scispace - formally typeset
A

Amer Aljaedi

Researcher at Information Technology University

Publications -  47
Citations -  258

Amer Aljaedi is an academic researcher from Information Technology University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 4, co-authored 27 publications receiving 77 citations. Previous affiliations of Amer Aljaedi include University of Colorado Boulder & University of Colorado Colorado Springs.

Papers
More filters
Journal ArticleDOI

A Survey on MAC Protocol Approaches for Underwater Wireless Sensor Networks

TL;DR: A survey of the state of the art of the recent development of MAC protocols for UWSNs from recent literature is presented and the performance of four different MAC protocol approaches are compared to identify the most suitable one for the underwater oil/gas pipelines application.
Proceedings ArticleDOI

Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging

TL;DR: The impact and limitations of the conventional volatile forensic method, live response, in comparison to the alternative method, memory image analysis, are presented and the capabilities of both methods in retrieving and recovering volatile data are called attention.
Journal ArticleDOI

AES Based White Box Cryptography in Digital Signature Verification

TL;DR: White-box cryptosystems as mentioned in this paper have been used to protect the protected information and keys against black-box attacks and protect sensitive information in the context of white-box cryptographic primitives.
Journal ArticleDOI

Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation

TL;DR: In this paper, the authors proposed a Boltzmann machine (BMKG)-based encryption algorithm for securing 5G-enabled IoT device network environment and compared various asymmetric algorithms for key exchange.
Journal ArticleDOI

Predicting Rogue Content and Arabic Spammers on Twitter

Adel R. Alharbi, +1 more
- 30 Oct 2019 - 
TL;DR: This work collected a pure data set from spam accounts producing Arabic tweets, and applied lightweight feature engineering based on rogue content and user profiles to develop adaptive spam detection methods.