Follow
College of Information Technology - UAEU
College of Information Technology - UAEU
UAEU
No verified email
Title
Cited by
Cited by
Year
Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges
H Shakhatreh, AH Sawalmeh, A Al-Fuqaha, Z Dou, E Almaita, I Khalil, ...
Ieee Access 7, 48572-48634, 2019
18802019
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
A Fahad, N Alshatri, Z Tari, A Alamri, I Khalil, AY Zomaya, S Foufou, ...
IEEE transactions on emerging topics in computing 2 (3), 267-279, 2014
12452014
Applications of big data to smart cities
E Al Nuaimi, H Al Neyadi, N Mohamed, J Al-Jaroodi
Journal of Internet Services and Applications 6, 1-15, 2015
12032015
Optimal deep learning lstm model for electric load forecasting using feature selection and genetic algorithm: Comparison with machine learning approaches
S Bouktif, A Fiaz, A Ouni, MA Serhani
Energies 11 (7), 1636, 2018
7982018
Middleware: Middleware challenges and approaches for wireless sensor networks
S Hadim, N Mohamed
IEEE distributed systems online 7 (3), 1-1, 2006
7482006
Support vector machines for classification
M Awad, R Khanna, M Awad, R Khanna
Efficient learning machines: Theories, concepts, and applications for …, 2015
6402015
Blockchain in industries: A survey
J Al-Jaroodi, N Mohamed
IEEE access 7, 36500-36515, 2019
5772019
Smart cities: A survey on data management, security, and enabling technologies
A Gharaibeh, MA Salahuddin, SJ Hussini, A Khreishah, I Khalil, M Guizani, ...
IEEE Communications Surveys & Tutorials 19 (4), 2456-2501, 2017
5742017
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
5592007
The adoption of eCommerce communications and applications technologies in small businesses in New Zealand
N Al-Qirim
Electronic Commerce Research and Applications 6 (4), 462-473, 2007
5232007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
4972010
A survey of load balancing in cloud computing: Challenges and algorithms
K Al Nuaimi, N Mohamed, M Al Nuaimi, J Al-Jaroodi
2012 second symposium on network cloud computing and applications, 137-142, 2012
4642012
Framework for role-based delegation models
E Barka, R Sandhu
proceedings 16th annual computer security applications conference (ACSAC'00 …, 2000
4452000
Framework for role-based delegation models
E Barka, R Sandhu
proceedings 16th annual computer security applications conference (ACSAC'00 …, 2000
4432000
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
4372005
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
4372005
UAVs for smart cities: Opportunities and challenges
F Mohammed, A Idries, N Mohamed, J Al-Jaroodi, I Jawhar
2014 international conference on unmanned aircraft systems (ICUAS), 267-273, 2014
3712014
Cloud computing security: A survey
IM Khalil, A Khreishah, M Azeem
Computers 3 (1), 1-35, 2014
3662014
The global burden of cancer attributable to risk factors, 2010–19: a systematic analysis for the Global Burden of Disease Study 2019
KB Tran, JJ Lang, K Compton, R Xu, AR Acheson, HJ Henrikson, ...
The Lancet 400 (10352), 563-591, 2022
3652022
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3602016
The system can't perform the operation now. Try again later.
Articles 1–20