- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- E-commerce and Technology Innovations
- Internet Traffic Analysis and Secure E-voting
- Access Control and Trust
- IoT and Edge/Fog Computing
- COVID-19 Digital Contact Tracing
- Vehicle Routing Optimization Methods
- Cloud Data Security Solutions
- Genomics and Phylogenetic Studies
- Network Security and Intrusion Detection
- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- UAV Applications and Optimization
- Wireless Signal Modulation Classification
- Machine Learning in Bioinformatics
- Transportation and Mobility Innovations
- Software-Defined Networks and 5G
- Optimization and Packing Problems
- Security and Verification in Computing
- Advanced Manufacturing and Logistics Optimization
- Security in Wireless Sensor Networks
- Privacy, Security, and Data Protection
- RNA and protein synthesis mechanisms
University of Jeddah
2017-2024
Information Technology University
2023
Western Michigan University
2017-2019
Private networks have become popular for secure data sharing and anonymous communication in many domains: enterprise environments, military, journalism, telecommunication, healthcare, to name a few. It has been used with or without internet connection. Its primary purpose is provide confidentiality, bypass unlawful activities, protect against common threats such as interception, modification, censorship. In addition, several private network technologies exist support communications. However,...
DNA-binding proteins (DBPs) have crucial biotic activities including DNA replication, recombination, and transcription. DBPs are highly concerned with chronic diseases used in the manufacturing of antibiotics steroids. A series predictors were established to identify DBPs. However, researchers still working further enhance identification This research designed a novel predictor more accurately. The features from sequences transformed by F-PSSM (Filtered position-specific scoring matrix),...
Protection of data in cloud computing is a critical problem for many enterprises. We propose solution that protects sensitive outsourced to throughout their entire life cycle—both the as well outside (e.g., during transmission or from cloud). Our solution, known Active Data Bundles using Secure Multi-Party Computation (ADB-SMC), uses: (i) active bundles (ADBs)—for self-protecting data; (ii) ciphertext-policy attribute-based encryption—for fine-grained access control; and, (iii) threshold...
Unmanned aerial vehicle (UAV) is steadily growing as a promising technology for next-generation communication systems due to their appealing features such wide coverage with high altitude, on-demand low-cost deployment, and fast responses. UAV communications are fundamentally different from the conventional terrestrial satellite owing mobility unique channel characteristics of air-ground links. However, obtaining effective state information (CSI) challenging because dynamic propagation...
The sending and exchanging of data have become essential in the current revolution industry 4.0 digital transformation all aspects life. Ensuring security transmitted continues to be a critical issue due fast advancement technology. studied problem is proven NP-hard strong sense. contribution this paper twofold. First, we propose network architecture that enables multilevel sharing through two routers based on category classification constraint. Second, set heuristic algorithms for an...
The integration of advanced technologies such as artificial intelligence, the Internet Things, and location-tracking has revolutionized our daily lives by enhancing functionality logistical services. However, these advancements have also placed significant pressure on current supply networks impeded further growth within logistics industry. This article presents an inventive logistic chain solution utilizing drone-based delivery to tackle issues. proposed goal is minimize maximum amount time...
The management of sensitive data, including identity (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal creating efficient robust IDM solution that addresses critical issues computing. proposed scheme does not rely on trusted third parties (TTPs) or dealers. a multiparty interactive combines RSA distributed key generation attribute-based encryption. We believe it will be privacy-preserving because has the...
The Interconnected Network or the Internet has revolutionized digital communications. It expanded worldwide over past four decades due to numerous features such as connectivity, transparency, hierarchy, and openness. Several drawbacks, including mobility, scalability, controllability, security, etc., have been presented continuous developments. Although several network paradigms exist address many issues still persist. This research proposed a future paradigm that addresses multilevel...
Sensitive data, such as financial, personal, or classified governmental information, must be protected throughout its cycle. This paper studies the problem of safeguarding transmitted data based on categorization techniques. research aims to use a novel routine new meta-heuristic enhance based-traffic classification technique where private is into multiple confidential levels. As result, two packets belonging same confidentiality level cannot through routers simultaneously, ensuring high...
The aim of this article is to identify a range changes and challenges that present-day technologies often present contemporary societies, particularly in the context smart city logistics, especially during crises. For example, long-term consequences COVID-19 pandemic, such as life losses, economic damages, privacy security violations, demonstrate extent which existing designs deployments technological means are inadequate. proposes privacy-preserving, decentralized, secure protocol safeguard...
Logistics and sourcing management are core in any supply chain operation among the critical challenges facing economy. The specialists classify transport operations warehouse as two of biggest costliest logistics operations. Therefore, an effective system is a legend to success timely delivery products reduction operational costs. proposed scheme aims discuss truck unloading problems. It focuses on cases where number warehouses limited, trucks time need be manageable or unknown. contribution...
Communication networks have played a vital role in changing people's life. However, the rapid advancement digital technologies has presented many drawbacks of current inter-networking technology. Data leakages severely threaten information privacy and security can jeopardize individual public This research investigates creation private network model that decrease number data leakages. A two-router is designed. uses two routers to manage classification level transmitting packets. In addition,...
In this paper, we mean by digital health passport a or immunity that stores information about an individual's personal data, status, travel history, conditions, and medical drug records. The proposed innovative scheme can ease travel, ensure free movement, minimize economic damages. However, protecting during crisis is challenging. Therefore, paper aims to propose agent-based secure decentralized protocol interoperable, fault-tolerant, compatible with privacy standards. solution known as...