Security and privacy of electronic health records: Concerns and challenges I Keshta, A Odeh Egyptian Informatics Journal 22 (2), 177-183, 2021 | 267 | 2021 |
Towards implementation of requirements management specific practices (SP1. 3 and SP1. 4) for Saudi Arabian small and medium sized software development organizations I Keshta, M Niazi, M Alshayeb IEEE Access 5, 24162-24183, 2017 | 70 | 2017 |
Machine learningtechniquesfor detection of website phishing: A review for promises and challenges A Odeh, I Keshta, E Abdelfattah 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 65 | 2021 |
Analysis of blockchain in the healthcare sector: application and issues A Odeh, I Keshta, QA Al-Haija Symmetry 14 (9), 1760, 2022 | 51 | 2022 |
An experimental analysis of various machine learning algorithms for hand gesture recognition S Bhushan, M Alshehri, I Keshta, AK Chakraverti, J Rajpurohit, ... Electronics 11 (6), 968, 2022 | 44 | 2022 |
Efficient detection of phishing websites using multilayer perceptron A Odeh, I Keshta, E Abdelfattah International Association of Online Engineering, 2020 | 36 | 2020 |
AI-driven IoT for smart health care: Security and privacy issues I Keshta Informatics in medicine Unlocked 30, 100903, 2022 | 24 | 2022 |
Energy management in wireless sensor networks based on naïve bayes, MLP, and SVM classifications: A comparative study AY Barnawi, IM Keshta Journal of Sensors 2016, 2016 | 24 | 2016 |
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice I Keshta Journal of King Saud University-Computer and Information Sciences 34 (2 …, 2022 | 23 | 2022 |
PHIBOOST-a novel phishing detection model using Adaptive boosting approach A Odeh, I Keshta, E Abdelfattah Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021 | 23 | 2021 |
Towards implementation of process and product quality assurance process area for Saudi Arabian small and medium sized software development organizations I Keshta, M Niazi, M Alshayeb IEEE Access 6, 41643-41675, 2018 | 21 | 2018 |
Software cost estimation approaches: A survey IM Keshta Journal of Software Engineering and Applications 10 (10), 824, 2017 | 20 | 2017 |
Analytic hierarchy process based land suitability for organic farming in the arid region P Mangan, D Pandi, MA Haq, A Sinha, R Nagarajan, T Dasani, I Keshta, ... Sustainability 14 (8), 4542, 2022 | 17 | 2022 |
Hybrid model for precise hepatitis-C classification using improved random forest and SVM method UK Lilhore, P Manoharan, JK Sandhu, S Simaiya, S Dalal, AM Baqasah, ... Scientific Reports 13 (1), 12473, 2023 | 16 | 2023 |
Impact of COVID-19 pandemic on education: Moving towards e-learning paradigm A Odeh, I Keshta Int J Eval & Res Educ ISSN 2252 (8822), 8822, 2022 | 13 | 2022 |
& Simaiya, S. Optimized LightGBM model for security and privacy issues in cyber‐physical systems S Dalal, M Poongodi, UK Lilhore, F Dahan, T Vaiyapuri, I Keshta Transactions on Emerging Telecommunications Technologies, e4771, 0 | 13 | |
Blockchain aware proxy re-encryption algorithm-based data sharing scheme I Keshta, Y Aoudni, M Sandhu, A Singh, PA Xalikovich, A Rizwan, M Soni, ... Physical Communication 58, 102048, 2023 | 12 | 2023 |
Machine vision-based human action recognition using spatio-temporal motion features (STMF) with difference intensity distance group pattern (DIDGP) J Arunnehru, S Thalapathiraj, R Dhanasekar, L Vijayaraja, R Kannadasan, ... Electronics 11 (15), 2363, 2022 | 12 | 2022 |
A novel approach to face pattern analysis S Bhushan, M Alshehri, N Agarwal, I Keshta, J Rajpurohit, A Abugabah Electronics 11 (3), 444, 2022 | 12 | 2022 |
Towards the implementation of requirements management specific practices (SP 1.1 and SP 1.2) for small‐and medium‐sized software development organisations IM Keshta, M Niazi, M Alshayeb IET Software 14 (3), 308-317, 2020 | 12 | 2020 |