default search action
Eesa Alsolami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Mahmoud Ahmad Al-Khasawneh, Muhammad Faheem, Ala Abdulsalam Alarood, Safa Habibullah, Eesa A. Alsolami:
Toward Multi-Modal Approach for Identification and Detection of Cyberbullying in Social Networks. IEEE Access 12: 90158-90170 (2024) - [j17]Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Eesa Alsolami, Nasir Ayub, Miltiadis D. Lytras:
Enhanced IoT Security for DDOS Attack Detection: Split Attention-Based ResNeXt-GRU Ensembler Approach. IEEE Access 12: 112368-112380 (2024) - [j16]Vincent Omollo Nyangaresi, Eesa Alsolami, Musheer Ahmad:
Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management. IEEE Access 12: 113553-113564 (2024) - 2022
- [j15]Muhammad Irfan Uddin, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, Ala Abdulsalam Alarood, Eesa Alsolami:
Optimal policy learning for COVID-19 prevention using reinforcement learning. J. Inf. Sci. 48(3): 336-348 (2022) - 2021
- [j14]Mehrbakhsh Nilashi, Sarminah Samad, Ali Ahani, Hossein Ahmadi, Eesa Alsolami, Marwan Mahmoud, Hamsa D. Majeed, Ala Abdulsalam Alarood:
Travellers decision making through preferences learning: A case on Malaysian spa hotels in TripAdvisor. Comput. Ind. Eng. 158: 107348 (2021) - [j13]Eesa A. Alsolami:
Replication-aware secure resource administration scheme for Internet of Things-smart city applications. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - 2020
- [j12]Fathy Elbouraey Eassa, Ahmed Mohammed Alghamdi, Seif Haridi, Maher Khemakhem, Abdullah S. Al-Malaise Al-Ghamdi, Eesa A. Alsolami:
ACC_TEST: Hybrid Testing Approach for OpenACC-Based Programs. IEEE Access 8: 80358-80368 (2020) - [j11]Musheer Ahmad, Eesa A. Alsolami, Ahmed Mohammed Alghamdi, Muhammad Awais Yousaf:
Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures. IEEE Access 8: 110397-110411 (2020) - [j10]Amjad Hussain Zahid, Eesa A. Alsolami, Musheer Ahmad:
A Novel Modular Approach Based Substitution-Box Design for Image Encryption. IEEE Access 8: 150326-150340 (2020) - [j9]Musheer Ahmad, Eesa A. Alsolami:
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation. Complex. 2020: 8868884:1-8868884:16 (2020) - [j8]Musheer Ahmad, Eesa A. Alsolami:
Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme. Entropy 22(7): 717 (2020) - [j7]Wilayat Khan, Muhammad Kamran, Syed Rameez Naqvi, Farrukh Aslam Khan, Ahmed S. Alghamdi, Eesa Alsolami:
Formal Verification of Hardware Components in Critical Systems. Wirel. Commun. Mob. Comput. 2020: 7346763:1-7346763:15 (2020)
2010 – 2019
- 2019
- [j6]Rejab Hajlaoui, Eesa Alsolami, Tarek Moulahi, Hervé Guyennet:
An adjusted K-medoids clustering algorithm for effective stability in vehicular ad hoc networks. Int. J. Commun. Syst. 32(12) (2019) - [j5]Rejab Hajlaoui, Eesa Alsolami, Tarek Moulahi, Hervé Guyennet:
Construction of a stable vehicular ad hoc network based on hybrid genetic algorithm. Telecommun. Syst. 71(3): 433-445 (2019) - 2018
- [j4]Amer Awad Alzaidi, Musheer Ahmad, Mohammad Najam Doja, Eesa A. Alsolami, M. M. Sufyan Beg:
A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes. IEEE Access 6: 55405-55418 (2018) - [j3]Amer Awad Alzaidi, Musheer Ahmad, Hussam S. Ahmed, Eesa A. Alsolami:
Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map. Complex. 2018: 9389065:1-9389065:16 (2018) - [j2]Eesa A. Alsolami, Musheer Ahmad, Christos K. Volos, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 20(7): 525 (2018) - [j1]Musheer Ahmad, Eesa A. Alsolami, Xing-Yuan Wang, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg, Amer Awad Alzaidi:
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Symmetry 10(7): 266 (2018) - 2011
- [c2]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed:
User-representative feature selection for keystroke dynamics. NSS 2011: 229-233 - 2010
- [c1]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Asadul K. Islam:
Continuous Biometric Authentication: Can It Be More Practical? HPCC 2010: 647-652
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint