咨询与建议

限定检索结果

文献类型

  • 29 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 30 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 8 篇 计算机科学与技术...
    • 2 篇 电子科学与技术(可...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
  • 10 篇 医学
    • 8 篇 临床医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 管理学
    • 1 篇 工商管理

主题

  • 4 篇 machine learning
  • 3 篇 deep learning
  • 2 篇 molecular dockin...
  • 2 篇 saudi arabia
  • 2 篇 cybersecurity
  • 2 篇 roc-auc
  • 1 篇 covid-19
  • 1 篇 moon
  • 1 篇 case report
  • 1 篇 tissue
  • 1 篇 access control
  • 1 篇 cybersecurity aw...
  • 1 篇 anxiety
  • 1 篇 falkner-skan flo...
  • 1 篇 atmosphere
  • 1 篇 critically ill
  • 1 篇 appliances
  • 1 篇 bluetooth
  • 1 篇 cry speech detec...
  • 1 篇 depression

机构

  • 7 篇 department of in...
  • 4 篇 department of co...
  • 3 篇 computer science...
  • 2 篇 department of co...
  • 1 篇 department of pu...
  • 1 篇 department of co...
  • 1 篇 department of bi...
  • 1 篇 department of co...
  • 1 篇 departments of i...
  • 1 篇 research center ...
  • 1 篇 ministry of heal...
  • 1 篇 biology departme...
  • 1 篇 南京农业大学
  • 1 篇 department of cr...
  • 1 篇 department of en...
  • 1 篇 medical college ...
  • 1 篇 ministry of heal...
  • 1 篇 college of denti...
  • 1 篇 corporate depart...
  • 1 篇 department of ma...

作者

  • 10 篇 mohammed alshehr...
  • 4 篇 shailendra mishr...
  • 4 篇 sultan almakdi
  • 3 篇 purushottam shar...
  • 3 篇 osama alfarraj
  • 2 篇 richa sharma
  • 2 篇 muhammad irfan
  • 2 篇 mohammed m. a. a...
  • 2 篇 elias hossain
  • 2 篇 wahidur rahman
  • 2 篇 mohammed s.alshe...
  • 2 篇 mimonah al qathr...
  • 1 篇 akashdeep bhardw...
  • 1 篇 heba s.khalifa
  • 1 篇 sabila al jannat
  • 1 篇 bader mohammed s...
  • 1 篇 xinhua wang
  • 1 篇 ahmed alshehri
  • 1 篇 amer saud al-hum...
  • 1 篇 ahmad a.alshehri

语言

  • 30 篇 英文
检索条件"作者=mohammed AlShehri"
30 条 记 录,以下是1-10 订阅
排序:
Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform
收藏 引用
Computers, Materials & Continua 2021年 第4期67卷 917-931页
作者: mohammed alshehri Department of Information Technology Majmaah UniversityMajmaah11952Saudi Arabia
Cyber Threat Intelligence(CTI)has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such *** inform... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Impact of Human Vulnerabilities on Cybersecurity
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 1153-1166页
作者: Maher Alsharif Shailendra Mishra mohammed alshehri Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia
Today,security is a major challenge linked with computer network companies that cannot defend against *** vulnerable factors increase security risks and cyber-attacks,including viruses,the internet,communications,and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Blockchain-Based SQKD and IDS in Edge Enabled Smart Grid Network
收藏 引用
Computers, Materials & Continua 2022年 第2期70卷 2149-2169页
作者: Abdullah Musaed Alkhiari Shailendra Mishra mohammed alshehri Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia
Smart Grid is a power grid that improves flexibility,reliability,and efficiency through smart *** to extensive data exchange over the Internet,the smart grid faces many security challenges that have led to data loss,d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Web Security:Emerging Threats and Defense
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 1233-1248页
作者: Abdulwahed Awad Almutairi Shailendra Mishra mohammed alshehri Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia
Web applications have become a widely accepted method to support the internet for the past *** they have been successfully installed in the business activities and there is a requirement of advanced functionalities,th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 2525-2538页
作者: mohammed alshehri Purushottam Sharma Richa Sharma Osama Alfarraj Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia ASET Amity University NoidaNoida201301India Computer Science Department Community CollegeKing Saud UniversityRiyadhSaudi Arabia
Sensors and physical activity evaluation are quite limited for motionbased commercial *** the accelerometer of the smartwatch is utilized;walking is *** combination can perform better in terms of sensors and that can ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Self-Management of Low Back Pain Using Neural Network
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 885-901页
作者: Purushottam Sharma mohammed alshehri Richa Sharma Osama Alfarraj ASET Amity University Uttar PradeshNoida201301India Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadhSaudi Arabia
Low back pain(LBP)is a morbid condition that has afflicted several citizens in *** has negatively impacted the European economy due to several man-days lost,with bed rest and forced inactivity being the usual LBP care... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identity Governance Framework for Privileged Users
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 995-1005页
作者: Mansour Hammoud Alruwies Shailendra Mishra mohammed Abdul Rahman alshehri Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia
Information technology companies have grown in size and recognized the need to protect their valuable *** a result,each IT application has its authentication mechanism,and an employee needs a username and *** the numb... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Real-time Privacy Preserving Framework for Covid-19 Contact Tracing
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1017-1032页
作者: Akashdeep Bhardwaj Ahmed A.Mohamed Manoj Kumar mohammed alshehri Ahed Abugabah School of Computer Science University of Petroleum&Energy Studies(UPES)Dehradun248007India Department of Computer Science College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Information Technology Faculty of Computer and InformationAssiut UniversityAssiut71515Egypt Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Information System College of Technological InnovationZayed UniversityAbu DhabiUnited Arab Emirates
The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple *** have shut their borders,and their nationals have been advised to *** variety... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
收藏 引用
Computer Systems Science & Engineering 2023年 第8期46卷 2401-2414页
作者: mohammed S.alshehri Sultan Almakdi Mimonah Al Qathrady Jawad Ahmad Department of Computer Science Najran UniversityNajran55461Saudi Arabia Department of Information Systems Najran UniversityNajran55461Saudi Arabia School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Chaos-based cryptosystems are considered a secure mode of communication due to their *** maps are associated with the other domains to construct robust encryption *** exist numerous encryption schemes in the literatur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Holistic,Proactive and Novel Approach for Pre,During and Post Migration Validation from Subversion to Git
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 2359-2371页
作者: Vinay Singh mohammed alshehri Alok Aggarwal Osama Alfarraj Purushottam Sharma K.R.Pardasani School of Computer Science University of Petroleum&Energy StudiesDehradunIndia Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadhSaudi Arabia Amity School of Engineering&Technology Amity UniversityUttar PradeshNoidaIndia Department of Mathematics Bioinformatics&Computer ApplicationsMaulana Azad National Institute of TechnologyBhopal462003India
Software development is getting a transition from centralized version control systems(CVCSs)like Subversion to decentralized version control systems(DVCDs)like Git due to lesser efficiency of former in terms of branch... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论