default search action
Eman H. Alkhammash
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Rami Ahmad, Eman H. Alkhammash:
Online Adaptive Kalman Filtering for Real-Time Anomaly Detection in Wireless Sensor Networks. Sensors 24(15): 5046 (2024) - 2022
- [j16]Muhammad Asif, Orooj Nazeer, Nadeem Javaid, Eman H. Alkhammash, Myriam Hadjouni:
Data Augmentation Using BiWGAN, Feature Extraction and Classification by Hybrid 2DCNN and BiLSTM to Detect Non-Technical Losses in Smart Grids. IEEE Access 10: 27467-27483 (2022) - [j15]Pamir, Nadeem Javaid, Umar Qasim, Adamu Sani Yahaya, Eman H. Alkhammash, Myriam Hadjouni:
Non-Technical Losses Detection Using Autoencoder and Bidirectional Gated Recurrent Unit to Secure Smart Grids. IEEE Access 10: 56863-56875 (2022) - [j14]Muhammad Umar Javed, Abid Jamal, Eman H. Alkhammash, Myriam Hadjouni, Saeed Ali Bahaj, Nadeem Javaid:
Secure Message Handling in Vehicular Energy Networks Using Blockchain and Artificially Intelligent IPFS. IEEE Access 10: 82063-82075 (2022) - [j13]Eman H. Alkhammash:
Trustworthy smart city systems using refinement and Event-B Theories. Multim. Tools Appl. 81(1): 615-636 (2022) - [j12]Mohammed Al-Sarem, Faisal Saeed, Eman H. Alkhammash, Norah Saleh Alghamdi:
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection. Sensors 22(1): 185 (2022) - [j11]Fuad A. Ghaleb, Faisal Saeed, Eman H. Alkhammash, Norah Saleh Alghamdi, Bander Ali Saleh Al-rimy:
A Fuzzy-Based Context-Aware Misbehavior Detecting Scheme for Detecting Rogue Nodes in Vehicular Ad Hoc Network. Sensors 22(7): 2810 (2022) - [j10]Safi Ullah, Jawad Ahmad, Muazzam Ali Khan, Eman H. Alkhammash, Myriam Hadjouni, Yazeed Ghadi, Faisal Saeed, Nikolaos Pitropakis:
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors 22(10): 3607 (2022) - [j9]Muhammad Shafiq, Zain Anwar Ali, Amber Israr, Eman H. Alkhammash, Myriam Hadjouni, Jari Juhani Jussila:
Convergence Analysis of Path Planning of Multi-UAVs Using Max-Min Ant Colony Optimization Approach. Sensors 22(14): 5395 (2022) - [p1]Eman H. Alkhammash, Wahiba Ben Abdessalem Karaa, Nesrine Bhouri, Saber Ben Abdessalem, Aboul Ella Hassanien:
Digital Twin Solutions for Textile Industry: Architecture, Services, and Challenges. Digital Twins for Digital Transformation 2022: 171-186 - 2021
- [j8]Zain Anwar Ali, Amber Israr, Eman H. Alkhammash, Myriam Hadjouni:
A Leader-Follower Formation Control of Multi-UAVs via an Adaptive Hybrid Controller. Complex. 2021: 9231636:1-9231636:16 (2021) - [j7]Wahiba Ben Abdessalem Karaa, Eman H. Alkhammash, Aida Bchir:
Drug Disease Relation Extraction from Biomedical Literature Using NLP and Machine Learning. Mob. Inf. Syst. 2021: 9958410:1-9958410:10 (2021) - [j6]Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam, Eman H. Alkhammash, Fuad A. Ghaleb, Faisal Saeed:
Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector Machine. Sensors 21(23): 8017 (2021) - [j5]Huda Osman, Maheyzah Md Siraj, Fuad A. Ghaleb, Faisal Saeed, Eman H. Alkhammash, Mohd Aizaini Maarof:
Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification. Wirel. Commun. Mob. Comput. 2021: 7154705:1-7154705:13 (2021) - 2020
- [j4]Eman H. Alkhammash:
Formal modelling of OWL ontologies-based requirements for the development of safe and secure smart city systems. Soft Comput. 24(15): 11095-11108 (2020)
2010 – 2019
- 2019
- [j3]Eman H. Alkhammash, Jari Jussila, Miltiadis D. Lytras, Anna Visvizi:
Annotation of Smart Cities Twitter Micro-Contents for Enhanced Citizen's Engagement. IEEE Access 7: 116267-116276 (2019) - 2015
- [j2]Eman H. Alkhammash, Michael J. Butler, Asieh Salehi Fathabadi, Corina Cîrstea:
Building traceable Event-B models from requirements. Sci. Comput. Program. 111: 318-338 (2015) - 2014
- [b1]Eman H. Alkhammash:
Towards a systematic process for modelling complex systems in event-B. University of Southampton, UK, 2014 - 2013
- [j1]Eman H. Alkhammash, Asieh Salehi Fathabadi, Michael J. Butler, Corina Cîrstea:
Building Traceable Event-B Models from Requirements. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 66 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint