Assessment of sustainability indicators for green building manufacturing using fuzzy multi-criteria decision making approach E Yadegaridehkordi, M Hourmand, M Nilashi, E Alsolami, S Samad, ...
Journal of cleaner production 277, 122905, 2020
146 2020 A novel modular approach based substitution-box design for image encryption AH Zahid, E Al-Solami, M Ahmad
IEEE Access 8, 150326-150340, 2020
118 2020 A new hyperchaotic system-based design for efficient bijective substitution-boxes E Al Solami, M Ahmad, C Volos, MN Doja, MMS Beg
entropy 20 (7), 525, 2018
113 2018 A New 1D Chaotic Map and -Hill Climbing for Generating Substitution-Boxes AA Alzaidi, M Ahmad, MN Doja, E Al Solami, MMS Beg
IEEE Access 6, 55405-55418, 2018
110 2018 Sine‐Cosine Optimization‐Based Bijective Substitution‐Boxes Construction Using Enhanced Dynamics of Chaotic Map AA Alzaidi, M Ahmad, HS Ahmed, EA Solami
Complexity 2018 (1), 9389065, 2018
92 2018 Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures M Ahmad, E Al-Solami, AM Alghamdi, MA Yousaf
IEEE Access 8, 110397-110411, 2020
76 2020 Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos M Ahmad, E Al Solami, XY Wang, MN Doja, MMS Beg, AA Alzaidi
Symmetry 10 (7), 266, 2018
52 2018 Travellers decision making through preferences learning: A case on Malaysian spa hotels in TripAdvisor M Nilashi, S Samad, A Ahani, H Ahmadi, E Alsolami, M Mahmoud, ...
Computers & Industrial Engineering 158, 107348, 2021
50 2021 Evolving dynamic S-boxes using fractional-order hopfield neural network based scheme M Ahmad, E Al-Solami
Entropy 22 (7), 717, 2020
44 2020 User-representative feature selection for keystroke dynamics E Al Solami, C Boyd, A Clark, I Ahmed
2011 5th International Conference on Network and System Security, 229-233, 2011
41 2011 IES: Hyper-chaotic plain image encryption scheme using improved shuffled confusion-diffusion AA Alarood, E Alsolami, MA Al-Khasawneh, N Ababneh, W Elmedany
Ain Shams Engineering Journal 13 (3), 101583, 2022
35 2022 Continuous biometric authentication: Can it be more practical? E Al Solami, C Boyd, A Clark, AK Islam
2010 IEEE 12th International Conference on High Performance Computing and …, 2010
34 2010 Optimal policy learning for COVID-19 prevention using reinforcement learning MI Uddin, SA Ali Shah, MA Al-Khasawneh, AA Alarood, E Alsolami
Journal of Information Science 48 (3), 336-348, 2022
32 2022 Optimal policy learning for disease prevention using reinforcement learning Z Alam Khan, Z Feng, MI Uddin, N Mast, SA Ali Shah, M Imtiaz, ...
Scientific Programming 2020 (1), 7627290, 2020
26 2020 An adjusted K ‐medoids clustering algorithm for effective stability in vehicular ad hoc networks R Hajlaoui, E Alsolami, T Moulahi, H Guyennet
International Journal of Communication Systems 32 (12), e3995, 2019
23 2019 Security threats and legal issues related to Cloud based solutions E Alsolami
Int. J. Comput. Sci. Netw. Secur 18, 156-163, 2018
23 2018 A blockchain-enabled IoT logistics system for efficient tracking and management of high-price shipments: A resilient, scalable and sustainable approach to smart cities M Balfaqih, Z Balfagih, MD Lytras, KM Alfawaz, AA Alshdadi, E Alsolami
Sustainability 15 (18), 13971, 2023
22 2023 Construction of a stable vehicular ad hoc network based on hybrid genetic algorithm R Hajlaoui, E Alsolami, T Moulahi, H Guyennet
Telecommunication Systems 71, 433-445, 2019
19 2019 Cooperative caching scheme for machine-to-machine information-centric IoT networks S Anamalamudi, MS Alkatheiri, E Al Solami, AR Sangi
IEEE Canadian journal of electrical and computer engineering 44 (2), 228-237, 2021
18 2021 Formal verification of hardware components in critical systems W Khan, M Kamran, SR Naqvi, FA Khan, AS Alghamdi, E Alsolami
Wireless Communications and Mobile Computing 2020 (1), 7346763, 2020
16 2020