Follow
Mustafa Kaiiali
Title
Cited by
Cited by
Year
A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware
AO Almashhadani, M Kaiiali, S Sezer, P O’Kane
IEEE access 7, 47053-47067, 2019
682019
Designing a secure exam management system (SEMS) for M-learning environments
M Kaiiali, A Ozkaya, H Altun, H Haddad, M Alier
IEEE Transactions on Learning Technologies 9 (3), 258-271, 2016
482016
A new mobile-based multi-factor authentication scheme using pre-shared number, GPS location and time stamp
UA Abdurrahman, M Kaiiali, J Muhammad
2013 International Conference on Electronics, Computer and Computation …, 2013
252013
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning
AO Almashhadani, M Kaiiali, D Carlin, S Sezer
Computers & Security 93, 101787, 2020
242020
Trust management for public key infrastructures: Implementing the X. 509 trust broker
AS Wazan, R Laborde, DW Chadwick, F Barrere, A Benzekri, M Kaiiali, ...
Security and Communication Networks 2017, 2017
122017
Rank-based genetic algorithm with limited iteration for grid scheduling
W Abdulal, O Al Jadaan, A Jabas, S Ramachandram, M Kaiiali, CR Rao
2009 First International Conference on Computational Intelligence …, 2009
122009
Design of a structured fine-grained access control mechanism for authorizing grid resources
M Kaiiali, R Wankar, CR Rao, A Agarwal
2008 11th IEEE International Conference on Computational Science and …, 2008
102008
A secure data outsourcing scheme based on AsmuthBloom secret sharing
YI Muhammad, M Kaiiali, A Habbal, AS Wazan, A Sani Ilyasu
Enterprise Information Systems 10 (9), 1001-1023, 2016
92016
Grid authorization graph
M Kaiiali, R Wankar, CR Rao, A Agarwal, R Buyya
Future Generation Computer Systems 29 (8), 1909-1918, 2013
92013
Enhancing the hierarchical clustering mechanism of storing resources’ security policies in a grid authorization system
M Kaiiali, R Wankar, CR Rao, A Agarwal
International Conference on Distributed Computing and Internet Technology …, 2010
92010
New efficient tree-building algorithms for creating HCM decision tree in a grid authorization system
M Kaiiali, R Wankar, CR Rao, A Agarwal
2010 Second International Conference on Network Applications, Protocols and …, 2010
82010
Cloud-based online social network
SI Auwal, SI Faisal, IM Yusuf, H Altun, M Kaiiali, AS Wazan
2013 International Conference on Electronics, Computer and Computation …, 2013
72013
A rough set based PCM for authorizing grid resources
M Kaiiali, R Wankar, CR Rao, A Agarwal
2010 10th International Conference on Intelligent Systems Design and …, 2010
62010
Cloud computing in the quantum era
M Kaiiali, S Sezer, A Khalid
2019 IEEE Conference on Communications and Network Security (CNS), 1-4, 2019
42019
BIND: An indexing strategy for big data processing
A Habbal, FB Adamu, S Hassan, R Les Cottrell, B White, M Kaiiali, ...
TENCON 2017-2017 IEEE Region 10 Conference, 645-650, 2017
42017
A Cloud-based Architecture for Mitigating Privacy Issues in Online Social Networks
M Kaiiali, A Iliyasu, AS Wazan, A Habbal, YI Muhammad
International Arab Journal of Information Technology, 2019
32019
Concurrent HCM for authorizing grid resources
M Kaiiali, C Raghavendra Rao, R Wankar, A Agarwal
International Conference on Distributed Computing and Internet Technology …, 2012
32012
Weighted grid authorization graph (WGAG)
S Namane, M Kaiiali, N Ghoualmi, R Wankar, CR Rao, S Sezer
2017 Sixth International Conference on Communications and Networking (ComNet …, 2017
22017
Designing a VM-level vertical scalability service in current cloud platforms: a new hope for wearable computers
M Kaiiali
Turkish Journal of Electrical Engineering and Computer Sciences 25 (4), 2555 …, 2017
22017
Cross-Domain, Single Resource Authorization using HCM
M Kaiiali, CR Rao, R Wankar, A Agarwal
The International Technology Management Conference (ITMC2015), 54, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20