Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges H Shakhatreh, AH Sawalmeh, A Al-Fuqaha, Z Dou, E Almaita, I Khalil, ... Ieee Access 7, 48572-48634, 2019 | 2280 | 2019 |
A survey of clustering algorithms for big data: Taxonomy and empirical analysis A Fahad, N Alshatri, Z Tari, A Alamri, I Khalil, AY Zomaya, S Foufou, ... IEEE transactions on emerging topics in computing 2 (3), 267-279, 2014 | 1336 | 2014 |
Applications of big data to smart cities E Al Nuaimi, H Al Neyadi, N Mohamed, J Al-Jaroodi Journal of Internet Services and Applications 6 (1), 1-15, 2015 | 1322 | 2015 |
Optimal deep learning lstm model for electric load forecasting using feature selection and genetic algorithm: Comparison with machine learning approaches S Bouktif, A Fiaz, A Ouni, MA Serhani Energies 11 (7), 1636, 2018 | 948 | 2018 |
Support vector machines for classification M Awad, R Khanna, M Awad, R Khanna Efficient learning machines: Theories, concepts, and applications for …, 2015 | 798 | 2015 |
Middleware: Middleware challenges and approaches for wireless sensor networks S Hadim, N Mohamed IEEE distributed systems online 7 (3), 1-1, 2006 | 754 | 2006 |
Smart cities: A survey on data management, security, and enabling technologies A Gharaibeh, MA Salahuddin, SJ Hussini, A Khreishah, I Khalil, M Guizani, ... IEEE Communications Surveys & Tutorials 19 (4), 2456-2501, 2017 | 669 | 2017 |
Blockchain in industries: A survey J Al-Jaroodi, N Mohamed IEEE access 7, 36500-36515, 2019 | 668 | 2019 |
A new intrusion detection system using support vector machines and hierarchical clustering L Khan, M Awad, B Thuraisingham The VLDB journal 16, 507-521, 2007 | 583 | 2007 |
The adoption of eCommerce communications and applications technologies in small businesses in New Zealand N Al-Qirim Electronic Commerce Research and Applications 6 (4), 462-473, 2007 | 563 | 2007 |
The global burden of cancer attributable to risk factors, 2010–19: a systematic analysis for the Global Burden of Disease Study 2019 KB Tran, JJ Lang, K Compton, R Xu, AR Acheson, HJ Henrikson, ... The Lancet 400 (10352), 563-591, 2022 | 559 | 2022 |
Classification and novel class detection in concept-drifting data streams under time constraints M Masud, J Gao, L Khan, J Han, BM Thuraisingham IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010 | 527 | 2010 |
A survey of load balancing in cloud computing: Challenges and algorithms K Al Nuaimi, N Mohamed, M Al Nuaimi, J Al-Jaroodi 2012 second symposium on network cloud computing and applications, 137-142, 2012 | 495 | 2012 |
Framework for role-based delegation models E Barka, R Sandhu proceedings 16th annual computer security applications conference (ACSAC'00 …, 2000 | 454 | 2000 |
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks I Khalil, S Bagchi, NB Shroff 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 447 | 2005 |
Unmanned aerial vehicles applications in future smart cities N Mohamed, J Al-Jaroodi, I Jawhar, A Idries, F Mohammed Technological forecasting and social change 153, 119293, 2020 | 424 | 2020 |
UAVs for smart cities: Opportunities and challenges F Mohammed, A Idries, N Mohamed, J Al-Jaroodi, I Jawhar 2014 international conference on unmanned aircraft systems (ICUAS), 267-273, 2014 | 402 | 2014 |
Cloud computing security: A survey IM Khalil, A Khreishah, M Azeem Computers 3 (1), 1-35, 2014 | 398 | 2014 |
Heavy hitter estimation over set-valued data with local differential privacy Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 389 | 2016 |
Image annotations by combining multiple evidence & wordnet Y Jin, L Khan, L Wang, M Awad Proceedings of the 13th annual ACM international conference on Multimedia …, 2005 | 360 | 2005 |