A review of smart home applications based on Internet of Things M Alaa, AA Zaidan, BB Zaidan, M Talal, MLM Kiah Journal of network and computer applications 97, 48-65, 2017 | 775 | 2017 |
Towards secure mobile cloud computing: A survey AN Khan, MLM Kiah, SU Khan, SA Madani Future generation computer systems 29 (5), 1278-1299, 2013 | 544 | 2013 |
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ... Journal of Network and Computer Applications 74, 98-120, 2016 | 267 | 2016 |
Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission D Petković, Ž Ćojbašić, V Nikolić, S Shamshirband, MLM Kiah, NB Anuar, ... Energy 64, 868-874, 2014 | 229 | 2014 |
Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS AA Zaidan, BB Zaidan, A Al-Haiqi, MLM Kiah, M Hussain, M Abdulnabi Journal of biomedical informatics 53, 390-404, 2015 | 217 | 2015 |
Blockchain technology the identity management and authentication service disruptor: a survey SY Lim, PT Fotsing, A Almasri, O Musa, MLM Kiah, TF Ang, R Ismail International Journal on Advanced Science, Engineering and Information …, 2018 | 201 | 2018 |
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham Engineering Applications of Artificial Intelligence 32, 228-241, 2014 | 184 | 2014 |
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique S Shamshirband, NB Anuar, MLM Kiah, A Patel Engineering Applications of Artificial Intelligence 26 (9), 2105-2127, 2013 | 178 | 2013 |
Review on security of internet of things authentication mechanism T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun, NBA Juma’at, I Ahmedy, ... IEEE Access 7, 151054-151089, 2019 | 172 | 2019 |
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, MLM Kiah, NB Anuar, ... Computer methods and programs in biomedicine 122 (3), 393-408, 2015 | 171 | 2015 |
Multi-criteria analysis for OS-EMR software selection problem: A comparative study AA Zaidan, BB Zaidan, M Hussain, A Haiqi, MLM Kiah, M Abdulnabi Decision support systems 78, 15-27, 2015 | 165 | 2015 |
A systematic review of approaches to assessing cybersecurity awareness NHA Rahim, S Hamid, ML Mat Kiah, S Shamshirband, S Furnell Kybernetes 44 (4), 606-622, 2015 | 150 | 2015 |
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks S Shamshirband, A Amini, NB Anuar, MLM Kiah, YW Teh, S Furnell Measurement 55, 212-226, 2014 | 139 | 2014 |
Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission S Shamshirband, D Petković, A Amini, NB Anuar, V Nikolić, Ž Ćojbašić, ... Energy 67, 623-630, 2014 | 138 | 2014 |
Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks S Shamshirband, NB Anuar, MLM Kiah, VA Rohani, D Petković, S Misra, ... Journal of Network and Computer Applications 42, 102-117, 2014 | 130 | 2014 |
Incremental proxy re-encryption scheme for mobile cloud computing environment AN Khan, MLM Kiah, SA Madani, M Ali, AR Khan, S Shamshirband The Journal of Supercomputing 68, 624-651, 2014 | 130 | 2014 |
Towards secure FinTech: A survey, taxonomy, and open research challenges S Mehrban, MW Nadeem, M Hussain, MM Ahmed, O Hakeem, S Saqib, ... Ieee Access 8, 23391-23406, 2020 | 126 | 2020 |
A security framework for mHealth apps on Android platform M Hussain, A Al-Haiqi, AA Zaidan, BB Zaidan, M Kiah, S Iqbal, S Iqbal, ... Computers & Security 75, 191-217, 2018 | 126 | 2018 |
Routing protocol design for secure WSN: Review and open research issues SM Zin, NB Anuar, MLM Kiah, ASK Pathan Journal of Network and Computer Applications 41, 517-530, 2014 | 118 | 2014 |
Forecasting of consumers heat load in district heating systems using the support vector machine with a discrete wavelet transform algorithm M Protić, S Shamshirband, D Petković, A Abbasi, MLM Kiah, JA Unar, ... Energy 87, 343-351, 2015 | 108 | 2015 |