Assessment of sustainability indicators for green building manufacturing using fuzzy multi-criteria decision making approach E Yadegaridehkordi, M Hourmand, M Nilashi, E Alsolami, S Samad, ... Journal of cleaner production 277, 122905, 2020 | 146 | 2020 |
A novel modular approach based substitution-box design for image encryption AH Zahid, E Al-Solami, M Ahmad IEEE Access 8, 150326-150340, 2020 | 118 | 2020 |
A new hyperchaotic system-based design for efficient bijective substitution-boxes E Al Solami, M Ahmad, C Volos, MN Doja, MMS Beg entropy 20 (7), 525, 2018 | 113 | 2018 |
A New 1D Chaotic Map and -Hill Climbing for Generating Substitution-Boxes AA Alzaidi, M Ahmad, MN Doja, E Al Solami, MMS Beg IEEE Access 6, 55405-55418, 2018 | 110 | 2018 |
Sine‐Cosine Optimization‐Based Bijective Substitution‐Boxes Construction Using Enhanced Dynamics of Chaotic Map AA Alzaidi, M Ahmad, HS Ahmed, EA Solami Complexity 2018 (1), 9389065, 2018 | 92 | 2018 |
Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures M Ahmad, E Al-Solami, AM Alghamdi, MA Yousaf IEEE Access 8, 110397-110411, 2020 | 76 | 2020 |
Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos M Ahmad, E Al Solami, XY Wang, MN Doja, MMS Beg, AA Alzaidi Symmetry 10 (7), 266, 2018 | 52 | 2018 |
Travellers decision making through preferences learning: A case on Malaysian spa hotels in TripAdvisor M Nilashi, S Samad, A Ahani, H Ahmadi, E Alsolami, M Mahmoud, ... Computers & Industrial Engineering 158, 107348, 2021 | 50 | 2021 |
Evolving dynamic S-boxes using fractional-order hopfield neural network based scheme M Ahmad, E Al-Solami Entropy 22 (7), 717, 2020 | 44 | 2020 |
User-representative feature selection for keystroke dynamics E Al Solami, C Boyd, A Clark, I Ahmed 2011 5th International Conference on Network and System Security, 229-233, 2011 | 41 | 2011 |
IES: Hyper-chaotic plain image encryption scheme using improved shuffled confusion-diffusion AA Alarood, E Alsolami, MA Al-Khasawneh, N Ababneh, W Elmedany Ain Shams Engineering Journal 13 (3), 101583, 2022 | 35 | 2022 |
Continuous biometric authentication: Can it be more practical? E Al Solami, C Boyd, A Clark, AK Islam 2010 IEEE 12th International Conference on High Performance Computing and …, 2010 | 34 | 2010 |
Optimal policy learning for COVID-19 prevention using reinforcement learning MI Uddin, SA Ali Shah, MA Al-Khasawneh, AA Alarood, E Alsolami Journal of Information Science 48 (3), 336-348, 2022 | 32 | 2022 |
Optimal policy learning for disease prevention using reinforcement learning Z Alam Khan, Z Feng, MI Uddin, N Mast, SA Ali Shah, M Imtiaz, ... Scientific Programming 2020 (1), 7627290, 2020 | 26 | 2020 |
An adjusted K‐medoids clustering algorithm for effective stability in vehicular ad hoc networks R Hajlaoui, E Alsolami, T Moulahi, H Guyennet International Journal of Communication Systems 32 (12), e3995, 2019 | 23 | 2019 |
Security threats and legal issues related to Cloud based solutions E Alsolami Int. J. Comput. Sci. Netw. Secur 18, 156-163, 2018 | 23 | 2018 |
A blockchain-enabled IoT logistics system for efficient tracking and management of high-price shipments: A resilient, scalable and sustainable approach to smart cities M Balfaqih, Z Balfagih, MD Lytras, KM Alfawaz, AA Alshdadi, E Alsolami Sustainability 15 (18), 13971, 2023 | 22 | 2023 |
Construction of a stable vehicular ad hoc network based on hybrid genetic algorithm R Hajlaoui, E Alsolami, T Moulahi, H Guyennet Telecommunication Systems 71, 433-445, 2019 | 19 | 2019 |
Cooperative caching scheme for machine-to-machine information-centric IoT networks S Anamalamudi, MS Alkatheiri, E Al Solami, AR Sangi IEEE Canadian journal of electrical and computer engineering 44 (2), 228-237, 2021 | 18 | 2021 |
Formal verification of hardware components in critical systems W Khan, M Kamran, SR Naqvi, FA Khan, AS Alghamdi, E Alsolami Wireless Communications and Mobile Computing 2020 (1), 7346763, 2020 | 16 | 2020 |