Personal information

Activities

Works (17)

Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT

Alexandria Engineering Journal
2025-01 | Journal article
Contributors: Mahmoud Ragab; Mohammed Basheri; Nasser N. Albogami; Alanoud Subahi; Omar A. Abdulkader; Hashem Alaidaros; Hassan Mousa; Abdullah AL-Malaise AL-Ghamdi
Source: check_circle
Crossref

Caching Strategies for the Metaverse: Taxonomy, Open Challenges, and Future Research Directions

International Journal of Interactive Mobile Technologies
2024 | Journal article
EID:

2-s2.0-85201830869

Part of ISSN: 18657923
Contributors: Mohammed, A.H.; Alaidaros, H.; Salleh, F.; Sajat, M.S.; Ramaha, N.; Habbal, A.
Source: Self-asserted source
Hashem Alaidaros via Scopus - Elsevier
grade
Preferred source (of 2)‎

Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies

Journal of Communications
2024 | Journal article
EID:

2-s2.0-85189163184

Part of ISSN: 17962021
Contributors: Raeisi-Varzaneh, M.; Dakkak, O.; Alaidaros, H.; Avci, İ.
Source: Self-asserted source
Hashem Alaidaros via Scopus - Elsevier
grade
Preferred source (of 2)‎

EQCNN: Enhanced Remote Sensing Imagery Classification with Circuit-Based Error-Corrected Quantum Convolutional Neural Networks

2024 International Conference on Digital Image Computing: Techniques and Applications (DICTA)
2024-11-27 | Conference paper
Contributors: Muhammad Zaman; Tanzila Kehkashan; Adnan Akhunzada; Hashem Alaidaros; Mueen Uddin; Muhammad Azeem
Source: Self-asserted source
Hashem Alaidaros

Advanced mathematical modeling of mitigating security threats in smart grids through deep ensemble model

Scientific Reports
2024-10-04 | Journal article
Part of ISSN: 2045-2322
Contributors: Sanaa A. Sharaf; Mahmoud Ragab; Nasser Albogami; Abdullah AL-Malaise AL-Ghamdi; Maha Farouk Sabir; Louai A. Maghrabi; Ehab Bahaudien Ashary; Hashem Alaidaros
Source: Self-asserted source
Hashem Alaidaros

A secure multifactor-based clustering scheme for internet of vehicles

Journal of King Saud University - Computer and Information Sciences
2023 | Journal article
EID:

2-s2.0-85179485171

Part of ISSN: 22131248 13191578
Contributors: Karim, S.M.; Habbal, A.; Hamouda, H.; Alaidaros, H.
Source: Self-asserted source
Hashem Alaidaros via Scopus - Elsevier
grade
Preferred source (of 2)‎

Forwarding Strategies for Named Data Networking Based IoT: Requirements, Taxonomy, and Open Research Challenges

IEEE Access
2023 | Journal article
EID:

2-s2.0-85160234175

Part of ISSN: 21693536
Contributors: Askar, N.A.; Habbal, A.; Alden, F.Z.; Wei, X.; Alaidaros, H.; Guo, J.; Yu, H.
Source: Self-asserted source
Hashem Alaidaros via Scopus - Elsevier
grade
Preferred source (of 2)‎

A New Cybersecurity Assessment Framework for Private Networks

2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)
2022 | Conference paper
Contributors: Alshehri, Saeed; Alaidaros, Hashem; Arafah, Mohammad; Bakry, Saad Haj
Source: Self-asserted source
Hashem Alaidaros
grade
Preferred source (of 2)‎

Flow-based approach on bro intrusion detection

Journal of Telecommunication, Electronic and Computer Engineering
2017 | Journal article
EID:

2-s2.0-85032960706

Part of ISSN: 22898131 21801843
Contributors: Alaidaros, H.; Mahmuddin, M.
Source: Self-asserted source
Hashem Alaidaros via Scopus - Elsevier

Flow-based approach on bro intrusion detection

Journal of Telecommunication, Electronic and Computer Engineering (JTEC)
2017 | Journal article
Contributors: Alaidaros, Hashem; Mahmuddin, Massudi
Source: Self-asserted source
Hashem Alaidaros

CHID: CONDITIONAL HYBRID INTRUSION DETECTION SYSTEM FOR REDUCING FALSE POSITIVES AND RESOURCE CONSUMPTION ON MALICOUS DATASETS

2017-01-01 | Dissertation or Thesis
Contributors: ALAIDAROS, HASHEM MOHAMMED
Source: Self-asserted source
Hashem Alaidaros

Conditional Hybrid Approach for Intrusion Detection

Research Journal of Information Technology
2016 | Journal article
Contributors: Alaidaros, H; Mahmuddin, M
Source: Self-asserted source
Hashem Alaidaros
grade
Preferred source (of 2)‎

From Packet-based Towards Hybrid Packet-based and Flow-based Monitoring for Efficient Intrusion Detection: An overview

The 1st Taibah University International Conference on Computing and Information Technology (ICCIT 2012) At: Al-Madinah Al-Munawwarah, Saudi Arabia
2012 | Conference paper
Contributors: Alaidaros, Hashem Mohammed; Mahmuddin, Massudi; Al Mazari, Ali
Source: Self-asserted source
Hashem Alaidaros

An overview of flow-based and packet-based intrusion detection performance in high speed networks

Proceedings of the International Arab Conference on Information Technology
2011 | Conference paper
Contributors: Alaidaros, Hashem; Mahmuddin, Massudi; Al Mazari, Ali; others
Source: Self-asserted source
Hashem Alaidaros

Improving security performance with parallel crypto operations in ssl bulk data transfer

International Journal of Cryptology Research
2009 | Journal article
Contributors: Alaidaros, Hashem Mohammed; Othman, Mohamed; Rasid, Mohd Fadlee A
Source: Self-asserted source
Hashem Alaidaros

Enhancing Secure Sockets Layer Bulk Data Transfer Phase Performance with Parallel Cryptography Algorithm

2007 | Dissertation or Thesis
Contributors: Alaidaros, Hashem Mohammed
Source: Self-asserted source
Hashem Alaidaros

Enhancing security performance with parallel crypto operations in ssl bulk data transfer phase

2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications
2007 | Conference paper
Contributors: Alaidaros, Hashem Mohammed; Rasid, Mohd Fadlee A; Othman, Mohamed; Abdullah, Raja Syamsul Azmir Raja
Source: Self-asserted source
Hashem Alaidaros
grade
Preferred source (of 2)‎