النشر العلمي للطلاب و الطالبات
نماذج للأوراق العلمية المنشورة لطلاب و طالبات الكلية
قسم تقنية المعلومات
Alotaibi, Shahad, Khadijah Alharbi, Balsam Abaalkhail, and Dina M.
Ibrahim. "Sensitive Data Exposure: Data Forwarding and Storage on Cloud
Environment." International Journal of Online & Biomedical Engineering
17, no. 14 (2021).
Albulayhi, Mohammed
S., and Salim El Khediri. "A Comprehensive Study on Privacy and Security
on Social Media." International Journal of Interactive Mobile Technologies
16, no. 1 (2022).
Mohammed S Albulayhi,
and Dina M Ibrahim. “Open Web Application Security Project Components with
Known Vulnerabilities A Comprehensive Study,” The ISC International Journal of
Information Security, vol. 13, no. 3, pp. 59-67, 2021.
Al-Rasheedi,
Gareebah, and Nabeel Khan. "The Role of Cloud Computing in Education:
Saudi Arabian Study." International Journal of Interactive Mobile
Technologies 15, no. 24 (2021).
Alghofaili, Yara,
Albatul Albattah, Noura Alrajeh, Murad A. Rassam, and Bander Ali Saleh Al-rimy.
"Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and
Open Challenges." Applied Sciences 11, no. 19 (2021): 9005.
Alghofaili, Yara, and
Murad A. Rassam. "A Trust Management Model for IoT Devices and Services
Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term
Memory Technique." Sensors 22, no. 2 (2022): 634.
Alrebdi, Norah,
Abdulatif Alabdulatif, Celestine Iwendi, and Zhuotao Lian. “SVBE: Searchable
and Verifiable Blockchain-Based Electronic Medical Records System.” Scientific
Reports 12, no. 1 (2022): 1–11.
Alrebdi, Norah, Sarah
Alrumiah, Atheer Almansour, and Murad Rassam. “Reinforcement Learning in Image
Classification: A Review.” In 2022 2nd International Conference on Computing
and Information Technology (ICCIT), 79–86. IEEE, 2022.
Algarawi, Fetoon, and
Nabeel Khan. "Integrating Cloud with Self Service Kiosk: An Impact Study
on Society Evolution." International Journal of Interactive Mobile
Technologies 15, no. 23 (2021).
Amnah Aldayri, Halima
Alrashedy, Fetoon Algarawi, Murad A. Rsassam “The Role of Mobile Application in
Facilitating Delivery of Food and Grocery During COVID-19 Pandemic in Saudi
Arabia” Advanced Studies: Euro-Tbilisi Mathematical Journal 16, supplement
issue 2 (2023), pp. 29–39. DOI: 10.32513/asetmj/1932200823203
Albattah, Albatul,
and Murad A. Rassam. "A Correlation-Based Anomaly Detection Model for
Wireless Body Area Networks Using Convolutional Long Short-Term Memory Neural
Network." Sensors 22.5 (2022): 1951.
Ghaida Alqarawi,
Bashayer Alkhalifah, Najla Alharbi, and Salim El Khediri. “Internet-of-Things
Security and Vulnerabilities: Case Study.” Journal of Applied Security
Research, 2022, 1–17.
AlHusain, Reem, and
Ali Alkhalifah. "Evaluating fallback authentication research: A systematic
literature review." Computers & Security 111 (2021): 102487.
AlHusain, Reem, and
Ali Alkhalifah. "Evaluating knowledge-based security questions for
fallback authentication." PeerJ Computer Science 8 (2022): e903.
Alharbi, Amera, Afnan
Alotaibi, Lujain Alghofaili, Mona Alsalamah, Nora Alwasil, and Salim Elkhediri.
"Security in Social-Media: Awareness of Phishing Attacks Techniques and
Countermeasures." In 2022 2nd International Conference on Computing and
Information Technology (ICCIT), pp. 10-16. IEEE, 2022.
Alrobaish, Ashwag.
Hamad., Al-mutairi, Wejdan. Faleh., Alsuqayhi, Hissah. A., & Ibrahim, Dina.
M. (2022, January). Common Attacks on Near Field Communication Technology. In
2022 2nd International Conference on Computing and Information Technology
(ICCIT) (pp. 110-114). IEEE.
Amnah Aldayri,
Mohammed Hadwan ""The Utilization of Augmented Reality in Saudi
Arabia E-Commerce Websites"", Advanced Studies: Euro-Tbilisi
Mathematical Journal 16, supplement issue 2 (2023), pp. 1–8. DOI:
10.32513/asetmj/1932200823201
Alrumiah, Sarah S.,
and Mohammed Hadwan. "Implementing big data analytics in e-commerce:
Vendor and customer view." IEEE Access 9 (2021): 37281-37286.
Alrumiah, Sarah S.,
and Amal A. Al-Shargabi. "Educational Videos Subtitles’ Summarization
Using Latent Dirichlet Allocation and Length Enhancement." CMC-COMPUTERS
MATERIALS & CONTINUA 70, no. 3 (2022): 6205-6221.
Alfrhan, A., Moulahi,
T., & Alabdulatif, A. (2021). Comparative study on hash functions for
lightweight blockchain in Internet of Things (IoT). Blockchain: Research and
Applications, 2(4), 100036.
Hanan Aljoaey,Khawla
Almutawa, Ruyuf Alabdali, and Dina M Ibrahim. "Broken Authentication and
Session Management Vulnerabilities." The ISC International Journal of
Information Security, vol. 13, no. 3, pp. 11-19, 2021.
Alamri, Emtethal K.,
Abdullah M. Alnajim, and Suliman A. Alsuhibany. "Investigation of Using
CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks."
Future Internet 14.3 (2022): 82.
Alassaf, Mada, and
Ali Alkhalifah. "Exploring the Influence of Direct and Indirect Factors on
Information Security Policy Compliance: A Systematic Literature Review."
IEEE Access(2021).
Alotaibi, S.,
Alharbi, K., Alwabli, H., Aljoaey, H., Abaalkhail, B., & El Khediri, S.
Threats, crimes and issues of privacy of users’ information shared on online
social networks. In 2021 International Symposium on Networks, Computers and
Communications (ISNCC) (pp. 1-8). IEEE.
Alrobah, Naseem, and
Saleh Albahli. "A hybrid deep model for recognizing arabic handwritten
characters." IEEE Access 9 (2021): 87058-87069.
Al-Shargabi, Amal A
and Alshobaili, Jowharah F and Alabdulatif, Abdulatif and Alrobah, Naseem .
(2021). COVID-CGAN: Efficient Deep Learning Approach for COVID-19 Detection
Based on CXR Images Using Conditional GANs. Applied Sciences, 11(16), 7174.
Alrobah, Naseem, and
Saleh Albahli. "Arabic Handwritten Recognition Using Deep Learning: A
Survey." Arabian Journal for Science and Engineering (2022): 1-21.
Alsuhibany, Suliman
A., Fatimah N. Almohaimeed, and Naseem A. Alrobah. "Synthetic Arabic
handwritten CAPTCHA." International Journal of Information and Computer
Security 16.3-4 (2021): 385-398.
Alhassun, Atheer S.,
and Murad A. Rassam. "A Combined Text-Based and Metadata-Based
Deep-Learning Framework for the Detection of Spam Accounts on the Social Media
Platform Twitter." Processes 10, no. 3 (2022): 439.
Afnan Alotaibi,
Lujain Alghufaili, and Dina M Ibrahim. “Cross Site Scripting Attack Review,”
The ISC International Journal of Information Security, vol. 13, no. 3, pp.
21-30, 2021.
Mona Alsalamah, Huda
Alwabli, Hutaf Alqwifli, and Dina M Ibrahim. "A Review Study on SQL
Injection Attacks, Prevention, and Detection." The ISC International
Journal of Information Security, vol. 13, no. 3, pp. 1-10, 2021.
Alharbi, Amera, Afnan
Alotaibi, Lujain Alghofaili, Mona Alsalamah, Nora Alwasil, and Salim Elkhediri.
"Security in Social-Media: Awareness of Phishing Attacks Techniques and
Countermeasures." In 2022 2nd International Conference on Computing and
Information Technology (ICCIT), pp. 10-16. IEEE, 2022.
Almogbel, Razan. S.,
& Alkhalifah, Ali. A. (2022). User Behavior in Social Networks Toward
Privacy and Trust: Literature Review. International Journal of Interactive
Mobile Technologies, 16(1).
Alkhudhayr, Fatimah,
Tarek Moulahi, and Abdulatif Alabdulatif. "Evaluation Study of Elliptic
Curve Cryptography Scalar Multiplication on Raspberry Pi4." Evaluation 12,
no. 9 (2021).
Alkhodhairi, Reem K.,
Shahad R. Aljalhami, Norah K. Rusayni, Jowharah F. Alshobaili, Amal A.
Al-Shargabi, and Abdulatif Alabdulatif. "Bitcoin Candlestick Prediction
with Deep Neural Networks Based on Real Time Data." CMC-COMPUTERS
MATERIALS & CONTINUA 68, no. 3 (2021): 3215-3233.
Athar. I. Alboqomi
and Nabeel. Khan, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY
RESEARCH,“Awareness Of Green Computing In KSA : A Pandemic Perspective,” vol.
10, no. 01, pp. 117–121, 2021.
Arwa Albulyhi and
Dina M. Ibrahim, “Diabetes-based Eye Disease Detection Methods using Deep
Learning and GAN Techniques: An Overview,” Journal of Ambient Intelligence and
Humanized Computing (2022) (Accepted)
Norah Alajlan,
Meshael Alyahya, Noorah Alghasham, and Dina M Ibrahim. “Data Enhancement for
Date Fruit Classification Using DCGAN,” The ISC International Journal of
Information Security, vol. 13, no. 3, pp. 39-48, 2021.
Aladhadh, S.;
Alwabli, H.; Moulahi, T.; Al Asqah, M. BChainGuard: A New Framework for
Cyberthreats Detection in Blockchain Using Machine Learning.
Appl.Sci.2022,12,12026. https:// doi.org/10.3390/app122312026
Alsayegh, M.,
Moulahi, T., Alabdulatif, A., & Lorenz, P. (2022). Towards secure
searchable electronic health records using consortium blockchain. Network,
2(2), 239-256.
H. Alrobaish, W. F.
Al-mutairi, H. A. Alsuqayhi and D. M. Ibrahim, "Common Attacks on Near
Field Communication Technology," 2022 2nd International Conference on
Computing and Information Technology (ICCIT), 25-27 Jan. 2022, Tabuk, Saudi
Arabia, pp. 110-114, https://doi.org/10.1109/ICCIT52419.2022.9711657
Norah N. Alajlan, and
Dina M. Ibrahim. 2022. "TinyML: Enabling of Inference Deep Learning Models
on Ultra-Low-Power IoT Edge Devices for AI Applications" Micromachines 13,
no. 6: 851. https://doi.org/10.3390/mi13060851
Halima Hamid N.
Alrashedy, Atheer Fahad Almansour, Dina M. Ibrahim, and Mohammad Ali A.
Hammoudeh. "BrainGAN: Brain MRI Image Generation and Classification
Framework Using GAN Architectures and CNN Models." Sensors 22, no. 11
(2022): 4297. https://doi.org/10.3390/s22114297
Sarah S Alrumiah,
Norah Alrebdi, and Dina M. Ibrahim. "Augmenting healthy brain magnetic
resonance images using generative adversarial networks." PeerJ Computer
Science, 2023 9:e1318 http://doi.org/10.7717/peerj-cs.1318
N. S. Al-Blihed, N. F.
Al-Mufadi, N. T. Al-Harbi, I. A. Al-Omari, and M. A. Al- Hagery, “Blockchain
and machine learning in the internet of things: a review of smart healthcare,”
IAES International Journal of Artificial Intelligence, vol. 12, no. 3, pp.
995–1006, 2023.
Alotaibi, Afnan, and
Murad A. Rassam. ""Adversarial machine learning attacks against
intrusion detection systems: A survey on strategies and defense.""
Future Internet 15.2 (2023): 62.
Aldayri A, Albattah
W. Taxonomy of Anomaly Detection Techniques in Crowd Scenes. Sensors (Basel).
2022 Aug 14;22(16):6080. doi: 10.3390/s22166080. PMID: 36015840; PMCID:
PMC9415874.
Almutairi, A. F., & Alshargabi, A. A. (2022, October). Using Deep Learning Technique to Protect Internet Network from Intrusion in IoT Environment. In 2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA) (pp. 1-6). IEEE.
قسم علوم الحاسب
Maram Almotairi and Fethi Fkih. "Development of a Semantic
Question Answering System for E-learning Environments using Linguistic Resources".
Journal of Education and e-Learning Research, 2022.
Tahani Soud Alharbi, & Fethi Fkih, (2022). “Building and Testing Fine-Grained Dataset of COVID-19 Tweets for Worry Prediction”, International Journal of Advanced Computer Science and Applications, 13,8.
Maram Almotairi & Fethi Fkih. (2021). A Review on Question Answering Systems: Domains, Modules, Techniques and Challenges. 38 IBIMA conference, November 2021, Seville, Spainز
Alresheedi, Abdulatif Aoihan, and Mohammed Abdullah Al-Hagery. "Forecasting the global horizontal irradiance based on boruta algorithm and artificial neural networks using a lower cost." International Journal of Advanced Computer Science and Applications 11.9 (2020).
Raed Muhammad Albadrani , Mohammed Abdullah Al-Hagery , Mohamed Tahar Ben Othman, “A Proposed Clustering Technique for Arabic Text Summarization”, International Journal of Science and Research (IJSR), Volume 11 Issue 10, October 2022, p. 424-427 , DOI:10.21275/SR221009042717ز
K. Alamer and A. Aldribi, "Intrusion Classification for Cloud Computing Network: A Step Towards an Intelligent Classification System," 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 2022, pp. 757-764, doi: 10.1109/CICN56167.2022.10008346.
قسم هندسة الحاسب
S. Abdel-Hafeez and A. Alqunaysi, “Threshold Analysis on 2-bit LSB
Steganography (R, G, B) Color Image”, 5th International Conference on Computer
Applications and Information Security (ICCAIS’ 2022), Elsevier, Tunisia, Feb.
2022.
A. Amutairi and A. Alshoshan, “Developing a Webpage Phishing
Attack Detection Tool”, Proceedings of the 2022 Computing Conference, Intelligent
Computing, Springer Nature, July 2022.
T. Alshamri, M. Albakheet, and I. Kateeb, “Survey on radio
Frequency Identification Security and Attacks”, ICFNDS 2021, ACM, UAE, May
2021.
T. Alsuwaidani, “The security Challenges in Healthcare Cloud
Computing”, International Journal of Computer Science and Network Security
(IJSNS), Vol. 22, No. 3, March 2022.
A. Hajjisaaid and Y. Ahmed, “Secure Electronic Banking
Authentication –Survey”, International Conference on Computing and Information
Technology, Saudi Arabia, Sept. 2020.
Y. Aljumah and S. Sohail, “A Novel Approach to Get Awareness in
Saudi Arabia Regarding Phishing Attacks”, International Conference on
Electrical, Communication, and Computer Engineering (ICECCE 2021), IEEE,
Malaysia, Aug. 2021.