- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- User Authentication and Security Systems
- Cloud Computing and Resource Management
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Advanced Steganography and Watermarking Techniques
- Advanced Authentication Protocols Security
- Internet of Things and AI
- IoT Networks and Protocols
- Information and Cyber Security
- Smart Grid Security and Resilience
- Cybercrime and Law Enforcement Studies
- Big Data and Business Intelligence
- Adversarial Robustness in Machine Learning
- Caching and Content Delivery
- Security and Verification in Computing
- Biometric Identification and Security
- Digital and Cyber Forensics
- Digital Mental Health Interventions
Qassim University
2015-2025
Buraydah Colleges
2022-2025
RMIT University
2013-2019
MIT University
2016-2018
The vast development of the Internet Things (IoT) and cloud-enabled data processing solutions provide opportunity to build novel fascinating smart, connected healthcare systems. Smart systems analyze IoT-generated patient both enhance quality care reduce costs. A major challenge for these is how Cloud can handle generated from billions IoT devices. Edge computing infrastructure offers a promising solution by operating as middle layer between devices cloud computing. (EoT) offer small-scale...
A smart device carries a great amount of sensitive patient data as it offers innovative and enhanced functionalities in the healthcare system. Moreover, components systems are interconnected via Internet, bringing significant changes to delivery services individuals. However, easy access applications has given rise severe risks vulnerabilities that hamper performance large number heterogeneous devices accumulate vary terms size formats, making challenging manage repository secure from...
It is extremely difficult to track down the original source of sensitive data from a variety sources in cloud during transit and processing. For instance, provenance, which records origins data, record usage, update processing can be introduced trace malicious vulnerabilities. Thus, provenance process makes it easy monitor causes any problems computing. However, one most prominent drawbacks storage. Despite many studies, full assessment forensics still missing literature, especially wireless...
Abstract Artificial intelligence (AI) techniques implemented at a large scale in intelligent transport systems (ITS), have considerably enhanced the vehicles' autonomous behaviour making independent decisions about cyber threats, attacks, and faults. While, AI are based on data sharing among vehicles, it is important to note that sensitive cannot be shared. Thus, federated learning (FL) has been protect privacy vehicles. On other hand, integrity of safety aggregation ensured by using...
Owing to its capability offer remote services, the Internet of Things (IoT) has immersed itself in all areas our daily lives. However, this big use IoT networks makes user’s data change insecurely open channels vulnerable malicious use. As a result, security an environment becomes critical issue. Given that authentication is mechanism may prevent hackers from retrieving and exploiting communicated between devices, researchers have proposed many lightweight schemes last decades. most these...
Cloud-integrated Internet of Things (IoT) is emerging as the next-generation service platform that enables smart functionality worldwide. IoT applications such grid and power systems, e-health, body monitoring along with large-scale environmental industrial are increasingly generating large amounts data can conveniently be analyzed through cloud provisioning. However, nature these mandates use secure privacy-preserving implementation services ensures integrity without any unwarranted...
Cloud-based electronic health record (EHR) systems are next-generation big data for facilitating efficient and scalable storage fostering collaborative care, clinical research, development. Mobility the use of multiple mobile devices in healthcare increases need robust privacy preservation. Thus, large-scale EHR require secure access to privacy-sensitive data, storage, management. The authors provide a comprehensive solution with cryptographic role-based technique distribute session keys...
Abstract Central management of electronic medical systems faces a major challenge because it requires trust in single entity that cannot effectively protect files from unauthorized access or attacks. This makes difficult to provide some services central systems, such as file search and verification, although they are needed. gap motivated us develop system based on blockchain has several characteristics: decentralization, security, anonymity, immutability, tamper-proof. The proposed provides...
Pervasive healthcare services with smart decision making capability and ubiquitous communication technologies can forge future communities. Real-time health surveillance for early detection of life-threatening diseases through advanced sensing technology provide better treatment, reduce medical expenses save lives community residents (i.e., patients). However, the assurance data privacy is prime concern such technologies. This research aims to describe a privacy-preserving cloud-based system...
There are significant data privacy implications associated with Electronic Health Records (EHRs) sharing among various untrusted healthcare entities. Recently, a blockchain-based EHRs system has provided many benefits. Decentralization, anonymity, unforgeability, and verifiability all unique properties of blockchain technology. In this paper, we propose secure, EHR system. After receiving the owner’s authorization, requester can use provider’s keyword search to discover relevant on...
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 healthcare.With the exponential growth of Internet Things usage in our world, IoT security is still biggest challenge for its deployment.The main goal ensure accessibility services provided by an environment, protect privacy, confidentiality, guarantee safety users, infrastructures, data, devices.Authentication, as first line defense against threats, becomes priority everyone.It can...
Internet of Things (IoT) refers to the infrastructures that connect smart devices Internet, operating autonomously. This connectivity makes it possible harvest vast quantities data, creating new opportunities for... | Find, read and cite all research you need on Tech Science Press
ABSTRACT Machine learning (ML) and deep (DL) models have become vital tools in Intrusion Detection Systems (IDS), yet their effectiveness depends heavily on the quality distribution of training data. This study investigates impact dataset size balance performance ML DL using CIC‐IDS 2017 dataset. Five subsets (20%, 40%, 60%, 80%, 100% dataset) were created to assess across varying sizes. Four models, including Random Forest (RF), Artificial Neural Network, Convolutional Network (CNN),...
ABSTRACT The healthcare sector is rapidly evolving due to increasing recognition of global needs. With these developments, new medical technologies are emerging, and issues actively delivered with a focus on patient empowerment. Telesurgery an important advancement in support. Challenges such as data security, connectivity delays, etc., resourced but limited areas require robust security measures innovative solutions. This article proposed secure framework for telesurgery systems that...
Online social networks (OSNs) have become an integral part of daily life, with platforms such as X (formerly Twitter) being among the most popular in Middle East. However, faces problem widespread hate speech aimed at spreading hostility between communities, especially Arabic-speaking users. This is exacerbated by lack effective tools for processing Arabic content and complexity language, including its diverse grammar dialects. study developed a two-layer framework to detect classify using...
Over the last few years, there has been a great interest in Internet of Things (IoT). This is mainly because IoT interacts directly with people's everyday lives critical applications, such as smart homes and healthcare applications. devices typically have resource-constrained architecture, rendering them vulnerable to cyberattacks. Accordingly, stored data need be secured through lightweight energy-efficient security solutions, which identified main challenge facing adoption systems. To...