scispace - formally typeset
M

Mohammad S. Obaidat

Researcher at University of Sharjah

Publications -  904
Citations -  15257

Mohammad S. Obaidat is an academic researcher from University of Sharjah. The author has contributed to research in topics: Wireless sensor network & Wireless network. The author has an hindex of 50, co-authored 847 publications receiving 11247 citations. Previous affiliations of Mohammad S. Obaidat include City College of New York & Fordham University.

Papers
More filters
Journal ArticleDOI

Verification of computer users using keystroke dynamics

TL;DR: This paper presents techniques to verify the identity of computer users using the keystroke dynamics of computer user's login string as characteristic patterns using pattern recognition and neural network techniques.
Journal ArticleDOI

A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles

TL;DR: This work studies a trajectory-based interaction time prediction algorithm to cope with an unstable network topology and high rate of disconnection in SIoVs and proposes a cooperative quality-aware system model, which focuses on a reliability assurance strategy and quality optimization method.
Proceedings ArticleDOI

BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records

TL;DR: A Blockchain-based framework for efficient storage and maintenance of EHRs is proposed that provides the secure and efficient access to medical data by patients, providers, and third parties, while preserving the patient private information.
Journal ArticleDOI

Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks

TL;DR: The proposed algorithm, named as learning automata-based congestion avoidance algorithm in sensor networks (LACAS), can counter the congestion problem in healthcare WSNs effectively and improves its performance significantly as time progresses.
Journal ArticleDOI

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing

TL;DR: A novel load balancing technique is proposed to authenticate the EDCs and find less loaded EDCs for task allocation and strengthens the security by authenticating the destination EDCs.