default search action
Badiea Abdulkarem Mohammed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Zeyad Ghaleb Al-Mekhlafi, Jalawi Sulaiman Alshudukhi, Kawther A. Al-Dhlan:
HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks. IEEE Access 12: 6251-6261 (2024) - [j18]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing. IEEE Access 12: 33089-33099 (2024) - [j17]Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Ayman Khalil, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abeer Abdullah Alsadhan, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi:
Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications. IEEE Access 12: 71232-71247 (2024) - [j16]Zeyad Ghaleb Al-Mekhlafi, Saima Anwar Lashari, Jalal Mohammed Hachim Altmemi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing. IEEE Access 12: 100152-100166 (2024) - [j15]Zeyad Ghaleb Al-Mekhlafi, Saima Anwar Lashari, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi:
CLA-FC5G: A Certificateless Authentication Scheme Using Fog Computing for 5G-Assisted Vehicular Networks. IEEE Access 12: 141514-141527 (2024) - [j14]Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi:
Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models. IEEE Access 12: 148935-148960 (2024) - [j13]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Service based VEINS framework for vehicular Ad-hoc network (VANET): A systematic review of state-of-the-art. Peer Peer Netw. Appl. 17(4): 2259-2281 (2024) - 2023
- [j12]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Selvakumar Manickam, Zeyad Ghaleb Al-Mekhlafi, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Salih Alsaffar:
FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks. IEEE Access 11: 18571-18581 (2023) - [j11]Zeyad Ghaleb Al-Mekhlafi, Ebrahim Mohammed Senan, Jalawi Sulaiman Alshudukhi, Badiea Abdulkarem Mohammed:
Hybrid Techniques for Diagnosing Endoscopy Images for Early Detection of Gastrointestinal Disease Based on Fusion Features. Int. J. Intell. Syst. 2023: 1-20 (2023) - [j10]Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Salih Alsaffar, Taha H. Rassem:
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing. Sensors 23(7): 3543 (2023) - 2022
- [j9]Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed, Mohammed Al-Sarem, Faisal Saeed, Tawfik Al Hadhrami, Mohammad T. Alshammari, Abdulrahman Alreshidi, Talal Sarheed Alshammari:
Phishing Websites Detection by Using Optimized Stacking Ensemble Model. Comput. Syst. Sci. Eng. 41(1): 109-125 (2022) - [j8]Mahmood A. Al Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi:
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 22(13): 5026 (2022) - [j7]Ahmed Mahdi Jubair, Rosilah Hassan, Hasimi Sallehudin, Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed, Mohammad Salih Alsaffar:
VLMOO: A framework for benchmarking Variable-length Multiobjective Optimization problems with WSN focus. Softw. Impacts 11: 100204 (2022) - 2021
- [j6]Jalawi Sulaiman Alshudukhi, Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed:
A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography. IEEE Access 9: 15633-15642 (2021) - [c2]Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi:
Optimized Stacking Ensemble Model to Detect Phishing Websites. ACeS 2021: 379-388 - [c1]Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed:
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. ACeS 2021: 447-456 - 2020
- [j5]Khaled M. Alalayah, Reyazur Rashid Irshad, Taha H. Rassem, Badiea Abdulkarem Mohammed:
A New Fast Local Laplacian Completed Local Ternary Count (FLL-CLTC) for Facial Image Classification. IEEE Access 8: 98244-98254 (2020) - [j4]Jalawi Sulaiman Alshudukhi, Zeyad Ghaleb Al-Mekhlafi, Mohammad T. Alshammari, Badiea Abdulkarem Mohammed:
Desynchronization Traveling Wave Pulse-Coupled-Oscillator Algorithm Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks. IEEE Access 8: 196223-196234 (2020) - [j3]Jalawi Sulaiman Alshudukhi, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi:
Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC). IEEE Access 8: 222032-222040 (2020) - [j2]Jalawi Sulaiman Alshudukhi, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi:
An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks. IEEE Access 8: 226624-226636 (2020)
2010 – 2019
- 2013
- [j1]Badiea Abdulkarem Mohammed, Tat Chee Wan:
Handoff and Route Optimization in Mobile Networks over IEEE 802.16e. Int. J. Mob. Comput. Multim. Commun. 5(2): 32-45 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint