Follow
Yoosef Abushark
Title
Cited by
Cited by
Year
Intrudtree: a machine learning based cyber security intrusion detection model
IH Sarker, YB Abushark, F Alsolami, AI Khan
Symmetry 12 (5), 754, 2020
2342020
Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions
IH Sarker, AI Khan, YB Abushark, F Alsolami
Mobile Networks and Applications 28 (1), 296-312, 2023
1532023
Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model
IH Sarker, A Colman, J Han, AI Khan, YB Abushark, K Salah
Mobile Networks and Applications 25, 1151-1161, 2020
1242020
Key issues in healthcare data integrity: Analysis and recommendations
AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ...
IEEE Access 8, 40612-40628, 2020
872020
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications
R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan
IEEE Access 8, 50944-50957, 2020
742020
A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications
R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan
IEEE Access 8, 48870-48885, 2020
582020
Contextpca: Predicting context-aware smartphone apps usage based on machine learning techniques
IH Sarker, YB Abushark, AI Khan
Symmetry 12 (4), 499, 2020
482020
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling
IH Sarker, H Alqahtani, F Alsolami, AI Khan, YB Abushark, MK Siddiqui
Journal Of Big Data 7, 1-23, 2020
372020
Novel energy management scheme in IoT enabled smart irrigation system using optimized intelligence methods
AI Khan, F Alsolami, F Alqurashi, YB Abushark, IH Sarker
Engineering Applications of Artificial Intelligence 114, 104996, 2022
292022
DBP-CNN: Deep learning-based prediction of DNA-binding proteins by coupling discrete cosine transform with two-dimensional convolutional neural network
O Barukab, F Ali, W Alghamdi, Y Bassam, SA Khan
Expert Systems with Applications 197, 116729, 2022
282022
Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective
J Kaur, AI Khan, YB Abushark, MM Alam, SA Khan, A Agrawal, R Kumar, ...
Risk Management and Healthcare Policy, 355-371, 2020
272020
Managing security of healthcare data for a modern healthcare system
A Almalawi, AI Khan, F Alsolami, YB Abushark, AS Alfakeeh
Sensors 23 (7), 3612, 2023
252023
Integrating blockchain technology into healthcare through an intelligent computing technique
AI Khan, A ALGhamdi, FJ Alsolami, YB Abushark, A Almalawi, AM Ali, ...
Computers, Materials & Continua 70 (2), 2835-2860, 2022
202022
Early detection of design faults relative to requirement specifications in agent-based models
Y Abushark, J Thangarajah, T Miller, J Harland, M Winikoff
Proceedings of the 14th International Conference on Autonomous Agents and …, 2015
162015
Deep learning based anomaly detection in images: insights, challenges and recommendations
A Alloqmani, YB Abushark, AI Khan, F Alsolami
International Journal of Advanced Computer Science and Applications 12 (4), 2021
152021
Usability evaluation through fuzzy AHP-TOPSIS approach: Security requirement perspective
YB Abushark, AI Khan, FJ Alsolami, A Almalawi, MM Alam, A Agrawal, ...
Comput. Mater. Contin 68, 1203-1218, 2021
152021
Requirements specification via activity diagrams for agent-based systems
Y Abushark, T Miller, J Thangarajah, M Winikoff, J Harland
Autonomous Agents and Multi-Agent Systems 31, 423-468, 2017
152017
Hesitant fuzzy-sets based decision-making model for security risk assessment
AS Alfakeeh, A Almalawi, FJ Alsolami, YB Abushark, AI Khan, ...
CMC-Comput. Mater. Contin 70, 2297-2317, 2022
142022
Checking consistency of agent designs against interaction protocols for early-phase defect location
YB Abushark, J Thangarajah, T Miller, J Harland
Proceedings of the 13th International Joint Conference on Autonomous Agents …, 2014
142014
Cyber security analysis and evaluation for intrusion detection systems
YB Abushark, A Irshad Khan, F Alsolami, A Almalawi, M Mottahir Alam, ...
Comput. Mater. Contin 72, 1765-1783, 2022
132022
The system can't perform the operation now. Try again later.
Articles 1–20