default search action
Mohammed Y. Aalsalem
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Mohammed Y. Aalsalem:
Mathematically Engineered Adams Optimizer for Energy Efficient and Optimal Routing Approach for the Wireless Sensor Network. Int. J. Commun. Networks Inf. Secur. 15(3): 180-194 (2023) - 2021
- [j15]Faisal Azam, Akash Rizvi, Wazir Zada Khan, Mohammed Y. Aalsalem, Heejung Yu, Yousaf Bin Zikria:
Aircraft Classification Based on PCA and Feature Fusion Techniques in Convolutional Neural Network. IEEE Access 9: 161683-161694 (2021) - 2020
- [j14]Omaji Samuel, Nadeem Javaid, Adia Khalid, Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khalil Afzal, Byung-Seo Kim:
Towards Real-Time Energy Management of Multi-Microgrid Using a Deep Convolution Neural Network and Cooperative Game Approach. IEEE Access 8: 161377-161395 (2020) - [j13]Adamu Sani Yahaya, Nadeem Javaid, Muhammad Umar Javed, Muhammad Shafiq, Wazir Zada Khan, Mohammed Y. Aalsalem:
Blockchain-Based Energy Trading and Load Balancing Using Contract Theory and Reputation in a Smart Community. IEEE Access 8: 222168-222186 (2020)
2010 – 2019
- 2019
- [j12]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan, Quratul-Ain Arshad:
Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things. IEEE Consumer Electron. Mag. 8(2): 35-38 (2019) - [j11]Yousaf Bin Zikria, Sung Won Kim, Oliver Hahm, Muhammad Khalil Afzal, Mohammed Y. Aalsalem:
Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution. Sensors 19(8): 1793 (2019) - [j10]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan:
Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy. IEEE Trans. Consumer Electron. 65(1): 64-72 (2019) - [c13]Syeda Aimal, Nadeem Javaid, Tahir Islam, Wazir Zada Khan, Mohammed Y. Aalsalem, Hassan Sajjad:
An Efficient CNN and KNN Data Analytics for Electricity Load Forecasting in the Smart Grid. AINA Workshops 2019: 592-603 - [c12]Aisha Fatima, Nadeem Javaid, Tanzeela Sultana, Mohammed Y. Aalsalem, Shaista Shabbir, Durr-e-Adan:
An Efficient Virtual Machine Placement via Bin Packing in Cloud Data Centers. AINA 2019: 977-987 - 2018
- [j9]Mohammed Y. Aalsalem, Wazir Zada Khan, Wajeb Gharibi, Muhammad Khurram Khan, Quratul-Ain Arshad:
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges. J. Netw. Comput. Appl. 113: 87-97 (2018) - [j8]Nadeem Javaid, Abdul Majid, Arshad Sher, Wazir Zada Khan, Mohammed Y. Aalsalem:
Avoiding Void Holes and Collisions with Reliable and Interference-Aware Routing in Underwater WSNs. Sensors 18(9): 3038 (2018) - [j7]Arshad Sher, Aasma Khan, Nadeem Javaid, Syed Hassan Ahmed, Mohammed Y. Aalsalem, Wazir Zada Khan:
Void Hole Avoidance for Reliable Data Delivery in IoT Enabled Underwater Wireless Sensor Networks. Sensors 18(10): 3271 (2018) - [c11]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan:
Five acts of consumer behavior: A potential security and privacy threat to Internet of Things. ICCE 2018: 1-3 - [i4]Wazir Zada Khan, Mohammed Zahid, Mohammed Y. Aalsalem, Hussein Mohammed Zangoti, Quratul-Ain Arshad:
Ethical Aspects of Internet of Things from Islamic Perspective. CoRR abs/1806.11386 (2018) - 2017
- [j6]Wazir Zada Khan, Mohammed Y. Aalsalem, Muhammad Khurram Khan, Quratul-Ain Arshad:
When social objects collaborate: Concepts, processing elements, attacks and challenges. Comput. Electr. Eng. 58: 397-411 (2017) - [c10]Shakeel Ahmed, Ibrahim Ahmed Ghashem, Mohammed Y. Aalsalem, Wazir Zada Khan:
Thin Client Technology for Higher Education at Universities of Saudi Arabia: Implementation, Challenges and Lesson Learned. ICCA 2017: 195-199 - 2016
- [j5]Wazir Zada Khan, Md. Shohrab Hossain, Mohammed Y. Aalsalem, Naufal M. Saad, Mohammed Atiquzzaman:
A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs. J. Netw. Comput. Appl. 63: 68-85 (2016) - 2015
- [j4]Wazir Zada Khan, Muhammad Khurram Khan, Fahad T. Bin Muhaya, Mohammed Y. Aalsalem, Han-Chieh Chao:
A Comprehensive Study of Email Spam Botnet Detection. IEEE Commun. Surv. Tutorials 17(4): 2271-2295 (2015) - 2014
- [c9]Wazir Zada Khan, Mohamad Naufal bin Mohamad Saad, Mohammed Y. Aalsalem, Yang Xiang:
Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division. APCCAS 2014: 559-562 - [c8]Wazir Zada Khan, Mohammed Y. Aalsalem, Mohamad Naufal bin Mohamad Saad, Yang Xiang, Tom H. Luan:
Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. WCNC 2014: 2623-2628 - 2013
- [j3]Wazir Zada Khan, Yang Xiang, Mohammed Y. Aalsalem, Quratul-Ain Arshad:
Mobile Phone Sensing Systems: A Survey. IEEE Commun. Surv. Tutorials 15(1): 402-427 (2013) - [j2]Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, Yang Xiang:
Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Wazir Zada Khan, Mohamad Naufal bin Mohamad Saad, Mohammed Y. Aalsalem:
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks. Int. J. Grid Util. Comput. 4(2/3): 119-127 (2013) - [c7]Wazir Zada Khan, Mohammed Y. Aalsalem, Mohamad Naufal bin Mohamad Saad:
Secure & robust RED (SR-RED). ICT 2013: 1-5 - 2012
- [i3]Mohammed Y. Aalsalem, Wazir Zada Khan, Quratul-Ain Arshad:
A Low Cost Vision Based Hybrid Fiducial Mark Tracking Technique for Mobile Industrial Robots. CoRR abs/1210.0153 (2012) - 2011
- [c6]Wazir Zada Khan, Yang Xiang, Mohammed Y. Aalsalem, Quratul-Ain Arshad:
A Hybrid Graphical Password Based System. ICA3PP (2) 2011: 153-164 - [c5]Khaled Almiani, Mohammed Y. Aalsalem, Rafeeq Al-Hashemi:
Data Gathering for Periodic Sensor Applications. PDCAT 2011: 215-220 - [c4]Khaled Almiani, Anastasios Viglas, Mohammed Y. Aalsalem:
Mobile Element Path Planning for Gathering Transit-Time Constrained Data. PDCAT 2011: 221-226 - [c3]Mohammed Y. Aalsalem:
Mobile-Element Data Gathering Scheme. PDCAT 2011: 227-230 - [i2]Wazir Zada Khan, Mohammed Y. Aalsalem, Quratul-Ain Arshad:
The Aware Cricket Ground. CoRR abs/1109.6199 (2011) - [i1]Wazir Zada Khan, Mohammed Y. Aalsalem, Yang Xiang:
A Graphical Password Based System for Small Mobile Devices. CoRR abs/1110.3844 (2011) - 2010
- [c2]Mohammed Y. Aalsalem, Javid Taheri, Albert Y. Zomaya:
A framework for real time communication in sensor networks. AICCSA 2010: 1-7
2000 – 2009
- 2008
- [c1]Mohammed Y. Aalsalem, Javid Taheri, Mohsin Iftikhar, Albert Y. Zomaya:
Providing QoS guarantees to multiple classes of traffic in wireless sensor networks. AICCSA 2008: 216-222
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint