ACC_TEST: Hybrid Testing Approach for OpenACC-Based Programs

Fathy Elbouraey Eassa , Ahmed Mohammed Alghamdi , Seif Haridi , Maher Ali Khemakhem
IEEE Access 8 80358 -80368

1
2020
Replication‐aware secure resource administration scheme for Internet of Things‐smart city applications

Eesa Al Solami
transactions on emerging telecommunications technologies 32 ( 3)

2021
A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes

Amer Awad Alzaidi , Musheer Ahmad , M. N. Doja , Eesa Al Solami
IEEE Access 6 55405 -55418

29
2018
Continuous Biometric Authentication: Can It Be More Practical?

Eesa Al Solami , Colin Boyd , Andrew Clark , Asadul K Islam
high performance computing and communications 647 -652

17
2010
Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map

Amer Awad Alzaidi , Musheer Ahmad , Hussam S. Ahmed , Eesa Al Solami
Complexity 2018 1 -16

28
2018
Fingerprinting of Relational Databases for Stopping the Data Theft

Eesa Al Solami , Muhammad Kamran , Mohammed Saeed Alkatheiri , Fouzia Rafiq
Electronics 9 ( 7) 1093

1
2020
User-representative feature selection for keystroke dynamics

Eesa Al Solami , Colin Boyd , Andrew Clark , Irfan Ahmed
network and system security 229 -233

17
2011
A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes.

Eesa Al Solami , Musheer Ahmad , Christos Volos , Mohammad Najam Doja
Entropy 20 ( 7) 525

32
2018
A novel database watermarking technique using blockchain as trusted third party

Ahmed S Alghamdi , Surayya Naz , Ammar Saeed , Eesa Al Solami
Computers, Material and Continua (CMC) 70 ( 1) 1585 -1601

2022
User-independent threshold for continuous user authentication with keystroke dynamics'

Eesa Al Solami , Colin Boyd , Irfan Ahmed , Richi Nayak
Int. Conf. on Network and System Security 3 ( 3) 1 -9

2
2012
Cooperative caching scheme for machine-to-machine information-centric IoT networks

Satish Anamalamudi , Mohammed Saeed Alkatheiri , Eesa Al Solami , Abdur Rashid Sangi
IEEE Canadian journal of electrical and computer engineering 44 ( 2) 228 -237

14
2021
Fake News Detection Using Machine Learning and Deep Learning Methods

Ammar Saeed , Eesa Al Solami
CMC-COMPUTERS MATERIALS & CONTINUA 77 ( 2) 2079 -2096

1
2023
Biometric issues in contemporary organization

Eesa Al Solami
International Journal of Computer Science and Information Security 14 ( 9) 873 -873

2016
New Survey on Cyberstalking Victimization Using Routine Activities and Lifestyle Exposure Theories

Waheeb. Abu-Ulbeh , Eesa ALsolami
Solid State Technology 64 ( 2) 268 -279

2021
Cyberstalking Victimization Model Using Two Domains of Criminological Theory

Waheeb Abu-Ulbeh , Eesa ALsolami
Solid State Technology 63 ( 5) 9841 -9852

2020
Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures

Musheer Ahmad , Eesa Al-Solami , Ahmed Mohammed Alghamdi , Muhammad Awais Yousaf
IEEE Access 8 110397 -110411

43
2020
20
2020