default search action
Ali H. Al-Bayatti
Person information
- affiliation: De Monfort University, Leicester, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Mishri Saleh AlMarshoud, Mehmet Sabir Kiraz, Ali H. Al-Bayatti:
Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions. ACM Comput. Surv. 56(10): 260 (2024) - [j25]Mustafa Ibrahim Alnajjar, Mehmet Sabir Kiraz, Ali H. Al-Bayatti, Süleyman Kardas:
Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption. EURASIP J. Wirel. Commun. Netw. 2024(1): 62 (2024) - [j24]Haitham Y. Adarbah, Mehmet Sabir Kiraz, Süleyman Kardas, Ali H. Al-Bayatti, Hilal M. Y. Al-Bayatti:
A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs. Future Internet 16(9): 328 (2024) - [i2]Adebamigbe Fasanmade, Ali H. Al-Bayatti, Jarrad Neil Morden, Fabio Caraffini:
Context-Aware Quantitative Risk Assessment Machine Learning Model for Drivers Distraction. CoRR abs/2402.13421 (2024) - 2023
- [j23]Jarrad Neil Morden, Fabio Caraffini, Ioannis Kypraios, Ali H. Al-Bayatti, Richard Smith:
Driving in the Rain: A Survey toward Visibility Estimation through Windshields. Int. J. Intell. Syst. 2023: 1-26 (2023) - [j22]Abdul Rehman Javed, Mirza Omer Beg, Muhammad Asim, Thar Baker, Ali Hilal Al-Bayatti:
AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes. J. Ambient Intell. Humaniz. Comput. 14(5): 4869-4882 (2023) - [j21]Siham Hasan, Meisam Sharifi Sani, Saeid Iranmanesh, Ali H. Al-Bayatti, Sarmad Ullah Khan, Raad Raad:
Enhanced Message Replication Technique for DTN Routing Protocols. Sensors 23(2): 922 (2023) - [j20]Abdulghani Ali Ahmed, Ali H. Al-Bayatti, Mubarak Saif, Waheb A. Jabbar, Taha H. Rassem:
A Honeybee-Inspired Framework for a Smart City Free of Internet Scams. Sensors 23(9): 4284 (2023) - 2022
- [j19]Ahmed S. Alfakeeh, Ali H. Al-Bayatti, François Siewe, Thar Baker:
Agent-based negotiation approach for feature interactions in smart home systems using calculus of the context-aware ambient. Trans. Emerg. Telecommun. Technol. 33(2) (2022) - [j18]Mishri Saleh AlMarshoud, Ali H. Al-Bayatti, Mehmet Sabir Kiraz:
Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures. Veh. Commun. 36: 100490 (2022) - 2021
- [j17]Naveed Jan, Sarmad Ullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammed A. Alqarni:
C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN. Wirel. Commun. Mob. Comput. 2021: 9912626:1-9912626:17 (2021) - [c8]Christina Obermaier, Raphael Riebl, Christian Facchi, Ali H. Al-Bayatti, Sarmad Ullah Khan:
COSIDIA: An Approach for Real-Time Parallel Discrete Event Simulations Tailored for Wireless Networks. SIGSIM-PADS 2021: 165-171 - 2020
- [j16]Mhd Saeed Sharif, Maysam Abbod, Ali H. Al-Bayatti, Abbes Amira, Ahmed S. Alfakeeh, Bal Sanghera:
An Accurate Ensemble Classifier for Medical Volume Analysis: Phantom and Clinical PET Study. IEEE Access 8: 37482-37494 (2020) - [j15]Adebamigbe Fasanmade, Ying He, Ali H. Al-Bayatti, Jarrad Neil Morden, Suleiman Onimisi Aliyu, Ahmed S. Alfakeeh, Alhuseen Omar Alsayed:
A Fuzzy-Logic Approach to Dynamic Bayesian Severity Level Classification of Driver Distraction Using Image Recognition. IEEE Access 8: 95197-95207 (2020) - [j14]Ioannis Vourgidis, Leandros Maglaras, Ahmed S. Alfakeeh, Ali H. Al-Bayatti, Mohamed Amine Ferrag:
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems. Sensors 20(4): 997 (2020) - [j13]Ahmed S. Alfakeeh, Sarmad Ullah Khan, Ali H. Al-Bayatti:
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures. Sensors 20(6): 1581 (2020) - [j12]Madhav Raj Theeng Tamang, Mhd Saeed Sharif, Ali H. Al-Bayatti, Ahmed S. Alfakeeh, Alhuseen Omar Alsayed:
A Machine-Learning-Based Approach to Predict the Health Impacts of Commuting in Large Cities: Case Study of London. Symmetry 12(5): 866 (2020) - [j11]Rasha Hafidh, Mhd Saeed Sharif, Ali H. Al-Bayatti, Ahmed S. Alfakeeh, Madini O. Alassafi, Mohammed A. Alqarni:
An Effective Knowledge-Based Modeling Approach towards a "Smart-School Care Coordination System" for Children and Young People with Special Educational Needs and Disabilities. Symmetry 12(9): 1495 (2020) - [c7]Dawei Liu, Ali H. Al-Bayatti, Wei Wang:
Poster: An Improvement on Distance based Positioning on Network Edges. SEC 2020: 173-174
2010 – 2019
- 2019
- [j10]Sarmad Ullah Khan, Ahmed Ibrahim Alzahrani, Osama Alfarraj, Nasser Alalwan, Ali H. Al-Bayatti:
Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices. IEEE Access 7: 170615-170628 (2019) - [j9]Naveed Jan, Ali H. Al-Bayatti, Nasser Alalwan, Ahmed Ibrahim Alzahrani:
An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP). Sensors 19(9): 2050 (2019) - [j8]Solomon H. Ebenuwa, Mhd Saeed Sharif, Ameer Al-Nemrat, Ali H. Al-Bayatti, Nasser Alalwan, Ahmed Ibrahim Alzahrani, Osama Alfarraj:
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All. Symmetry 11(12): 1504 (2019) - [j7]Hani Alquhayz, Nasser Alalwan, Ahmed Ibrahim Alzahrani, Ali H. Al-Bayatti, Mhd Saeed Sharif:
Policy-Based Security Management System for 5G Heterogeneous Networks. Wirel. Commun. Mob. Comput. 2019: 4582391:1-4582391:14 (2019) - [c6]Christina Obermaier, Raphael Riebl, Christian Facchi, Ali H. Al-Bayatti, Sarmad Ullah Khan:
Limitations of HIL Test Architectures for Car2X Communication Devices and Applications. CSCS 2019: 3:1-3:9 - 2017
- [j6]Khaled Alodadi, Ali H. Al-Bayatti, Nasser Alalwan:
Cooperative volunteer protocol to detect non-line of sight nodes in vehicular ad hoc networks. Veh. Commun. 9: 72-82 (2017) - 2016
- [j5]Leandros A. Maglaras, Ali H. Al-Bayatti, Ying He, Isabel Wagner, Helge Janicke:
Social Internet of Vehicles for Smart Cities. J. Sens. Actuator Networks 5(1): 3 (2016) - [c5]Thomas Speth, Raphael Riebl, Thomas Brandmeier, Christian Facchi, Ali H. Al-Bayatti, Ulrich Jumar:
Enhanced Inter-Vehicular relative positioning. ITSC 2016: 867-872 - 2014
- [j4]Laila Alhimale, Hussein Zedan, Ali H. Al-Bayatti:
The implementation of an intelligent and video-based fall detection system using a neural network. Appl. Soft Comput. 18: 59-69 (2014) - [j3]Saif Jamal Al-Sultan, Moath M. Al-Doori, Ali H. Al-Bayatti, Hussein Zedan:
A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 37: 380-392 (2014) - 2013
- [j2]Saif Jamal Al-Sultan, Ali H. Al-Bayatti, Hussein Zedan:
Context-Aware Driver Behavior Detection System in Intelligent Transportation Systems. IEEE Trans. Veh. Technol. 62(9): 4264-4275 (2013) - [c4]Tareq Binjammaz, Ali H. Al-Bayatti, Ashwaq Al-Hargan:
GPS integrity monitoring for an intelligent transport system. WPNC 2013: 1-6 - 2012
- [c3]Mafawez T. Alharbi, Amelia Platt, Ali H. Al-Bayatti:
Context-aware Personal Learning Environment. ICITST 2012: 692-697 - [i1]Hamza Aldabbas, Tariq Falah Alwada'n, Helge Janicke, Ali H. Al-Bayatti:
Data Confidentiality in Mobile Ad hoc Networks. CoRR abs/1203.1749 (2012) - 2010
- [j1]Ali H. Al-Bayatti, Hussein Zedan, Antonio Cau, François Siewe:
Security Management for Mobile Ad Hoc Network of Networks (MANoN). Int. J. Mob. Comput. Multim. Commun. 2(1): 1-19 (2010) - [c2]Moath Muayad Al-Doori, Ali Hilal Al-Bayatti, Hussein Zedan:
Context aware architecture for sending adaptive HELLO messages in VANET. CASEMANS@Ubicomp 2010: 65-68
2000 – 2009
- 2009
- [b1]Ali H. Al-Bayatti:
Security management for mobile ad hoc network of networks (MANoN). De Montfort University, Leicester, UK, 2009 - [c1]Ali H. Al-Bayatti, Hussein Zedan, Antonio Cau:
Security Solution for Mobile Ad Hoc Network of Networks (MANoN). ICNS 2009: 255-262
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint