Abdullah Albuali
YOU?
Author Swipe
View article: Federated Learning for Cloud and Edge Security: A Systematic Review of Challenges and AI Opportunities
Federated Learning for Cloud and Edge Security: A Systematic Review of Challenges and AI Opportunities Open
The ongoing evolution of cloud computing requires sustained attention to security, privacy, and compliance issues. The purpose of this paper is to systematically review the current literature regarding the application of federated learning…
View article: Towards Effective Anomaly Detection: Machine Learning Solutions in Cloud Computing
Towards Effective Anomaly Detection: Machine Learning Solutions in Cloud Computing Open
View article: Quality of Experience Aware Service Selection Model to Empower Edge Computing in IoT
Quality of Experience Aware Service Selection Model to Empower Edge Computing in IoT Open
Quality of experience‐aware service selection can significantly remove well‐known scalability issues of an Internet of Things (IoT) architecture. In traditional IoT architecture, several heterogeneous data streams from connected nodes are …
View article: Towards blockchain based federated learning in categorizing healthcare monitoring devices on artificial intelligence of medical things investigative framework
Towards blockchain based federated learning in categorizing healthcare monitoring devices on artificial intelligence of medical things investigative framework Open
View article: Advancing Drone Operations through Lightweight Blockchain and Fog Computing Integration: A Systematic Review
Advancing Drone Operations through Lightweight Blockchain and Fog Computing Integration: A Systematic Review Open
This paper presents a systematic literature review investigating the integration of lightweight blockchain and fog computing technologies to enhance the security and operational efficiency of drones. With a focus on critical applications s…
View article: Hybrid optimization algorithm for enhanced performance and security of counter-flow shell and tube heat exchangers
Hybrid optimization algorithm for enhanced performance and security of counter-flow shell and tube heat exchangers Open
A shell and tube heat exchanger (STHE) for heat recovery applications was studied to discover the intricacies of its optimization. To optimize performance, a hybrid optimization methodology was developed by combining the Neural Fitting Too…
View article: A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT
A Systematic Literature Review of Zero Trust Architecture for UAV Security Systems in IoBT Open
Over the years, the need for autonomous systems such as drones, also known as unmanned aerial vehicles (UAVs), has significantly increased in popularity across several industries, including the military. The Internet of Battlefield Things …
View article: Forensic Examination of Drones: A Comprehensive Study of Frameworks, Challenges, and Machine Learning Applications
Forensic Examination of Drones: A Comprehensive Study of Frameworks, Challenges, and Machine Learning Applications Open
Unmanned Aerial Vehicles (UAVs) have evolved into necessary assets across various sectors, motivating a need for strong controllability technologies in applications like flight path enhancement and avoiding obstacles. This survey offers a …
View article: A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems
A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems Open
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors. Unmanned Aerial Vehicles (UAVs…
View article: Enhancing DoS Detection in WSNs Using Enhanced Ant Colony Optimization Algorithm
Enhancing DoS Detection in WSNs Using Enhanced Ant Colony Optimization Algorithm Open
The increasing use of Wireless Sensor Networks (WSNs) is leading to network traffic growth as data exchange among WSN nodes increases. Protecting WSNs from Denial of Service (DoS) attacks is essential for enhancing data security and avoidi…
View article: Cancer Diagnosis through Contour Visualization of Gene Expression Leveraging Deep Learning Techniques
Cancer Diagnosis through Contour Visualization of Gene Expression Leveraging Deep Learning Techniques Open
Prompt diagnostics and appropriate cancer therapy necessitate the use of gene expression databases. The integration of analytical methods can enhance detection precision by capturing intricate patterns and subtle connections in the data. T…
View article: Scalable Lightweight IoT-Based Smart Weather Measurement System
Scalable Lightweight IoT-Based Smart Weather Measurement System Open
The Internet of Things (IoT) plays a critical role in remotely monitoring a wide variety of different application sectors, including agriculture, building, and energy. The wind turbine energy generator (WTEG) is a real-world application th…