- Information and Cyber Security
- Software Engineering Techniques and Practices
- IoT and Edge/Fog Computing
- Entrepreneurship Studies and Influences
- Service and Product Innovation
- Biometric Identification and Security
- Traffic Prediction and Management Techniques
- Advanced Malware Detection Techniques
- Digital and Cyber Forensics
- Vehicular Ad Hoc Networks (VANETs)
- Digital Media Forensic Detection
- Adversarial Robustness in Machine Learning
- Information Technology Governance and Strategy
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Blockchain Technology Applications and Security
- Big Data and Business Intelligence
- Cloud Computing and Resource Management
- Online Learning and Analytics
- Impact of Light on Environment and Health
- Big Data Technologies and Applications
- Technology Adoption and User Behaviour
- Energy Load and Power Forecasting
- Digital Transformation in Industry
- Advanced Authentication Protocols Security
Imam Abdulrahman Bin Faisal University
2022-2025
King Fahd University of Petroleum and Minerals
2020-2024
Introduction Urban power load forecasting is essential for smart grid planning but hindered by data imbalance issues. Traditional single-model approaches fail to address this effectively, while multi-model methods mitigate splitting datasets incur high costs and risk losing shared distribution characteristics. Methods A lightweight urban model (DLUPLF) proposed, enhancing LSTM networks with contrastive loss in short-term sampling, a difference compensation mechanism, feature extraction layer...
ABSTRACT With the rapid development of intelligent transportation systems presents significant opportunities for vehicular ad hoc networks (VANETs) present themselves; yet, these also encounter numerous security challenges. In order to maintain road safety and traffic efficiency, information is usually shared through communication between vehicle nodes or roadside units (RSUs). Vehicle nodes, RSUs, trusted authorities (TAs) constitute majority VANETs. An approach hybrid trust management that...
In the rapidly evolving field of healthcare 5.0, Internet Medical Things (IoMT) is expected to be an enabler that allows smart medical devices collaborate and communicate with networks speed up procedures, enhance care, improve disease management. However, one critical issues for these still remains secure energy-efficient transmission sensitive patient data. Thus, a novel security framework proposed in this work, which Public Key Infrastructure- Energy-Efficient Routing Protocol (PKI-EERP)...
Abstract Context Organizations constantly strive to protect their assets from outsider attacks by implementing various security controls, such as data encryption algorithms, intrusion detection software, firewalls, and antivirus programs. Unfortunately, attackers strike not only outside the organization but also within. Such internal are called insider or threats, people responsible for them threat agents. Insider pose more significant risks can result in greater organizational losses than...
Many businesses are going through digital business transformation (DBT) in order to keep ahead of market, optimize customer experience, and reach targets. The process is complex as it involves multiple key elements such stakeholders, objectives, technology, strategies. In addition, all specific temporary goals, models have be aligned with the goals DBT. One risks organizations face during focusing on short-term solutions failing consider their impacts core goals. this study, we propose a...
Organizations constantly strive to protect their assets from outsider attacks by implementing security controls, such as data encryption algorithms, and antivirus programs. Unfortunately, attackers strike not only outside the organization but also within. Such internal are called insider or threats, people responsible for them attackers. Insider pose greater risks can result in losses organizations than attacks. Thus, every should be vigilant regarding its valuable resources harm. Finding...
research-article Share on Challenges of Secure Software Deployment: An Empirical Study Authors: Azzah A. Alghamdi King Fahd University Petroleum and Minerals, SA Imam Abdulrahman Bin Faisal University, Saudi Arabia ArabiaView Profile , Mahmood Niazi SAView Authors Info & Claims EASE '22: Proceedings the International Conference Evaluation Assessment in Engineering 2022June 2022 Pages 440–445https://doi.org/10.1145/3530019.3531337Online:13 June 2022Publication History...
Software deployment is the last stage of software development life cycle (SDLC). It includes execution in a customer environment. Nowadays, security has been integrated with SDLC stages to produce secure software, improve quality, and increase satisfaction. However, become complex recent environments, putting more pressure on securely deploying these environments. This work extends our previous study published [11], which we have identified list best practices address challenges.