Adel R. Alharbi

CONFERENCES

  1. K-means and Principal Components Analysis Approach For Clustering Malicious URLs, 3rd International Conference on Computing and Information Technology (ICCIT), University of Tabuk, Tabuk, Saudi Arabia, 13-14 September 2023. HTML
  2. Mobility Support for Reduced-State Routing, 2nd International Conference on Computing and Information Technology (ICCIT), University of Tabuk, Tabuk, Saudi Arabia, 25-27 January 2022. HTML
  3. Neural Networks Based on Latent Dirichlet Allocation in News Web Page Classifications, 2nd IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), Kota Kinabalu, Sabah, Malaysia, 26-27 September 2020. HTML
  4. An Overview of Auto-configuration Protocols in Mobile Ad Hoc Wireless Multi-hop Network, 11th International Conference on Wireless, Mobile Network & Applications (WiMoA-2019), Dubai, UAE, 21-22 December 2019. HTML
  5. Preemptive Two-Stage Update Mechanism for Software-Defined Networks, 44th IEEE Conference on Local Computer Networks (LCN), Osnabrück, Germany, 14-17 October 2019. HTML
  6. Demographic Group Prediction Based on Smart Device User Recognition Gestures, 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, California, USA, 18-20 December 2016. PDF
  7. Demographic Group Classification of Smart Device Users, 14th IEEE International Conference on Machine Learning and Applications (ICMLA), Miami, Florida, USA, 9-11 December 2015. PDF

JOURNALS

  1. DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication, IEEE Access, ISI-Indexed, 14 January 2024. URL
  2. Underpinning Quality Assurance: Identifying Core Testing Strategies for Multiple Layers of Internet-of-Things-Based Applications, MDPI, Sustainability, ISI-Indexed, 11 November 2023. URL
  3. An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication Over NIST Binary Fields, MDPI, Applied Sciences, ISI-Indexed, 30 September 2023. URL
  4. The Reality of Internet Infrastructure and Services Defacement: A Second Look to Characterize Web-Based Vulnerabilities, MDPI, Electronics, ISI-Indexed, 12 June 2023. URL
  5. Area Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications, MDPI, Applied Sciences, ISI-Indexed, 6 June 2023. URL
  6. Review the Recent Fraud Detection Systems for Accounting Area using Blockchain Technology, International Journal of Computer Science and Network Security (IJCSNS), 14 March 2023. PDF
  7. System decomposition method-based global stability criteria for T-S fuzzy Clifford-valued delayed neural networks with impulses and leakage term, AIMS Press, ISI-Indexed, 23 April 2023. HTML
  8. Construction and Optimization of Dynamic S-Boxes based on Gaussian distribution, IEEE Access, ISI-Indexed, 18 March 2023. HTML
  9. Large Field-size Throughput/Area Accelerator for Elliptic-curve Point Multiplication on FPGA, MDPI, Applied Sciences, ISI-Indexed, 31 December 2022. HTML
  10. Latency Aware Accelerator of SIMECK Lightweight Block Cipher, MDPI, Applied Sciences, ISI-Indexed, 14 December 2022. HTML
  11. AES Based White Box Cryptography in Digital Signature Verification, MDPI, Sensors, ISI-Indexed, November 27, 2022. HTML
  12. Website Defacement Detection and Monitoring Methods: A Review, MDPI, Electronics, ISI-Indexed, October 27, 2022. HTML
  13. Access Control Based on Log File for Internet of Things Devices, International Journal of Recent Technology and Engineering (IJRTE), July 30, 2022. HTML
  14. CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps, IEEE Access, ISI-Indexed, 4 April 2022. HTML
  15. An Efficient Crypto Processor Architecture for Side-channel Resistant Binary Huff Curves on FPGA, electronics, MDPI, ISI-Indexed, 28 March 2022. HTML
  16. ACM-SH: An efficient access control and key establishment mechanism for sustainable smart healthcare, Sustainability, MDPI, ISI-Indexed, 21 March 2022. PDF
  17. Blockchain-Enabled Smart Surveillance System with Artificial Intelligence, wireless communications and mobile computing, Hindawi, ISI-Indexed, 10 March 2022.
  18. HTML
  19. A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-based Quantum Map, complexity, Hindawi, ISI-Indexed, 10 March 2022. PDF
  20. Smart Healthcare System With Light Weighted Blockchain System And Deep Learning Techniques, Computational Intelligence and Neuroscience, Hindawi, ISI-Indexed, 7 March 2022. HTML
  21. An Innovative Methodology For Network Latency Detection Based On IoT Centered Blockchain Transactions, Wireless Communication and Mobile Computing, Hindawi, ISI-Indexed, 26 February 2022. HTML
  22. Quaternion Integers based Higher Length Cyclic Codes and Their Decoding Algorithm, CMC-Computers, Materials & Continua, ISI-Indexed, 15 February 2022. PDF
  23. A Novel Approach for Security Enhancement of Data Encryption Standard, CMC-Computers, Materials & Continua, ISI-Indexed, 14 January 2022. HTML
  24. HMI Development Automation with GUI Elements for Object-Oriented Programming Languages Implementation, International Journal of Engineering Trends and Technology (IJETT), Scopus, 15 December 2021.
  25. An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures, CMC-Computers, Materials & Continua, ISI-Indexed, 31 December 2021.
  26. A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field, Computational Intelligence and Neuroscience, Hindawi, ISI-Indexed, 28 December 2021. HTML
  27. Construction of S-Boxes using Different Maps over Elliptic Curves for Image Encryption, IEEE Access, ISI-Indexed, November 10, 2021.
  28. Integration of Spatial and Frequency Domain Encryption for Digital Images, IEEE Access, Volume 9, ISI-Indexed, November 2, 2021. HTML
  29. A Low-overhead Countermeasure against Differential Power Analysis for AES Block Cipher, MDPI, Applied Sciences, ISI-Indexed, October 31, 2021. HTML
  30. A Novel Low-area Point Multiplication Architecture for Elliptic-curve Cryptography, MDPI, Electronics, ISI-Indexed, October 29, 2021. HTML
  31. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps Under Human-Centered IoT Environments, MDPI, Sensors, ISI-Indexed, October 27, 2021. HTML
  32. An Efficient Electronic Cash System Based on Certificateless Group Signcryption Schemes Using Conformable Chaotic Maps, MDPI, Sensors, ISI-Indexed, October 21, 2021. HTML
  33. SBOOSP: An Efficient Provably Secure Lightweight Subtree-based Online/Offline Signature Procedure for Massive Devices in 5G WSNs using Conformable Chaotic Maps, CMC-Computers, Materials & Continua, ISI-Indexed, October 15, 2021. PDF
  34. Securing 5G -IoT Device Connectivity and Coverage using Boltzmann Machine Keys Generation, Mathematical Problems in Engineering, Hindawi, Volume 2021, ISI-Indexed, 28 September 2021. PDF
  35. IBOOST: A Lightweight Provably Secure Identity-based Online/Offline Signature Technique based on FCM for Massive Devices in 5G Wireless Sensor Networks, IEEE Access, Volume 9, ISI-Indexed, 18 September 2021. HTML
  36. Fog Big Data Analysis for IoT Sensor Application Using Fusion Deep Learning, Mathematical Problems in Engineering, Hindawi, ISI-Indexed, 16 September 2021. PDF
  37. Design of nonlinear components over a Mordell Elliptic Curve on Galois fields, CMC-Computers, Materials & Continua, ISI-Indexed, September 2, 2021. PDF
  38. DAMAC: A Delay Aware MAC Protocol for Ad-hoc Underwater Acoustic Sensor Networks, MDPI, Sensors, ISI-Indexed, August 2, 2021. HTML
  39. Elliptic-curve Crypto Processor for RFID Applications, MDPI, Applied Sciences, ISI-Indexed, July 31, 2021. HTML
  40. Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps, IEEE Access, ISI-Indexed, Volume 9, July 21, 2021. HTML
  41. Enhancing Topic Clustering for Arabic Security News Based on K-means and Topic Modeling, the Institution of Engineering and Technology (IET), ISI-Indexed, January 31, 2021. PDF
  42. Peer-to-Peer Network Security Issues and Analysis: Review, International Journal of Computer Science and Network Security (IJCSNS), ISI-Indexed, Volume 20, No. 11, November 2020. PDF
  43. Modification of Models Intensive Development Ontologies by Fuzzy Logic, International Journal of Emerging Trends in Engineering Research (IJETER), Volume 8, No. 3, March 2020. PDF
  44. Text Mining in Educational Objectives for Arabic Twitter Educator Accounts, International Journal of Modern Education and Computer Science (IJMECS), Scopus-Indexed, Volume 11, Issue 1, March 2020. PDF
  45. Hardware Backed Security and TrustZone For Mobile Devices: Features and Use Cases, IOSR Journals, IOSR Journal of Computer Engineering (IOSR-JCE), January 7 , 2020. PDF
  46. Detection of heartbeat sounds arrhythmia using automatic spectral methods and cardiac auscultatory, Springer, Springer Journal of Supercomputing, ISI-Indexed, November 19, 2019. HTML
  47. Fast Fail-Over Technique for Distributed Controller Architecture in Software-Defined Networks, IEEE Transaction, IEEE Access, ISI-Indexed, November 5, 2019. PDF
  48. Predicting Rogue Content and Arabic Spammers on Twitter, MDPI, Future Internet, ISI-Indexed, October 30, 2019. HTML, Dataset

RESEARCH CONTRIBUTIONS

  1. End Stage Renal Disease (ESRD) Incidence Rates in Saudi Arabia: Current Scenario in Tabuk region, Bioscience Research, Innovative Scientific Information & Services Network, ISI, October 30, 2019. HTML
  2. Some Aspects of Radiation Safety due to Electromagnetic Field in Normal Human Life. (Abstract), Current Trends in Biotechnology & Pharmacy. Apr2020 Suppl, p151-152. 2p.

PH.D. DISSERTATION

  • Demographic Group Prediction Based on Smart Device User Recognition Gestures, Ph.D. dissertation, Department of Computer Science and Engineering, Southern Methodist University, April 26, 2017. PDF