default search action
Ismail Mohamed Keshta
Person information
- affiliation: AlMaarefa University, Riyadh, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Ismail Keshta:
A CRC-Based Authentication Model and ECC-Based Authentication Protocol for Resource-Constrained IoT Applications. IEEE Access 12: 156765-156784 (2024) - [j25]Haewon Byeon, Mohammad Shabaz, Kapil Shrivastava, Anjali Joshi, Ismail Keshta, Rajvardhan Oak, Pavitar Parkash Singh, Mukesh Soni:
Deep learning model to detect deceptive generative adversarial network generated images using multimedia forensic. Comput. Electr. Eng. 113: 109024 (2024) - [j24]V. Mahalakshmi, Mukta Sandhu, Mohammad Shabaz, Ismail Keshta, K. D. V. Prasad, Nargiza Kuzieva, Haewon Byeon, Mukesh Soni:
Few-shot learning-based human behavior recognition model. Comput. Hum. Behav. 151: 108038 (2024) - [j23]Abdelhamid Zaïdi, Ismail Keshta, Zatin Gupta, Prachi Pundhir, Tripti Pandey, Praveen Kumar Rai, Mohammad Shabaz, Mukesh Soni:
Smart Implementation of Industrial Internet of Things Using Embedded Mechatronic System. IEEE Embed. Syst. Lett. 16(2): 190-193 (2024) - [j22]Haewon Byeon, Manoj Ram Tammina, Mukesh Soni, Nargiza Kuzieva, Latika Jindal, Ismail Keshta, Mrunalini Harish Kulkarni:
Enhancing online health consultations through fuzzy logic-integrated attribute-based encryption system. J. Intell. Fuzzy Syst. 46(4): 7677-7695 (2024) - [j21]Chaitanya Kulkarni, Aadam Quraishi, Mohan Raparthi, Mohammad Shabaz, Muhammad Attique Khan, Raj A. Varma, Ismail Keshta, Mukesh Soni, Haewon Byeon:
Hybrid disease prediction approach leveraging digital twin and metaverse technologies for health consumer. BMC Medical Informatics Decis. Mak. 24(1): 92 (2024) - [j20]Haewon Byeon, Vikas Raina, Mukta Sandhu, Mohammad Shabaz, Ismail Keshta, Mukesh Soni, Khaled Matrouk, Pavitar Parkash Singh, T. R. Vijaya Lakshmi:
Artificial intelligence-Enabled deep learning model for multimodal biometric fusion. Multim. Tools Appl. 83(33): 80105-80128 (2024) - [j19]Faiza Jahangir, Muhammad Attique Khan, Robertas Damasevicius, Fahad Alblehai, Ahmed Ibrahim Alzahrani, Mohammad Shabaz, Ismail Keshta, Yogadhar Pandey:
HGANet-23: a novel architecture for human gait analysis based on deep neural network and improved satin bowerbird optimization. Signal Image Video Process. 18(8-9): 5631-5645 (2024) - [j18]Nikhil Kumar Singh, Deepak Singh Tomar, Mohammad Shabaz, Ismail Keshta, Mukesh Soni, Divya Rishi Sahu, Manisha S. Bhende, Amit Kumar Nandanwar, Gagan Vishwakarma:
Self-Attention Mechanism-Based Federated Learning Model for Cross Context Recommendation System. IEEE Trans. Consumer Electron. 70(1): 2687-2695 (2024) - [c5]Haewon Byeon, Aadam Quraishi, Praveen Thuniki, Ismail Keshta, Mukesh Soni, Mohammad Shabaz:
Optimized Securty Mechanism for publicly Secret Key Sharing Over Cloud using Blockchain 137-150. SNSFAIT 2024: 137-150 - 2023
- [j17]Ismail Keshta, Mukesh Soni, Mohammed Wasim Bhatt, Azeem Irshad, Ali Rizwan, Shakir Khan, Renato R. Maaliw, Arsalan Muhammad Soomar, Mohammad Shabaz:
Energy efficient indoor localisation for narrowband internet of things. CAAI Trans. Intell. Technol. 8(4): 1150-1163 (2023) - [j16]Pradyumna Kumar Tripathy, Mohammad Shabaz, Abdelhamid Zaïdi, Ismail Keshta, Uttam Sharma, Mukesh Soni, Anurag Vijay Agrawal, Renato R. Maaliw III, D. P. Sharma:
Policy conflict detection approach for decision-making in intelligent industrial Internet of Things. Comput. Electr. Eng. 108: 108671 (2023) - [j15]Poonam Panwar, Mohammad Shabaz, Shah Nazir, Ismail Keshta, Ali Rizwan, R. Sugumar:
Generic Edge Computing System for Optimization and Computation Offloading of Unmanned Aerial Vehicle. Comput. Electr. Eng. 109(Part A): 108779 (2023) - [j14]Surjeet Dalal, M. Poongodi, Umesh Kumar Lilhore, Fadl Dahan, Thavavel Vaiyapuri, Ismail Keshta, Sultan Mesfer Aldossary, Amena Mahmoud, Sarita Simaiya:
Optimized LightGBM model for security and privacy issues in cyber-physical systems. Trans. Emerg. Telecommun. Technol. 34(6) (2023) - [j13]Jiao Ye, Hemant N. Patel, Sankaranamasivayam Meena, Renato R. Maaliw, Samuel-Soma M. Ajibade, Ismail Keshta:
Smart robots' virus defense using data mining technology. J. Intell. Syst. 32(1) (2023) - [j12]Ismail Keshta, Yassine Aoudni, Mukta Sandhu, Abha Singh, Pardayev Abdunabi Xalikovich, Ali Rizwan, Mukesh Soni, Sachin Lalar:
Blockchain aware proxy re-encryption algorithm-based data sharing scheme. Phys. Commun. 58: 102048 (2023) - [j11]Surjeet Dalal, Umesh Kumar Lilhore, Poongodi Manoharan, Uma Rani, Fadl Dahan, Fahima Hajjej, Ismail Keshta, Ashish Sharma, Sarita Simaiya, Kaamran Raahemifar:
An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering. Sensors 23(18): 7816 (2023) - [j10]Mukesh Soni, Nikhil Kumar Singh, Pranjit Das, Mohammad Shabaz, Piyush Kumar Shukla, Partha Sarkar, Shweta Singh, Ismail Keshta, Ali Rizwan:
IoT-Based Federated Learning Model for Hypertensive Retinopathy Lesions Classification. IEEE Trans. Comput. Soc. Syst. 10(4): 1722-1731 (2023) - 2022
- [j9]Shaik Shakeel Ahamad, Mohammed Alshehri, Ismail Keshta:
A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification. IEEE Access 10: 120227-120244 (2022) - [j8]Ismail Keshta:
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice. J. King Saud Univ. Comput. Inf. Sci. 34(2): 398-407 (2022) - [j7]Ammar Jamil Odeh, Ismail Keshta, Qasem Abu Al-Haija:
Analysis of Blockchain in the Healthcare Sector: Application and Issues. Symmetry 14(9): 1760 (2022) - [c4]Mustafa Al-Fayoumi, Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Tareq AlHajahjeh, Rana Abdulraheem:
Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study. CCWC 2022: 7-11 - [c3]Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Eman Abdelfattah:
Privacy and Security in Mobile Health Technologies: Challenges and Concerns. CCWC 2022: 65-71 - [c2]Rana Abdulraheem, Ammar Jamil Odeh, Mustafa Al-Fayoumi, Ismail Keshta:
Efficient Email phishing detection using Machine learning. CCWC 2022: 354-358 - 2021
- [c1]Ammar Jamil Odeh, Ismail Mohamed Keshta, Eman Abdelfattah:
Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges. CCWC 2021: 813-818 - 2020
- [j6]Ismail Mohamed Keshta, Mahmood Niazi, Mohammad R. Alshayeb:
Towards the implementation of requirements management specific practices (SP 1.1 and SP 1.2) for small- and medium-sized software development organisations. IET Softw. 14(3): 308-317 (2020) - [j5]Ammar Jamil Odeh, Ismail Mohamed Keshta, Eman Abdelfattah:
Efficient Detection of Phishing Websites Using Multilayer Perceptron. Int. J. Interact. Mob. Technol. 14(11): 22-31 (2020)
2010 – 2019
- 2019
- [j4]Ismail Mohamed Keshta:
Approaches to Software Process Improvement: A State-of-the-Art Review. J. Softw. 14(11): 519-529 (2019) - 2018
- [j3]Ismail Mohamed Keshta, Mahmood Niazi, Mohammad R. Alshayeb:
Towards Implementation of Process and Product Quality Assurance Process Area for Saudi Arabian Small and Medium Sized Software Development Organizations. IEEE Access 6: 41643-41675 (2018) - 2017
- [j2]Ismail Mohamed Keshta, Mahmood Niazi, Mohammad R. Alshayeb:
Towards Implementation of Requirements Management Specific Practices (SP1.3 and SP1.4) for Saudi Arabian Small and Medium Sized Software Development Organizations. IEEE Access 5: 24162-24183 (2017) - 2016
- [j1]Abdulaziz Barnawi, Ismail Mohamed Keshta:
Energy Management in Wireless Sensor Networks Based on Naive Bayes, MLP, and SVM Classifications: A Comparative Study. J. Sensors 2016: 6250319:1-6250319:12 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint