A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems A Ara, M Al-Rodhaan, Y Tian, A Al-Dhelaan IEEE access 5, 12601-12617, 2017 | 128 | 2017 |
The Role and Impact of Project Management in ERP project implementation life cycle A Ara, AS Al-Mudimigh Global Journal of Computer Science and Technology 11 (5), 7-10, 2011 | 43 | 2011 |
A secure service provisioning framework for cyber physical cloud computing systems A Ara, M Al-Rodhaan, Y Tian, A Al-Dhelaan arXiv preprint arXiv:1611.00374, 2015 | 15 | 2015 |
An optical-based encryption and authentication algorithm for color and grayscale medical images W El-Shafai, I Almomani, A Ara, A Alkhayer Multimedia Tools and Applications 82 (15), 23735-23770, 2023 | 9 | 2023 |
The Adoption of Blockchain Technology in IoT: An Insight View AR Mahlous, A Ara 2020 6th Conference on Data Science and Machine Learning Applications (CDMA …, 2020 | 9 | 2020 |
An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies A Ara, A Sharma, D Yadav Journal of Discrete Mathematical Sciences and Cryptography 25 (4), 1137-1155, 2022 | 6 | 2022 |
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE AA Mayada Elsaid, Sara Altuwaijri, Nouf Aljammaz International Journal of Distributed and Parallel Systems (IJDPS) 10 (2019 …, 2019 | 5* | 2019 |
Security in Supervisory Control and Data Acquisition (SCADA) based Industrial Control Systems: Challenges and Solutions A Ara ICSDI 2022, International Conference on Sustainaility: developments and …, 2022 | 3 | 2022 |
Enhanced System for Securing Password Manager Using Honey Encryption AA Albatoul AlMuhanna, Afnan AlFaadhel 2022 Fifth International Conference of Women in Data Science at Prince …, 2022 | 3 | 2022 |
Privacy preservation in cloud based cyber physical systems A Ara Journal of Computational and Theoretical Nanoscience 16 (10), 4320-4327, 2019 | 3 | 2019 |
Secure Storage System Using Cryptographic Techniques AA Manal AlShalaan, Reem AlSubaie 2022 Fifth International Conference of Women in Data Science at Prince …, 2022 | 2 | 2022 |
DUST-MASK: A Framework for Preventing Bitcoin’s Dust Attacks FA AlShlawi, NKAS awi, WYB Saleem, A Ara 2020 3rd International Conference on Computer Applications & Information …, 2020 | 1 | 2020 |
Enhanced Visual Cryptography Using Quadratic Anisotropic Diffusion GF AlMudahi, L AlSwayeh, SA AlAnsary, A Ara 2023 Sixth International Conference of Women in Data Science at Prince …, 2023 | | 2023 |
Cybersecurity Concerns in Surveillance Drones AA Sana Sultan , Madawi M. Aldaweesh , Lina Altayeb INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY 10 (Issue 12), 2022 | | 2022 |
On Securing Smart Agriculture Systems: A Data Aggregation Security Perspective T Almashat, G Alateeq, A Al-Turki, N Alqahtani, A Ara Smart Agriculture Automation Using Advanced Technologies: Data Analytics and …, 2021 | | 2021 |
An Empirical Study of Domain, Design and Security of Remote Health Monitoring Cyber-Physical Systems AA Albatool Al-Katrangi, Shahed Al-Kharsa, Einaas Kharsah Artificial Intelligence and Internet of Things 1, 279-300, 2021 | | 2021 |
Cyber-Security Track Committee I Almomani, MK Khan, L Maglaras, H Sallay, A Ara, M Waqas, AG Divanis, ... | | |
2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU)| 978-1-6654-0812-7/22/$31.00© 2022 IEEE| DOI: 10.1109/WIDS-PSU54548. 2022.00045 H Aboelnagah, E Afzal, A Ahmed, L AlAbduljabbar, A AlAjaji, SA AlAnsary, ... | | |