khan Mashwani, Abdulrahman Alzahrani, Ahmed Omar Alzahrani:
Smart E-Learning Framework for Personalized Adaptive Learning and Sequential Path Recommendations Using Reinforcement Learning. IEEE Access 11: 89769-89790 (2023) - [j13]Ala Abdulsalam Alarood, Adamu Abubakar Ibrahim, Faisal Alsubaei:
Attacks Notification of Differentiated Services Code Point (DSCP) Values Modifications. IEEE Access 11: 126950-126966 (2023) - [j12]Samina Amin, Muhammad Irfan Uddin, Wali Khan Mashwani, Ala Abdulsalam Alarood, Abdulrahman Alzahrani, Ahmed Omar Alzahrani:
Developing a Personalized E-Learning and MOOC Recommender System in IoT-Enabled Smart Education. IEEE Access 11: 136437-136455 (2023) - 2022
- [j11]Ala Abdulsalam Alarood, Nedal K. Al-Ababneh, Mahmoud Ahmad Al-Khasawneh, Majdi Rawashdeh, Mohammad Al-Omari:
IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography. Clust. Comput. 25(3): 1607-1618 (2022) - [j10]Muhammad Irfan Uddin, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, Ala Abdulsalam Alarood, Eesa Alsolami:
Optimal policy learning for COVID-19 prevention using reinforcement learning. J. Inf. Sci. 48(3): 336-348 (2022) - 2021
- [j9]Mehrbakhsh Nilashi, Sarminah Samad, Ali Ahani, Hossein Ahmadi, Eesa Alsolami, Marwan Mahmoud, Hamsa D. Majeed, Ala Abdulsalam Alarood:
Travellers decision making through preferences learning: A case on Malaysian spa hotels in TripAdvisor. Comput. Ind. Eng. 158: 107348 (2021) - [j8]Rinki Rani, Sushil Kumar, Omprakash Kaiwartya, Ahmad M. Khasawneh, Jaime Lloret, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud, Ala Abdulsalam Alarood:
Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. Sensors 21(5): 1883 (2021) - 2020
- [j7]Douma Bouthiba Farouq, Ala Abdulsalam Alarood, Nahla Aljojo, Adamu I. Abubakar:
Unidirectional and Bidirectional Optimistic Modes IP Header Compression for Real-Time Video Streaming. IEEE Access 8: 83155-83166 (2020) - [j6]Samina Amin, Muhammad Irfan Uddin, M. Ali Zeb, Ala Abdulsalam Alarood, Marwan Mahmoud, Monagi H. Alkinani:
Detecting Dengue/Flu Infections Based on Tweets Using LSTM and Word Embedding. IEEE Access 8: 189054-189068 (2020) - [j5]Mehrbakhsh Nilashi, Hossein Ahmadi, Abbas Sheikhtaheri, Roya Naemi, Reem Alotaibi, Ala Abdulsalam Alarood, Asmaa Munshi, Tarik A. Rashid, Jing Zhao:
Remote tracking of Parkinson's Disease progression using ensembles of Deep Belief Network and Self-Organizing Map. Expert Syst. Appl. 159: 113562 (2020) - [j4]Ahmed Mohammed Alghamdi, Fathy Elbouraey Eassa, Maher Ali Khamakhem, Abdullah Saad Al-Malaise Al-Ghamdi, Ahmed S. Alfakeeh, Abdullah S. Alshahrani, Ala Abdulsalam Alarood:
Parallel Hybrid Testing Techniques for the Dual-Programming Models-Based Programs. Symmetry 12(9): 1555 (2020) - [c1]Tanya Koohpayeh Araghi, Ala Abdulsalam Alarood, Sagheb Kohpayeh Araghi:
Analysis and Evaluation of Template Based Methods Against Geometric Attacks: A Survey. IRICT 2020: 807-814
2010 – 2019
- 2019
- [j3]Haruna Chiroma, Usman Ali Abdullahi, Shafii Muhammad Abdulhamid, Ala Abdulsalam Alarood, Lubna Abdel Kareim Gabralla, Nadim Rana, Liyana Shuib, Ibrahim Abaker Targio Hashem, Dada Emmanuel Gbenga, Adamu I. Abubakar, Akram M. Zeki, Tutut Herawan:
Progress on Artificial Neural Networks for Big Data Analytics: A Survey. IEEE Access 7: 70535-70551 (2019) - [j2]Tahir Musa Ibrahim, Shafii Muhammad Abdulhamid, Ala Abdulsalam Alarood, Haruna Chiroma, Mohammed Ali Al-garadi, Nadim Rana, Amina Nuhu Muhammad, Adamu I. Abubakar, Khalid Haruna, Lubna Abdel Kareim Gabralla:
Recent advances in mobile touch screen security authentication methods: A systematic literature review. Comput. Secur. 85: 1-24 (2019) - 2018
- [j1]Tanya Koohpayeh Araghi, Azizah Abd Manaf, Ala Abdulsalam Alarood, Azida Binti Zainol:
Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes. Adv. Multim. 2018: 1609378:1-1609378:9 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint