|A review of smart home applications based on Internet of Things|
M Alaa, AA Zaidan, BB Zaidan, M Talal, MLM Kiah
Journal of Network and Computer Applications 97, 48-65, 2017
|Towards secure mobile cloud computing: A survey|
AN Khan, MLM Kiah, SU Khan, SA Madani
Future generation computer systems 29 (5), 1278-1299, 2013
|On cloud security attacks: A taxonomy and intrusion detection and prevention as a service|
S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ...
Journal of Network and Computer Applications 74, 98-120, 2016
|Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission|
D Petković, Ž Ćojbašić, V Nikolić, S Shamshirband, MLM Kiah, NB Anuar, ...
Energy 64, 868-874, 2014
|Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS|
AA Zaidan, BB Zaidan, A Al-Haiqi, MLM Kiah, M Hussain, M Abdulnabi
Journal of biomedical informatics 53, 390-404, 2015
|Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks|
S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham
Engineering Applications of Artificial Intelligence 32, 228-241, 2014
|The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations|
M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, MLM Kiah, NB Anuar, ...
Computer methods and programs in biomedicine 122 (3), 393-408, 2015
|An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique|
S Shamshirband, NB Anuar, MLM Kiah, A Patel
Engineering Applications of Artificial Intelligence 26 (9), 2105-2127, 2013
|Multi-criteria analysis for OS-EMR software selection problem: A comparative study|
AA Zaidan, BB Zaidan, M Hussain, A Haiqi, MLM Kiah, M Abdulnabi
Decision support systems 78, 15-27, 2015
|D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks|
S Shamshirband, A Amini, NB Anuar, MLM Kiah, YW Teh, S Furnell
Measurement 55, 212-226, 2014
|Incremental proxy re-encryption scheme for mobile cloud computing environment|
AN Khan, ML Kiah, SA Madani, M Ali, S Shamshirband
The Journal of Supercomputing 68 (2), 624-651, 2014
|Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission|
S Shamshirband, D Petković, A Amini, NB Anuar, V Nikolić, Ž Ćojbašić, ...
Energy 67, 623-630, 2014
|Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks|
S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ...
Journal of Network and Computer Applications 42, 102-117, 2014
|Routing protocol design for secure WSN: Review and open research issues|
SM Zin, NB Anuar, MLM Kiah, ASK Pathan
Journal of Network and Computer Applications 41, 517-530, 2014
|Blockchain technology the identity management and authentication service disruptor: a survey|
SY Lim, PT Fotsing, A Almasri, O Musa, MLM Kiah, TF Ang, R Ismail
International Journal on Advanced Science, Engineering and Information …, 2018
|A security framework for mHealth apps on Android platform|
M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, M Kiah, S Iqbal, S Iqbal, ...
Computers & Security 75, 191-217, 2018
|Review on security of Internet of Things authentication mechanism|
T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun, NBA Juma’at, I Ahmedy, ...
IEEE Access 7, 151054-151089, 2019
|Decreasing environmental impacts of cropping systems using life cycle assessment (LCA) and multi-objective genetic algorithm|
B Khoshnevisan, E Bolandnazar, S Shamshirband, HM Shariati, ...
Journal of Cleaner Production 86, 67-77, 2015
|A distributed framework for health information exchange using smartphone technologies|
M Abdulnabi, A Al-Haiqi, MLM Kiah, AA Zaidan, BB Zaidan, M Hussain
Journal of biomedical informatics 69, 230-250, 2017
|Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm|
M Protić, S Shamshirband, D Petković, A Abbasi, MLM Kiah, JA Unar, ...
Energy 87, 343-351, 2015