Follow
Sultan Almuhammadi
Sultan Almuhammadi
King Fahd University of Petroleum and Minerals
Verified email at almuhammadi.com - Homepage
Title
Cited by
Cited by
Year
Information security maturity model for NIST cyber security framework
S Almuhammadi, M Alsaleh
Computer Science & Information Technology (CS & IT) 7 (3), 51-62, 2017
732017
A comparative analysis of AES common modes of operation
S Almuhammadi, I Al-Hejri
2017 IEEE 30th Canadian conference on electrical and computer engineering …, 2017
512017
A survey on recent approaches combining cryptography and steganography
S Almuhammadi, A Al-Shaaby
Computer Science Information Technology (CS IT), 63-74, 2017
332017
New single asymmetric error-correcting codes
S Al-Bassam, R Venkatesan, S Al-Muhammadi
IEEE Transactions on Information Theory 43 (5), 1619-1623, 1997
271997
Security and privacy using one-round zero-knowledge proofs
S Almuhammadi, C Neuman
Seventh IEEE International Conference on E-Commerce Technology (CEC'05), 435-438, 2005
242005
Better privacy and security in e-commerce: using elliptic curve-based zero knowledge proofs
S Almuhammadi, NT Sui, D McLeod
Proceedings. IEEE International Conference on e-Commerce Technology, 2004 …, 2004
232004
Detecting malicious user accounts using Canvas Fingerprint
A Abouollo, S Almuhammadi
2017 8th International Conference on Information and Communication Systems …, 2017
142017
A model for work distribution in global software development based on machine learning techniques
A Alsri, S Almuhammadi, S Mahmood
2014 Science and Information Conference, 399-403, 2014
92014
Selective information extraction from network traffic traces both encrypted and non-encrypted
A Ahmad, SA Almuhammadi
US Patent 11,838,330, 2023
82023
Vulnerability of virtual private networks to web fingerprinting attack
KMA Kamal, S Almuhammadi
Advances in Security, Networks, and Internet of Things: Proceedings from SAM …, 2021
82021
A single asymmetric error-correcting code with 2/sup 13/codewords of dimension 17
SA Al-Bassam, S Al-Muhammadi
IEEE Transactions on Information Theory 46 (1), 269-271, 2000
72000
The future of cryptocurrency blockchains in the quantum era
S Alghamdi, S Almuhammadi
2021 IEEE International Conference on Blockchain (Blockchain), 544-551, 2021
62021
Anomaly detection: Firewalls capabilities and limitations
S Alsehibani, S Almuhammadi
2018 International Conference on Computing Sciences and Engineering (ICCSE), 1-5, 2018
52018
NLFSR functions with optimal periods
S Almuhammadi, I Al-Hejri, GB Talib, A Gaamel
Computational Science and Its Applications–ICCSA 2018: 18th International …, 2018
42018
NetInfoMiner: High-level information extraction from network traffic
A Amro, S Almuhammadi, S Zhioua
2017 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2017
42017
Double-hashing operation mode for encryption
S Almuhammadi, A Amro
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017
42017
QUIC Network traffic classification using ensemble machine learning techniques
S Almuhammadi, A Alnajim, M Ayub
Applied Sciences 13 (8), 4725, 2023
32023
Intrusion detection on Quic Traffic: A machine learning approach
L Al-Bakhat, S Almuhammadi
2022 7th International Conference on Data Science and Machine Learning …, 2022
32022
Double-hashing operation mode for encryption
SA Almuhammadi, A Amro
US Patent 10,887,080, 2021
32021
Performance and Security Tradeoffs in Cryptographic Hash Functions
S Almuhammadi, OM Bawazeer
International Journal of Interdisciplinary Telecommunications and Networking …, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20