An anti-phishing approach that uses training intervention for phishing websites detection A Alnajim, M Munro 2009 Sixth International Conference on Information Technology: New …, 2009 | 108 | 2009 |
An evaluation of users' anti-phishing knowledge retention A Alnajim, M Munro 2009 International Conference on Information Management and Engineering, 210-214, 2009 | 41 | 2009 |
An approach to the implementation of the anti-phishing tool for phishing websites detection A Alnajim, M Munro 2009 International Conference on Intelligent Networking and Collaborative …, 2009 | 38 | 2009 |
Incremental path-selection and scheduling for time-sensitive networks A Alnajim, S Salehi, CC Shen 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 32 | 2019 |
An evaluation of users’ tips effectiveness for phishing websites detection A Alnajim, M Munro 2008 Third International Conference on Digital Information Management, 63-68, 2008 | 32 | 2008 |
Effects of technical abilities and phishing knowledge on phishing websites detection A Alnajim, M Munro Proc. the IASTED International Conference on Software Engineering (SE 2009 …, 2009 | 14 | 2009 |
Faults feature extraction using discrete wavelet transform and artificial neural network for induction motor availability monitoring—internet of things enabled environment M Zuhaib, FA Shaikh, W Tanweer, AM Alnajim, S Alyahya, S Khan, ... Energies 15 (21), 7888, 2022 | 13 | 2022 |
Enhanced anomaly detection system for iot based on improved dynamic SBPSO A Sarwar, AM Alnajim, SNK Marwat, S Ahmed, S Alyahya, WU Khan Sensors 22 (13), 4926, 2022 | 13 | 2022 |
Design and implementation: An iot-framework-based automated wastewater irrigation system S Habib, S Alyahya, M Islam, AM Alnajim, A Alabdulatif, A Alabdulatif Electronics 12 (1), 28, 2022 | 12 | 2022 |
Fighting Internet Fraud: Anti-Phishing Effectiveness for Phishing Websites Dectection. AM Alnajim Durham University, 2009 | 11 | 2009 |
A finite precision implementation of an image encryption scheme based on DNA encoding and binarized chaotic cores RA Elmanfaloty, AM Alnajim, E Abou-Bakr IEEE Access 9, 136905-136916, 2021 | 8 | 2021 |
Exploring cybersecurity education and training techniques: a comprehensive review of traditional, virtual reality, and augmented reality approaches AM Alnajim, S Habib, M Islam, HS AlRawashdeh, M Wasim Symmetry 15 (12), 2175, 2023 | 6 | 2023 |
Investigation of using captcha keystroke dynamics to enhance the prevention of phishing attacks EK Alamri, AM Alnajim, SA Alsuhibany Future Internet 14 (3), 82, 2022 | 6 | 2022 |
A country based model towards phishing detection enhancement A Alnajim International Journal of Innovative Technology and Exploring Engineering …, 2015 | 6 | 2015 |
Mitigating the Risks of Malware Attacks with Deep Learning Techniques AM Alnajim, S Habib, M Islam, R Albelaihi, A Alabdulatif Electronics 12 (14), 3166, 2023 | 5 | 2023 |
Hybrid chaotic-based PRNG for secure cryptography applications AM Alnajim, E Abou-Bakr, SS Alruwisan, S Khan, RA Elmanfaloty Applied Sciences 13 (13), 7768, 2023 | 5 | 2023 |
Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches A Majeed, AM Alnajim, A Waseem, A Khaliq, A Naveed, S Habib, M Islam, ... Future Internet 15 (6), 193, 2023 | 5 | 2023 |
Entice to trap: enhanced protection against a rate-aware intelligent jammer in cognitive radio networks K Ibrahim, AM Alnajim, A Naveed Malik, A Waseem, S Alyahya, M Islam, ... Sustainability 14 (5), 2957, 2022 | 5 | 2022 |
Traffic characteristics of virtual reality over edge-enabled wi-fi networks S Salehi, A Alnajim, X Zhu, M Smith, CC Shen, L Cimini arXiv preprint arXiv:2011.09035, 2020 | 5 | 2020 |
High level anti-phishing countermeasure: A case study AM Alnajim 2011 World Congress on Internet Security (WorldCIS-2011), 139-144, 2011 | 5 | 2011 |