النشر العلمي للطلاب و الطالبات

نماذج للأوراق العلمية المنشورة لطلاب و طالبات الكلية


قسم تقنية المعلومات


Alotaibi, Shahad, Khadijah Alharbi, Balsam Abaalkhail, and Dina M. Ibrahim. "Sensitive Data Exposure: Data Forwarding and Storage on Cloud Environment." International Journal of Online & Biomedical Engineering 17, no. 14 (2021).

Albulayhi, Mohammed S., and Salim El Khediri. "A Comprehensive Study on Privacy and Security on Social Media." International Journal of Interactive Mobile Technologies 16, no. 1 (2022).

Mohammed S Albulayhi, and Dina M Ibrahim. “Open Web Application Security Project Components with Known Vulnerabilities A Comprehensive Study,” The ISC International Journal of Information Security, vol. 13, no. 3, pp. 59-67, 2021.

Al-Rasheedi, Gareebah, and Nabeel Khan. "The Role of Cloud Computing in Education: Saudi Arabian Study." International Journal of Interactive Mobile Technologies 15, no. 24 (2021).

Alghofaili, Yara, Albatul Albattah, Noura Alrajeh, Murad A. Rassam, and Bander Ali Saleh Al-rimy. "Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges." Applied Sciences 11, no. 19 (2021): 9005.

Alghofaili, Yara, and Murad A. Rassam. "A Trust Management Model for IoT Devices and Services Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term Memory Technique." Sensors 22, no. 2 (2022): 634.

Alrebdi, Norah, Abdulatif Alabdulatif, Celestine Iwendi, and Zhuotao Lian. “SVBE: Searchable and Verifiable Blockchain-Based Electronic Medical Records System.” Scientific Reports 12, no. 1 (2022): 1–11.

Alrebdi, Norah, Sarah Alrumiah, Atheer Almansour, and Murad Rassam. “Reinforcement Learning in Image Classification: A Review.” In 2022 2nd International Conference on Computing and Information Technology (ICCIT), 79–86. IEEE, 2022.

Algarawi, Fetoon, and Nabeel Khan. "Integrating Cloud with Self Service Kiosk: An Impact Study on Society Evolution." International Journal of Interactive Mobile Technologies 15, no. 23 (2021).

Amnah Aldayri, Halima Alrashedy, Fetoon Algarawi, Murad A. Rsassam “The Role of Mobile Application in Facilitating Delivery of Food and Grocery During COVID-19 Pandemic in Saudi Arabia” Advanced Studies: Euro-Tbilisi Mathematical Journal 16, supplement issue 2 (2023), pp. 29–39. DOI: 10.32513/asetmj/1932200823203

Albattah, Albatul, and Murad A. Rassam. "A Correlation-Based Anomaly Detection Model for Wireless Body Area Networks Using Convolutional Long Short-Term Memory Neural Network." Sensors 22.5 (2022): 1951.

Ghaida Alqarawi, Bashayer Alkhalifah, Najla Alharbi, and Salim El Khediri. “Internet-of-Things Security and Vulnerabilities: Case Study.” Journal of Applied Security Research, 2022, 1–17.

AlHusain, Reem, and Ali Alkhalifah. "Evaluating fallback authentication research: A systematic literature review." Computers & Security 111 (2021): 102487.

AlHusain, Reem, and Ali Alkhalifah. "Evaluating knowledge-based security questions for fallback authentication." PeerJ Computer Science 8 (2022): e903.

Alharbi, Amera, Afnan Alotaibi, Lujain Alghofaili, Mona Alsalamah, Nora Alwasil, and Salim Elkhediri. "Security in Social-Media: Awareness of Phishing Attacks Techniques and Countermeasures." In 2022 2nd International Conference on Computing and Information Technology (ICCIT), pp. 10-16. IEEE, 2022.

Alrobaish, Ashwag. Hamad., Al-mutairi, Wejdan. Faleh., Alsuqayhi, Hissah. A., & Ibrahim, Dina. M. (2022, January). Common Attacks on Near Field Communication Technology. In 2022 2nd International Conference on Computing and Information Technology (ICCIT) (pp. 110-114). IEEE.

Amnah Aldayri, Mohammed Hadwan ""The Utilization of Augmented Reality in Saudi Arabia E-Commerce Websites"", Advanced Studies: Euro-Tbilisi Mathematical Journal 16, supplement issue 2 (2023), pp. 1–8. DOI: 10.32513/asetmj/1932200823201

Alrumiah, Sarah S., and Mohammed Hadwan. "Implementing big data analytics in e-commerce: Vendor and customer view." IEEE Access 9 (2021): 37281-37286.

Alrumiah, Sarah S., and Amal A. Al-Shargabi. "Educational Videos Subtitles’ Summarization Using Latent Dirichlet Allocation and Length Enhancement." CMC-COMPUTERS MATERIALS & CONTINUA 70, no. 3 (2022): 6205-6221.

Alfrhan, A., Moulahi, T., & Alabdulatif, A. (2021). Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT). Blockchain: Research and Applications, 2(4), 100036.

Hanan Aljoaey,Khawla Almutawa, Ruyuf Alabdali, and Dina M Ibrahim. "Broken Authentication and Session Management Vulnerabilities." The ISC International Journal of Information Security, vol. 13, no. 3, pp. 11-19, 2021.

Alamri, Emtethal K., Abdullah M. Alnajim, and Suliman A. Alsuhibany. "Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks." Future Internet 14.3 (2022): 82.

Alassaf, Mada, and Ali Alkhalifah. "Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review." IEEE Access(2021).

Alotaibi, S., Alharbi, K., Alwabli, H., Aljoaey, H., Abaalkhail, B., & El Khediri, S. Threats, crimes and issues of privacy of users’ information shared on online social networks. In 2021 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-8). IEEE.

Alrobah, Naseem, and Saleh Albahli. "A hybrid deep model for recognizing arabic handwritten characters." IEEE Access 9 (2021): 87058-87069.

Al-Shargabi, Amal A and Alshobaili, Jowharah F and Alabdulatif, Abdulatif and Alrobah, Naseem . (2021). COVID-CGAN: Efficient Deep Learning Approach for COVID-19 Detection Based on CXR Images Using Conditional GANs. Applied Sciences, 11(16), 7174.

Alrobah, Naseem, and Saleh Albahli. "Arabic Handwritten Recognition Using Deep Learning: A Survey." Arabian Journal for Science and Engineering (2022): 1-21.

Alsuhibany, Suliman A., Fatimah N. Almohaimeed, and Naseem A. Alrobah. "Synthetic Arabic handwritten CAPTCHA." International Journal of Information and Computer Security 16.3-4 (2021): 385-398.

Alhassun, Atheer S., and Murad A. Rassam. "A Combined Text-Based and Metadata-Based Deep-Learning Framework for the Detection of Spam Accounts on the Social Media Platform Twitter." Processes 10, no. 3 (2022): 439.

Afnan Alotaibi, Lujain Alghufaili, and Dina M Ibrahim. “Cross Site Scripting Attack Review,” The ISC International Journal of Information Security, vol. 13, no. 3, pp. 21-30, 2021.

Mona Alsalamah, Huda Alwabli, Hutaf Alqwifli, and Dina M Ibrahim. "A Review Study on SQL Injection Attacks, Prevention, and Detection." The ISC International Journal of Information Security, vol. 13, no. 3, pp. 1-10, 2021.

Alharbi, Amera, Afnan Alotaibi, Lujain Alghofaili, Mona Alsalamah, Nora Alwasil, and Salim Elkhediri. "Security in Social-Media: Awareness of Phishing Attacks Techniques and Countermeasures." In 2022 2nd International Conference on Computing and Information Technology (ICCIT), pp. 10-16. IEEE, 2022.

Almogbel, Razan. S., & Alkhalifah, Ali. A. (2022). User Behavior in Social Networks Toward Privacy and Trust: Literature Review. International Journal of Interactive Mobile Technologies, 16(1).

Alkhudhayr, Fatimah, Tarek Moulahi, and Abdulatif Alabdulatif. "Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4." Evaluation 12, no. 9 (2021).

Alkhodhairi, Reem K., Shahad R. Aljalhami, Norah K. Rusayni, Jowharah F. Alshobaili, Amal A. Al-Shargabi, and Abdulatif Alabdulatif. "Bitcoin Candlestick Prediction with Deep Neural Networks Based on Real Time Data." CMC-COMPUTERS MATERIALS & CONTINUA 68, no. 3 (2021): 3215-3233.

Athar. I. Alboqomi and Nabeel. Khan, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH,“Awareness Of Green Computing In KSA : A Pandemic Perspective,” vol. 10, no. 01, pp. 117–121, 2021.

Arwa Albulyhi and Dina M. Ibrahim, “Diabetes-based Eye Disease Detection Methods using Deep Learning and GAN Techniques: An Overview,” Journal of Ambient Intelligence and Humanized Computing (2022) (Accepted)

Norah Alajlan, Meshael Alyahya, Noorah Alghasham, and Dina M Ibrahim. “Data Enhancement for Date Fruit Classification Using DCGAN,” The ISC International Journal of Information Security, vol. 13, no. 3, pp. 39-48, 2021.

Aladhadh, S.; Alwabli, H.; Moulahi, T.; Al Asqah, M. BChainGuard: A New Framework for Cyberthreats Detection in Blockchain Using Machine Learning. Appl.Sci.2022,12,12026. https:// doi.org/10.3390/app122312026

Alsayegh, M., Moulahi, T., Alabdulatif, A., & Lorenz, P. (2022). Towards secure searchable electronic health records using consortium blockchain. Network, 2(2), 239-256.

H. Alrobaish, W. F. Al-mutairi, H. A. Alsuqayhi and D. M. Ibrahim, "Common Attacks on Near Field Communication Technology," 2022 2nd International Conference on Computing and Information Technology (ICCIT), 25-27 Jan. 2022, Tabuk, Saudi Arabia, pp. 110-114, https://doi.org/10.1109/ICCIT52419.2022.9711657

Norah N. Alajlan, and Dina M. Ibrahim. 2022. "TinyML: Enabling of Inference Deep Learning Models on Ultra-Low-Power IoT Edge Devices for AI Applications" Micromachines 13, no. 6: 851.  https://doi.org/10.3390/mi13060851

Halima Hamid N. Alrashedy, Atheer Fahad Almansour, Dina M. Ibrahim, and Mohammad Ali A. Hammoudeh. "BrainGAN: Brain MRI Image Generation and Classification Framework Using GAN Architectures and CNN Models." Sensors 22, no. 11 (2022): 4297. https://doi.org/10.3390/s22114297

Sarah S Alrumiah, Norah Alrebdi, and Dina M. Ibrahim. "Augmenting healthy brain magnetic resonance images using generative adversarial networks." PeerJ Computer Science, 2023 9:e1318 http://doi.org/10.7717/peerj-cs.1318

N. S. Al-Blihed, N. F. Al-Mufadi, N. T. Al-Harbi, I. A. Al-Omari, and M. A. Al- Hagery, “Blockchain and machine learning in the internet of things: a review of smart healthcare,” IAES International Journal of Artificial Intelligence, vol. 12, no. 3, pp. 995–1006, 2023.

Alotaibi, Afnan, and Murad A. Rassam. ""Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense."" Future Internet 15.2 (2023): 62.

Aldayri A, Albattah W. Taxonomy of Anomaly Detection Techniques in Crowd Scenes. Sensors (Basel). 2022 Aug 14;22(16):6080. doi: 10.3390/s22166080. PMID: 36015840; PMCID: PMC9415874.

Almutairi, A. F., & Alshargabi, A. A. (2022, October). Using Deep Learning Technique to Protect Internet Network from Intrusion in IoT Environment. In 2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA) (pp. 1-6). IEEE.


قسم علوم الحاسب

Maram Almotairi and Fethi Fkih. "Development of a Semantic Question Answering System for E-learning Environments using Linguistic Resources". Journal of Education and e-Learning Research, 2022.

Tahani Soud Alharbi, & Fethi Fkih, (2022). “Building and Testing Fine-Grained Dataset of COVID-19 Tweets for Worry Prediction”, International Journal of Advanced Computer Science and Applications, 13,8. 

Maram Almotairi & Fethi Fkih. (2021). A Review on Question Answering Systems: Domains, Modules, Techniques and Challenges. 38 IBIMA conference, November 2021, Seville, Spainز 

Alresheedi, Abdulatif Aoihan, and Mohammed Abdullah Al-Hagery. "Forecasting the global horizontal irradiance based on boruta algorithm and artificial neural networks using a lower cost." International Journal of Advanced Computer Science and Applications 11.9 (2020). 

Raed Muhammad Albadrani , Mohammed Abdullah Al-Hagery , Mohamed Tahar Ben Othman, “A Proposed Clustering Technique for Arabic Text Summarization”, International Journal of Science and Research (IJSR), Volume 11 Issue 10, October 2022, p. 424-427 , DOI:10.21275/SR221009042717ز 

K. Alamer and A. Aldribi, "Intrusion Classification for Cloud Computing Network: A Step Towards an Intelligent Classification System," 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 2022, pp. 757-764, doi: 10.1109/CICN56167.2022.10008346.


قسم هندسة الحاسب

S. Abdel-Hafeez and A. Alqunaysi, “Threshold Analysis on 2-bit LSB Steganography (R, G, B) Color Image”, 5th International Conference on Computer Applications and Information Security (ICCAIS’ 2022), Elsevier, Tunisia, Feb. 2022.

A. Amutairi and A. Alshoshan, “Developing a Webpage Phishing Attack Detection Tool”, Proceedings of the 2022 Computing Conference, Intelligent Computing, Springer Nature, July 2022.

T. Alshamri, M. Albakheet, and I. Kateeb, “Survey on radio Frequency Identification Security and Attacks”, ICFNDS 2021, ACM, UAE, May 2021.

T. Alsuwaidani, “The security Challenges in Healthcare Cloud Computing”, International Journal of Computer Science and Network Security (IJSNS), Vol. 22, No. 3, March 2022.

A. Hajjisaaid and Y. Ahmed, “Secure Electronic Banking Authentication –Survey”, International Conference on Computing and Information Technology, Saudi Arabia, Sept. 2020.

Y. Aljumah and S. Sohail, “A Novel Approach to Get Awareness in Saudi Arabia Regarding Phishing Attacks”, International Conference on Electrical, Communication, and Computer Engineering (ICECCE 2021), IEEE, Malaysia, Aug. 2021.


 

 

 

07/05/2023
13:58 PM