


default search action
Hamza Aldabbas
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2012
 [b1]Hamza Aldabbas: [b1]Hamza Aldabbas:
 Securing data dissemination in vehicular ad hoc networks. De Montfort University, Leicester, UK, 2012
Journal Articles
- 2024
 [j23]Jaffar Atwan [j23]Jaffar Atwan , Nedaa Almansour, Mohammad Hashem Ryalat , Nedaa Almansour, Mohammad Hashem Ryalat , Shahnorbanun Sahran , Shahnorbanun Sahran , Hamza Aldabbas , Hamza Aldabbas , Dheeb Albashish: , Dheeb Albashish:
 Ensemble of Deep Features for Breast Cancer Histopathological Image Classification. Comput. J. 67(6): 2126-2136 (2024)
 [j22]Zaid Mustafa [j22]Zaid Mustafa , Rashid Amin, Hamza Aldabbas, Naeem Ahmed , Rashid Amin, Hamza Aldabbas, Naeem Ahmed : :
 Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques. Clust. Comput. 27(7): 9635-9661 (2024)
 [j21]Naskath Jahangeer [j21]Naskath Jahangeer , Zaid Mustafa , Zaid Mustafa , Hamza Aldabbas: , Hamza Aldabbas:
 Utilizing a Hybrid Cat-Swarm Optimization Algorithm for Seamless Vertical Handoff in Vanet. Wirel. Pers. Commun. 137(1): 495-521 (2024)
- 2023
 [j20]Muhammad Mehmood, Rashid Amin [j20]Muhammad Mehmood, Rashid Amin , Muhana Magboul Ali Muslam , Muhana Magboul Ali Muslam , Jiang (Linda) Xie , Jiang (Linda) Xie , Hamza Aldabbas , Hamza Aldabbas : :
 Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning. IEEE Access 11: 46561-46576 (2023)
 [j19]Luqman Ahmed, Muhammad Munwar Iqbal [j19]Luqman Ahmed, Muhammad Munwar Iqbal , Hamza Aldabbas, Shehzad Khalid, Yasir Saleem, Saqib Saeed , Hamza Aldabbas, Shehzad Khalid, Yasir Saleem, Saqib Saeed : :
 Images data practices for Semantic Segmentation of Breast Cancer using Deep Neural Network. J. Ambient Intell. Humaniz. Comput. 14(11): 15227-15243 (2023)
 [j18]Hamza Aldabbas [j18]Hamza Aldabbas : :
 Efficient bandwidth allocation in SDN-based peer-to-peer data streaming using machine learning algorithm. J. Supercomput. 79(6): 6802-6824 (2023)
 [j17]Umer Ahmed Butt, Rashid Amin [j17]Umer Ahmed Butt, Rashid Amin , Muhammad Mehmood, Hamza Aldabbas, Mafawez T. Alharbi, Nasser Albaqami: , Muhammad Mehmood, Hamza Aldabbas, Mafawez T. Alharbi, Nasser Albaqami:
 Cloud Security Threats and Solutions: A Survey. Wirel. Pers. Commun. 128(1): 387-413 (2023)
- 2022
 [j16]Hamza Aldabbas [j16]Hamza Aldabbas , Khalaf Khatatneh , Khalaf Khatatneh : :
 Intelligent transmission control layer for efficient node management in SDN. Clust. Comput. 25(2): 735-750 (2022)
 [j15]Hamza Aldabbas, Dheeb Albashish, Khalaf Khatatneh [j15]Hamza Aldabbas, Dheeb Albashish, Khalaf Khatatneh , Rashid Amin: , Rashid Amin:
 An architecture of IoT-aware healthcare smart system by leveraging machine learning. Int. Arab J. Inf. Technol. 19(2): 160-172 (2022)
 [j14]Mohammed Alweshah, Muder Almiani [j14]Mohammed Alweshah, Muder Almiani , Nedaa Almansour, Saleh Al Khalaileh, Hamza Aldabbas, Waleed Alomoush , Nedaa Almansour, Saleh Al Khalaileh, Hamza Aldabbas, Waleed Alomoush , Almahdi Alshareef: , Almahdi Alshareef:
 Vehicle routing problems based on Harris Hawks optimization. J. Big Data 9(1): 42 (2022)
 [j13]Mahrukh Mansoor, Rashid Amin [j13]Mahrukh Mansoor, Rashid Amin , Zaid Mustafa , Zaid Mustafa , Sudhakar Sengan, Hamza Aldabbas, Mafawez T. Alharbi: , Sudhakar Sengan, Hamza Aldabbas, Mafawez T. Alharbi:
 A machine learning approach for non-invasive fall detection using Kinect. Multim. Tools Appl. 81(11): 15491-15519 (2022)
 [j12]Naeem Ahmed [j12]Naeem Ahmed , Rashid Amin , Rashid Amin , Hamza Aldabbas, Deepika Koundal , Hamza Aldabbas, Deepika Koundal , Bader Alouffi, Tariq Shah , Bader Alouffi, Tariq Shah : :
 Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges. Secur. Commun. Networks 2022: 1862888:1-1862888:19 (2022)
 [j11]Usman Rauf Kamboh [j11]Usman Rauf Kamboh , Muhammad Rehman Shahid , Muhammad Rehman Shahid , Hamza Aldabbas , Hamza Aldabbas , Ammar Rafiq , Ammar Rafiq , Bader Alouffi , Bader Alouffi , Muhammad Asif Habib , Muhammad Asif Habib , Ubaid Ullah , Ubaid Ullah : :
 Radio Network Forensic with mmWave Using the Dominant Path Algorithm. Secur. Commun. Networks 2022: 9692892:1-9692892:15 (2022)
 [j10]Naskath Jahangeer [j10]Naskath Jahangeer , B. Paramasivan, Zaid Mustafa , B. Paramasivan, Zaid Mustafa , Hamza Aldabbas: , Hamza Aldabbas:
 Connectivity analysis of V2V communication with discretionary lane changing approach. J. Supercomput. 78(4): 5526-5546 (2022)
- 2021
 [j9]Hamza Aldabbas [j9]Hamza Aldabbas , Rashid Amin , Rashid Amin : :
 A novel mechanism to handle address spoofing attacks in SDN based IoT. Clust. Comput. 24(4): 3011-3026 (2021)
 [j8]Aysha Maryam Ali, Mohammed A. Al Ghamdi [j8]Aysha Maryam Ali, Mohammed A. Al Ghamdi , Muhammad Munwar Iqbal , Muhammad Munwar Iqbal , Shehzad Khalid, Hamza Aldabbas, Saqib Saeed , Shehzad Khalid, Hamza Aldabbas, Saqib Saeed : :
 Next-generation UWB antennas gadgets for human health care using SAR. EURASIP J. Wirel. Commun. Netw. 2021(1): 33 (2021)
 [j7]Aysha Maryam Ali, Mohammed A. Al Ghamdi [j7]Aysha Maryam Ali, Mohammed A. Al Ghamdi , Muhammad Munwar Iqbal, Shehzad Khalid, Hamza Aldabbas, Saqib Saeed , Muhammad Munwar Iqbal, Shehzad Khalid, Hamza Aldabbas, Saqib Saeed : :
 Correction to: Next-generation UWB antennas gadgets for human health care using SAR. EURASIP J. Wirel. Commun. Netw. 2021(1): 126 (2021)
 [j6]Naskath Jahangeer [j6]Naskath Jahangeer , B. Paramasivan, Hamza Aldabbas: , B. Paramasivan, Hamza Aldabbas:
 A study on modeling vehicles mobility with MLC for enhancing vehicle-to-vehicle connectivity in VANET. J. Ambient Intell. Humaniz. Comput. 12(8): 8255-8264 (2021)
 [j5]Hamza Aldabbas, Abdullah Bajahzar [j5]Hamza Aldabbas, Abdullah Bajahzar , Meshrif Alruily, Ali Adil Qureshi, Rana M. Amir Latif , Meshrif Alruily, Ali Adil Qureshi, Rana M. Amir Latif , Muhammad Farhan , Muhammad Farhan : :
 Google Play Content Scraping and Knowledge Engineering using Natural Language Processing Techniques with the Analysis of User Reviews. J. Intell. Syst. 30(1): 192-208 (2021)
- 2020
 [j4]Laiqa Binte Imran, Rana M. Amir Latif [j4]Laiqa Binte Imran, Rana M. Amir Latif , Muhammad Farhan , Muhammad Farhan , Hamza Aldabbas: , Hamza Aldabbas:
 Smart City Based Autonomous Water Quality Monitoring System Using WSN. Wirel. Pers. Commun. 115(2): 1805-1820 (2020)
- 2019
 [j3]Hamad Naeem [j3]Hamad Naeem , Bing Guo, Muhammad Rashid Naeem , Bing Guo, Muhammad Rashid Naeem , Farhan Ullah , Farhan Ullah , Hamza Aldabbas, Muhammad Sufyan Javed , Hamza Aldabbas, Muhammad Sufyan Javed : :
 Identification of malicious code variants based on image visualization. Comput. Electr. Eng. 76: 225-237 (2019)
 [j2]Nasir Jamal [j2]Nasir Jamal , Chen Xianqiao, Hamza Aldabbas , Chen Xianqiao, Hamza Aldabbas : :
 Deep Learning-Based Sentimental Analysis for Large-Scale Imbalanced Twitter Data. Future Internet 11(9): 190 (2019)
 [j1]Muhammad Ramzan, Shahid Mahmood Awan, Hamza Aldabbas [j1]Muhammad Ramzan, Shahid Mahmood Awan, Hamza Aldabbas , Adnan Abid, Muhammad Farhan, Shehzad Khalid, Rana M. Amir Latif: , Adnan Abid, Muhammad Farhan, Shehzad Khalid, Rana M. Amir Latif:
 Internet of medical things for smart D3S to enable road safety. Int. J. Distributed Sens. Networks 15(8) (2019)
Conference and Workshop Papers
- 2018
 [c3]Hamza Aldabbas [c3]Hamza Aldabbas : :
 LPBR: location prediction based routing protocol for mobile IoT systems. ICFNDS 2018: 6:1-6:5
- 2011
 [c2]Helge Janicke [c2]Helge Janicke , Mohamed Sarrab , Mohamed Sarrab , Hamza Aldabbas , Hamza Aldabbas : :
 Controlling Data Dissemination. DPM/SETOP 2011: 303-309
 [c1]Tariq Falah Alwada'n [c1]Tariq Falah Alwada'n , Helge Janicke , Helge Janicke , Omer Aldabbas, Hamza Aldabbas , Omer Aldabbas, Hamza Aldabbas : :
 New Framework for Dynamic Policy Management in Grid Environments. WiMo/CoNeCo 2011: 297-304
Informal and Other Publications
- 2012
 [i2]Hamza Aldabbas, Tariq Falah Alwada'n, Helge Janicke, Ali H. Al-Bayatti: [i2]Hamza Aldabbas, Tariq Falah Alwada'n, Helge Janicke, Ali H. Al-Bayatti:
 Data Confidentiality in Mobile Ad hoc Networks. CoRR abs/1203.1749 (2012)
 [i1]Mohammad Alshehri, Hamza Aldabbas, James Sawle, Mai Abu Baqar: [i1]Mohammad Alshehri, Hamza Aldabbas, James Sawle, Mai Abu Baqar:
 Adopting E-commerce to User's Needs. CoRR abs/1203.3688 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-29 01:52 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







