default search action
Seyed M. Buhari
Person information
- affiliation: King Abdulaziz University
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Abrar Omar Alkhamisi, Iyad A. Katib, Seyed M. Buhari:
Federated Learning-Based Security Attack Detection for Multi-Controller Software-Defined Networks. Algorithms 17(7): 290 (2024) - 2023
- [c18]Seyed M. Buhari, Jyothi Manoj:
Solving University Course Scheduling with Varied Constraints Using Integer Linear Programming. CISIS 2023: 80-91 - [c17]Abrar Omar Alkhamisi, Iyad A. Katib, Seyed M. Buhari:
Blockchain -Assisted Hybrid Deep Learning-Based Secure Mechanism for Software Defined Networks. ICCE 2023: 1-8 - 2022
- [j19]Georgios Tsaramirsis, Antreas Kantaros, Izzat Aldarraji, Dimitrios D. Piromalis, Charalampos Apostolopoulos, Athanasia Pavlopoulou, Muath Alrammal, Zamhar Ismail, Seyed M. Buhari, Milos Stojmenovic, Hatem Tamimi, Princy Randhawa, Akshet Patel, Fazal Qudus Khan:
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management. J. Sensors 2022: 1-18 (2022) - [j18]Nusaybah Alghanmi, Reem Alotaibi, Seyed M. Buhari:
Machine Learning Approaches for Anomaly Detection in IoT: An Overview and Future Research Directions. Wirel. Pers. Commun. 122(3): 2309-2324 (2022) - 2021
- [i2]Rayed Alghamdi A. AlGhamdi, Seyed M. Buhari, Madini O. Alassafi:
From Teaching to Coaching: A Case Study of a Technical Communication Course. CoRR abs/2107.09533 (2021) - 2020
- [j17]Abrar Omar Alkhamisi, Seyed M. Buhari, Georgios Tsaramirsis, Mohammed Basheri:
An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET. Int. J. Grid Util. Comput. 11(2): 169-184 (2020) - [j16]Areej Alzaidi, Suhair Alshehri, Seyed M. Buhari:
DroidRista: a highly precise static data flow analysis framework for android applications. Int. J. Inf. Sec. 19(5): 523-536 (2020) - [j15]Mohammed Almshari, Georgios Tsaramirsis, Adil Omar Khadidos, Seyed Mohammed Buhari, Fazal Qudus Khan, Alaa Khadidos:
Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data. Sensors 20(18): 5075 (2020)
2010 – 2019
- 2019
- [j14]Nusaybah Alghanmi, Reem Alotaibi, Seyed M. Buhari:
HLMCC: A Hybrid Learning Anomaly Detection Model for Unlabeled Data in Internet of Things. IEEE Access 7: 179492-179504 (2019) - [j13]Georgios Tsaramirsis, Seyed M. Buhari, Mohammed Basheri, Milos Stojmenovic:
Navigating Virtual Environments Using Leg Poses and Smartphone Sensors. Sensors 19(2): 299 (2019) - [j12]Milos Stojmenovic, Tom Gedeon, Heng Qi, Seyed M. Buhari:
Health Informatics: Applications of Mobile and Wireless Technologies. Wirel. Commun. Mob. Comput. 2019: 6518784:1 (2019) - [c16]Nusaybah Alghanmi, Reem Alotaibi, Seyed M. Buhari:
TCMD: A Two-Tier Classification Model for Anomaly-Based Detection in IoT. SDS 2019: 130-135 - [i1]Adel A. Bahaddad, Rayed AlGhamdi, Seyed M. Buhari, Madini O. Alassafi, Ahmad Alzahrani:
A Conceptual Framework for Successful E-commerce Smartphone Applications: The Context of GCC. CoRR abs/1908.06350 (2019) - 2017
- [j11]Morched Derbali, Seyed M. Buhari, Georgios Tsaramirsis, Milos Stojmenovic, Houssem Jerbi, Mohamed Naceur Abdelkrim, Mohammad H. Al-Beirutty:
Water Desalination Fault Detection Using Machine Learning Approaches: A Comparative Study. IEEE Access 5: 23266-23275 (2017) - [j10]Absalom E. Ezugwu, Marc Frîncu, Aderemi Oluyinka Adewumi, Seyed M. Buhari, Sahalu B. Junaidu:
Neural network-based multi-agent approach for scheduling in distributed systems. Concurr. Comput. Pract. Exp. 29(1) (2017) - [j9]Absalom E. Ezugwu, Nneoma A. Okoroafor, Seyed M. Buhari, Marc Eduard Frîncu, Sahalu B. Junaidu:
Grid Resource Allocation with Genetic Algorithm Using Population Based on Multisets. J. Intell. Syst. 26(1): 169-184 (2017) - 2016
- [j8]Absalom E. Ezugwu, Sahalu B. Junaidu, Marc E. Frîncu, Seyed M. Buhari, Afolayan Ayodele Obiniyi:
Scheduling multi-component applications with mobile agents in heterogeneous distributed systems. Concurr. Comput. Pract. Exp. 28(5): 1462-1479 (2016) - [c15]Abrar Omar Alkhamisi, Seyed M. Buhari:
Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANET. AINA 2016: 212-219 - [c14]Eman T. Alharbi, Saim Rasheed, Seyed M. Buhari:
Feature selection algorithm for evoked EEG signal due to RGB colors. CISP-BMEI 2016: 1503-1520 - [c13]Alaa Ahmed Almarzuqi, Seyed Mohammed Buhari:
Enhance Robotics ability in Hand Gesture Recognition by Using Leap Motion Controller. BWCCA 2016: 513-523 - [c12]Abrar Omar Alkhamisi, Mohd Saleem Haja Nazmudeen, Seyed M. Buhari:
A cross-layer framework for sensor data aggregation for IoT applications in smart cities. ISC2 2016: 1-6 - [c11]Mohd Saleem Haja Nazmudeen, Au Thien Wan, Seyed M. Buhari:
Improved throughput for Power Line Communication (PLC) for smart meters using fog computing based data aggregation approach. ISC2 2016: 1-4 - 2015
- [j7]Ezugwu E. Absalom, Seyed M. Buhari, Sahalu B. Junaidu:
Resource management system for scientific virtual laboratory applications. Int. J. Grid Util. Comput. 6(1): 8-20 (2015) - [j6]Ezugwu E. Absalom, Marc E. Frîncu, Afolayan Ayodele Obiniyi, Seyed M. Buhari, Sahalu B. Junaidu:
Multiagent-based approach for scheduling meta-applications in heterogeneous grid environments. Multiagent Grid Syst. 11(2): 59-79 (2015) - [c10]Absalom E. Ezugwu, Daniel I. Yakmut, Paschal A. Ochang, Seyed M. Buhari, Marc E. Frîncu, Sahalu B. Junaidu:
Multiset Genetic Algorithm Approach to Grid Resource Allocation. IBICA 2015: 1-13 - [c9]Hadi Alizadeh, Didem Gözüpek, Seyed M. Buhari, Aysegül Yayimli:
Minimizing signaling cost in green routing for software defined networks. ISCC 2015: 391-396 - 2014
- [c8]Mohd Saleem Nazmudeen, Seyed Mohammed Buhari:
A Survey on Distributed Service Discovery Mechanisms with the Focus on Topology Awareness. INNS-CIIS 2014: 315-326 - [c7]Haja Mohd Saleem, Mohd Fadzil Hassan, Seyed M. Buhari:
Router Redundancy with Enhanced VRRP for Intelligent Message Routing. SCDM 2014: 581-590 - 2013
- [j5]Ezugwu E. Absalom, Seyed M. Buhari, Sahalu B. Junaidu:
Virtual Machine Allocation in Cloud Computing Environment. Int. J. Cloud Appl. Comput. 3(2): 47-60 (2013) - [j4]Ezugwu E. Absalom, Seyed M. Buhari, Afolayan Ayodele Obiniyi, Sahalu B. Junaidu:
A Generic Reference Architecture for Collaboratory Scientific Virtual Laboratory. Int. J. Grid High Perform. Comput. 5(1): 37-52 (2013) - [j3]Didem Gözüpek, Seyed M. Buhari, Fatih Alagöz:
A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks. IEEE Trans. Mob. Comput. 12(7): 1270-1280 (2013) - [c6]Seyed M. Buhari, N. J. Tuah, Kim Onn Chong, Sei Guan Lim, Abdul Ghani Naim:
Fuzzy based room temperature control by integrating sensors and cameras with a grid. CIComms 2013: 61-65 - 2011
- [c5]Khaled Salah, M. Al-Saba, M. Akhdhor, O. Shaaban, M. I. Buhari:
Performance evaluation of popular Cloud IaaS providers. ICITST 2011: 345-349
2000 – 2009
- 2008
- [j2]Khaled Salah, Prasad Calyam, M. I. Buhari:
Assessing readiness of IP networks to support desktop videoconferencing using OPNET. J. Netw. Comput. Appl. 31(4): 921-943 (2008) - [c4]Kenneth Chiang-Yu Chin, Seyed Mohammed Buhari, Wee-Hong Ong:
Impact of LEGO sensors in remote controlled robot. ROBIO 2008: 1777-1782 - 2007
- [j1]Sulaiman Syed Mohamed, M. I. Buhari, M. Akbar Badhusha:
Impact of Redhat IPv6 router on heterogeneous host connections. Int. J. Commun. Syst. 20(4): 411-426 (2007) - 2006
- [c3]Ameer Ahmed Abbasi, M. I. Buhari, M. Akbar Badhusha:
A Multi-Layer Intruder Detection System for Multi-Hop Cluster-Based Sensor Networks. ICWN 2006: 91-97 - 2002
- [c2]Seyed Mohammed Buhari, Nor Rofeah A. Sani:
Histogram Setup to Recognize Arabic Calligraphy. IC-AI 2002: 139-146 - 2001
- [c1]A. Badhusha, Seyed M. Buhari, Sahalu B. Junaidu, Haja Mohd Saleem:
Automatic Signature Files Update in Antivirus software Using Active Packets. AICCSA 2001: 457-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint