A comparative analysis of blockchain architecture and its applications: Problems and recommendations TA Syed, A Alzahrani, S Jan, MS Siddiqui, A Nadeem, T Alghamdi IEEE access 7, 176838-176869, 2019 | 293 | 2019 |
A review on communications perspective of flying ad-hoc networks: key enabling wireless technologies, applications, challenges and open research topics F Noor, MA Khan, A Al-Zahrani, I Ullah, KA Al-Dhlan Drones 4 (4), 65, 2020 | 89 | 2020 |
Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure A Jawad, A Toqeer, M Shahrulniza, A Alzahrani International Journal of Advanced Computer Science and Applications (IJACSA …, 2018 | 46* | 2018 |
In-depth review of augmented reality: Tracking technologies, development tools, AR displays, collaborative AR, and security concerns TA Syed, MS Siddiqui, HB Abdullah, S Jan, A Namoun, A Alzahrani, ... Sensors 23 (1), 146, 2022 | 37 | 2022 |
Can computer forensic tools be trusted in digital investigations? WA Bhat, A AlZahrani, MA Wani Science & Justice 61 (2), 198-203, 2021 | 37 | 2021 |
A novel blockchain-based framework for vehicle life cycle tracking: An end-to-end solution TA Syed, MS Siddique, A Nadeem, A Alzahrani, S Jan, MAK Khattak IEEE Access 8, 111042-111063, 2020 | 34 | 2020 |
A transparent and trusted property registration system on permissioned blockchain T Ali, A Nadeem, A Alzahrani, S Jan 2019 International Conference on Advances in the Emerging Computing …, 2020 | 32 | 2020 |
File system anti-forensics–types, techniques and tools MA Wani, A AlZahrani, WA Bhat Computer Fraud & Security 2020 (3), 14-19, 2020 | 26 | 2020 |
Digital transformation of public sector governance with IT service management–A pilot study MI Sarwar, Q Abbas, T Alyas, A Alzahrani, T Alghamdi, Y Alsaawy IEEE Access 11, 6490-6512, 2023 | 21 | 2023 |
Permissioned blockchain-based security for SDN in IoT cloud networks S Faizullah, MA Khan, A Alzahrani, I Khan 2019 International Conference on Advances in the Emerging Computing …, 2020 | 18 | 2020 |
Hybrid approach for improving the performance of data reliability in cloud storage management A Alzahrani, T Alyas, K Alissa, Q Abbas, Y Alsaawy, N Tabassum Sensors 22 (16), 5966, 2022 | 16 | 2022 |
An online-offline certificateless signature scheme for Internet of health things MA Khan, SU Rehman, MI Uddin, S Nisar, F Noor, A Alzahrani, I Ullah Journal of Healthcare Engineering 2020, 2020 | 16 | 2020 |
A novel integration of face-recognition algorithms with a soft voting scheme for efficiently tracking missing person in challenging large-gathering scenarios A Nadeem, M Ashraf, K Rizwan, N Qadeer, A AlZahrani, A Mehmood, ... Sensors 22 (3), 1153, 2022 | 13 | 2022 |
Securing wireless body area network with efficient secure channel free and anonymous certificateless signcryption F Noor, TA Kordy, AB Alkhodre, O Benrhouma, A Nadeem, A Alzahrani Wireless Communications and Mobile Computing 2021, 1-14, 2021 | 12 | 2021 |
Secure data provenance in internet of things based networks by outsourcing attribute based signatures and using bloom filters MS Siddiqui, A Rahman, A Nadeem, AM Alzahrani International Journal of Advanced Computer Science and Applications 10 (5), 2019 | 11 | 2019 |
Query Optimization Framework for Graph Database in Cloud Dew Environment T Alyas, A Alzahrani, Y Alsaawy, K Alissa, Q Abbas, N Tabassum Computers, Materials & Continua 74 (1), 2317-2330, 2023 | 10 | 2023 |
A smart city application design for efficiently tracking missing person in large gatherings in Madinah using emerging IoT technologies A Nadeem, K Rizwan, A Mehmood, N Qadeer, F Noor, A AlZahrani 2021 Mohammad Ali Jinnah University International Conference on Computing …, 2021 | 10 | 2021 |
Deep Convolutional Generative Adversarial Networks for Intent-based Dynamic Behavior Capture S Jan, T Ali, A Alzahrani, S Musa International Journal of Engineering & Technology 7 (4.29), 101-103, 2018 | 10 | 2018 |
Decentralized XACML overlay network A Alzahrani, H Janicke, S Abubaker 2010 10th IEEE International Conference on Computer and Information …, 2010 | 10 | 2010 |
Using singular value decomposition and chaotic maps for selective encryption of video feeds in smart traffic management O Benrhouma, AB Alkhodre, A AlZahrani, A Namoun, WA Bhat Applied Sciences 12 (8), 3917, 2022 | 9 | 2022 |