default search action
Mohammed Al-Naeem 0001
Person information
- affiliation: King Faisal University, Department of Computer Networks & Communications, CCSIT, Saudi Arabia
- affiliation (PhD 2015): Monash University, Clayton School of IT, VIC, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Rana Al-Rawashdeh, Ahmed Aljughaiman, Abdullah Albuali, Yousef Alsenani, Mohammed Alnaeem:
Enhancing DoS Detection in WSNs Using Enhanced Ant Colony Optimization Algorithm. IEEE Access 12: 134651-134671 (2024) - [j12]Muhammad Usman Rana, Munam Ali Shah, Mohammed Abdulaziz Al Naeem, Carsten Maple:
Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses. IEEE Access 12: 149722-149739 (2024) - [j11]Conrado P. Vizcarra, Shadan Alhamed, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Nura Aljaafari, Ahmad Sawalmeh, Mahmoud Nazzal, Abdallah Khreishah, Abdulaziz Alhumam, Muhammad Anan:
Deep learning adversarial attacks and defenses on license plate recognition system. Clust. Comput. 27(8): 11627-11644 (2024) - [j10]Usman Ashraf, Mohammed Al-Naeem, Muhammad Nasir Mumtaz Bhutta, Chau Yuen:
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs. Internet Things 28: 101419 (2024) - [j9]Nura Aljaafari, Mahmoud Nazzal, Ahmad H. Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Abdulaziz Al Naeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra:
Investigating the Factors Impacting Adversarial Attack and Defense Performances in Federated Learning. IEEE Trans. Engineering Management 71: 12542-12555 (2024) - 2023
- [c3]Mahmoud Nazzal, Nura Aljaafari, Ahmad H. Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed:
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification. FMEC 2023: 204-209 - [i1]Mahmoud Nazzal, Nura Aljaafari, Ahmad Sawalmeh, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Abdulaziz Alhumam, Conrado P. Vizcarra, Shadan Alhamed:
Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification. CoRR abs/2310.06855 (2023) - 2022
- [j8]Izzat Alsmadi, Nura Aljaafari, Mahmoud Nazzal, Shadan Alhamed, Ahmad H. Sawalmeh, Conrado P. Vizcarra, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Abdulaziz Al Naeem, Adel Aldalbahi, Abdulaziz Al-Humam:
Adversarial Machine Learning in Text Processing: A Literature Survey. IEEE Access 10: 17043-17077 (2022) - [j7]Mohammed N. M. Ali, M. M. Hafizur Rahman, Adamu Abubakar Ibrahim, Mohammed Al-Naeem, Eklas Hossain:
A High Static Performance Hierarchical Three-Dimensional Shifted Completely Connected Network. IEEE Access 10: 43812-43836 (2022) - [j6]M. M. Hafizur Rahman, Mohammed Abdulaziz Al Naeem, Adamu I. Abubakar:
Threats From Unintentional Insiders: An Assessment of an Organization's Readiness Using Machine Learning. IEEE Access 10: 110294-110308 (2022) - 2021
- [j5]Naif Almusallam, Zahir Tari, Jeffrey Chan, Adil Fahad, Abdulatif Alabdulatif, Mohammed Al-Naeem:
Towards an Unsupervised Feature Selection Method for Effective Dynamic Features. IEEE Access 9: 77149-77163 (2021) - [j4]Mohammed Abdulaziz Al Naeem:
Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS. IEEE Access 9: 87070-87078 (2021) - [j3]Usman Ashraf, Adnan Ahmed, Mohammed Al-Naeem, Unsa Masood:
Reliable and QoS aware routing metrics for wireless Neighborhood Area Networking in smart grids. Comput. Networks 192: 108051 (2021) - 2020
- [j2]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Abdallah Algosaibi, Adel Aldalbahi, Mohammed Alnaeem, Abdulaziz Alhumam, Mohammed Anan:
ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples. IEEE Access 8: 197086-197096 (2020) - [j1]Mohammed Abdulaziz Al Naeem, Adamu I. Abubakar, M. M. Hafizur Rahman:
Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach. IEEE Access 8: 197554-197566 (2020)
2010 – 2019
- 2015
- [b1]Mohammed Al-Naeem:
Pattern transformation-invariant schemes for wireless sensor networks based on an edge detection gradient-based mechanism. Monash University, Australia, 2015 - 2012
- [c2]Mohammed Al-Naeem, Asad I. Khan:
A novel target recognition scheme for WSNs. IJCNN 2012: 1-6 - 2010
- [c1]Mohammed Al-Naeem, Asad I. Khan:
MOHA: A Novel Target Recognition Scheme for WSNs. MobiQuitous 2010: 364-365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint