Intrudtree: a machine learning based cyber security intrusion detection model IH Sarker, YB Abushark, F Alsolami, AI Khan Symmetry 12 (5), 754, 2020 | 91 | 2020 |
Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model IH Sarker, A Colman, J Han, AI Khan, YB Abushark, K Salah Mobile Networks and Applications 25 (3), 1151-1161, 2020 | 54 | 2020 |
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 50944-50957, 2020 | 50 | 2020 |
A knowledge-based integrated system of hesitant fuzzy set, ahp and topsis for evaluating security-durability of web applications R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan IEEE Access 8, 48870-48885, 2020 | 35 | 2020 |
Key issues in healthcare data integrity: Analysis and recommendations AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ... IEEE Access 8, 40612-40628, 2020 | 31 | 2020 |
Contextpca: Predicting context-aware smartphone apps usage based on machine learning techniques IH Sarker, YB Abushark, AI Khan Symmetry 12 (4), 499, 2020 | 23 | 2020 |
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling IH Sarker, H Alqahtani, F Alsolami, AI Khan, YB Abushark, MK Siddiqui Journal of Big Data 7 (1), 1-23, 2020 | 15 | 2020 |
Early detection of design faults relative to requirement specifications in agent-based models Y Abushark, J Thangarajah, T Miller, J Harland, M Winikoff Proceedings of the 14th International Conference on Autonomous Agents and …, 2015 | 14 | 2015 |
Checking consistency of agent designs against interaction protocols for early-phase defect location YB Abushark, J Thangarajah, T Miller, J Harland Proceedings of the 13th International Joint Conference on Autonomous Agents …, 2014 | 14 | 2014 |
Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: A design perspective J Kaur, AI Khan, YB Abushark, MM Alam, SA Khan, A Agrawal, R Kumar, ... Risk Management and Healthcare Policy 13, 355, 2020 | 11 | 2020 |
Requirements specification via activity diagrams for agent-based systems Y Abushark, T Miller, J Thangarajah, M Winikoff, J Harland Autonomous Agents and Multi-Agent Systems 31 (3), 423-468, 2017 | 11 | 2017 |
Impact assessment of covid-19 pandemic through machine learning models FJ Alsolami, AS Al-Malaise Alghamdi, AI Khan, YB Abushark, A Almalawi, ... Computers, Materials and Continua, 2895-2912, 2021 | 4 | 2021 |
Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique AI Khan, A ALGhamdi, FJ Alsolami, YB Abushark, A Almalawi, AM Ali, ... CMC-Comput. Mater. Contin 70, 2835-2860, 2022 | 3 | 2022 |
Mobile expert system: exploring context-aware machine learning rules for personalized decision-making in mobile applications IH Sarker, AI Khan, YB Abushark, F Alsolami Symmetry 13 (10), 1975, 2021 | 3 | 2021 |
Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective YB Abushark, AI Khan, FJ Alsolami, A Almalawi, MM Alam, A Agrawal, ... CMC-COMPUTERS MATERIALS & CONTINUA 68 (1), 1203-1218, 2021 | 3 | 2021 |
DBP-CNN: Deep learning-based prediction of DNA-binding proteins by coupling discrete cosine transform with two-dimensional convolutional neural network O Barukab, F Ali, W Alghamdi, Y Bassam, SA Khan Expert Systems with Applications 197, 116729, 2022 | 2 | 2022 |
Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions IH Sarker, AI Khan, YB Abushark, F Alsolami Mobile Networks and Applications, 1-17, 2022 | 2 | 2022 |
Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment AS Alfakeeh, A Almalawi, FJ Alsolami, YB Abushark, AI Khan, ... CMC-Comput. Mater. Contin 70, 2297-2317, 2022 | 2 | 2022 |
Mobile deep learning: Exploring deep neural network for predicting context-aware smartphone usage IH Sarker, YB Abushark, AI Khan, MM Alam, R Nowrozy SN Computer Science 2 (3), 1-12, 2021 | 2 | 2021 |
A framework for automatically ensuring the conformance of agent designs Y Abushark, J Thangarajah, J Harland, T Miller Journal of Systems and Software 131, 266-310, 2017 | 2 | 2017 |