Publications
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency
A deep transfer learning model for green environment security analysis in smart city
Artificial Cognition for Detection of Mental Disability: A Vision Transformer Approach for Alzheimer’s Disease
Leveraging Motor Imagery Rehabilitation for Individuals with Disabilities: A Review
Enhancing diabetic retinopathy classification using deep learning
Deep learning-enhanced diabetic retinopathy image classification
Towards a Secure Technology-Driven Architecture for Smart Health Insurance Systems: An Empirical Study
Home Advances in Systems Engineering Conference paper Securing Electronic Health Records (EHR) from Tampering Using Blockchain
Ranking of Web Search for Best Link Identification by Using Hierarchy of Web Page Content
Advancing database security: a comprehensive systematic mapping study of potential challenges
DOI: https://doi.org/10.1007/s11276-023-03436-z(0123456789().,-volV)(0123456789().,-volV)
Enhancement of Diabetic Retinopathy Prognostication Using Deep Learning, CLAHE, and ESRGAN
YOLOv5-FPN: A Robust Framework for Multi-Sized Cell Counting in Fluorescence Images
Capturing Semantic Relationships in Electronic Health Records Using Knowledge Graphs: An Implementation Using MIMIC III Dataset and GraphDB
Explainable AI for Retinoblastoma Diagnosis: Interpreting Deep Learning Models with LIME and SHAP
Improving Healthcare Facilities in Remote Areas Using Cutting-Edge Technologies
Diagnosing Melanomas in Dermoscopy Images Using Deep Learning
YOLO-Based Deep Learning Model for Pressure Ulcer Detection and Classification
A Transfer Learning Approach for Clinical Detection Support of Monkeypox Skin Lesions
Satellite Image Categorization Using Scalable Deep Learning
Deep Learning-based prediction of Diabetic Retinopathy using CLAHE and ESRGAN for Enhancement
A Blockchain-Enabled Framework for Improving the Software Audit Process
Secure Global Software Development: A Practitioners' Perspective
Framework for Detecting Breast Cancer Risk Presence Using Deep Learning
Improving the Safety and Security of Software Systems by Mediating SAP Verification
Towards a Readiness Model for Secure Software Coding
A Comprehensive Review of Face Morph Generation and Detection of fraudulent Identities”, MDPI Applied Sciences
Melanoma Detection Using Deep Learning-Based Classifications
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework,
Enhancing Sentiment Analysis via Random majority Under-sampling with Reduced Time Complexity for Classifying Tweet Reviews
Software-as-a-Service Security Challenges and Best Practices: A Multivocal Literature Review
Smart Traffic management system for metropolitan cities of kingdom using cutting edge technologies
Superlative feature selection based image classification using deep learning in medical imaging
A Trust-Based Model for Secure Routing Against RPL Attacks in Internet of Things”
Deep LSTM Model for Diabetes Prediction with Class Balancing by SMOTE
Security in Wireless Body Sensor Network: A Multivocal Literature Study
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
Detection of Skin-Cancer Based on skin lesion Images Using Deep Learning
Initial Stage COVID-19 Detection System Based on Patients’ Symptoms and Chest X-Ray Images
Securing Drug Distribution Systems from Tampering Using Blockchain
Agent-Based Medical Health Monitoring System
Enabling recommendation system architecture in virtualized environment for e-learning
Real-Time Security Health and Privacy Monitoring for Saudi Highways Using Cutting-Edge Technologies
Energy Optimization for Smart Cities Using IoT
Detection of COVID-19 Based on Chest X-rays Using Deep Learning
Autonomous Traffic System for Emergency Vehicles
Security Threat and Vulnerability Assessment and Measurement in Secure Software Development
Industry 4.0 and Cyber Security Issues and Challenges
Intrusion detection systems in internet of things and mobile ad-hoc networks
An integrated approach on verification of signatures using multiple classifiers (SVM and Decision Tree): A multi-classification approach
Business email compromise (BEC) attacks
Hybrid smart grid with sustainable energy efficient resources for smart cities
Test case prioritization techniques in software regression testing: An overview
Internet of things and ransomware: Evolution, mitigation and prevention
Towards an effective approach for architectural knowledge management considering global software development