Ali Al Shidhani
Ali Al Shidhani
University of British Columbia - Sultan Qaboos University - The Research Council
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Smartphone forensics analysis: A case study
M Al-Hadadi, A AlShidhani
International Journal of Computer and Electrical Engineering 5 (6), 576, 2013
IEEE 802.11 wireless LAN security overview
AM Al Naamany, A Al Shidhani, H Bourdoucen
Ijcsns 6 (5B), 138, 2006
Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers
AA Al Shidhani, VCM Leung
IEEE transactions on dependable and secure computing 8 (5), 699-713, 2010
Pre-authentication schemes for UMTS-WLAN interworking
A Al Shidhani, VCM Leung
EURASIP Journal on Wireless Communications and Networking 2009, 1-16, 2009
Reducing re-authentication delays during UMTS-WLAN vertical handovers
A Al Shidhani, VCM Leung
2008 IEEE 19th international symposium on personal, indoor and mobile radio …, 2008
Secure and efficient multi-hop mobile IP Registration scheme for MANET-Internet integrated architecture
A Al Shidhani, VCM Leung
2010 IEEE Wireless Communication and Networking Conference, 1-6, 2010
Local fast re-authentication protocol for 3G-WLAN interworking architecture
A Al Shidhani, VCM Leung
2007 wireless telecommunications symposium, 1-8, 2007
Smartphone security awareness: Time to act
M Al-Hadadi, A Al Shidhani
2013 international conference on current trends in information technology …, 2013
NavEye: Smart guide for blind students
HA AlAbri, AM AlWesti, MA AlMaawali, AA AlShidhani
2014 Systems and Information Engineering Design Symposium (SIEDS), 141-146, 2014
Local fast re-authentication for 3G-WLAN interworking.
A Al Shidhani, VCM Leung
Secur. Commun. Networks 1 (4), 309-323, 2008
Geosteering and drilling challenges in a faulted reservoir northern Oman
RO Vasquez Bautista, VC Gonzalez, A El Hawy, A Al Zarafi, A Al Busaidi, ...
IADC/SPE Asia Pacific Drilling Technology Conference and Exhibition …, 2018
Prediction of oil well flowing bottom-hole pressure in petroleum fields
M Awadalla, H Yousef, A Al-Hinai, A Al-Shidani
Proceedings of the International Conference on Industrial Engineering and …, 2016
Local fast re‐authentication for 3G‐WLAN interworking
AA Shidhani, VCM Leung
Security and Communication Networks 1 (4), 309-323, 2008
Cyber Defense Maturity Levels and Threat Models for Smart Cities
AA Al Shidhani
International Journal of Information Security and Privacy (IJISP) 13 (2), 32-46, 2019
Artificial intelligent techniques for flow bottom hole pressure prediction
M Awadalla, H Yousef, A Al-Shidani, A Al-Hinai
Int J Comput Ampl Tech 15 (12), 7263-7283, 2016
Secured fast link-layer handover protocols for 3G-WLAN interworking architecture
A Al Shidhani, VCM Leung
The Fourth International Conference on Heterogeneous Networking for Quality …, 2007
On determination of LFSR structures to assure more reliable and secure designs of cryptographic systems
A Ahmad, S Arora, A Al Maashri, SS Al-Busaidi, A Al Shidhani
Proceedings of 3rd International Conference on Reliability, Infocom …, 2014
Enhancing the performance of secured handover protocols in UMTS-WiMAX interworking
A Al Shidhani, VCM Leung
Wireless Networks 16, 1929-1943, 2010
Al Naamany, Ali Al Shidhani, hadj Bourdoucen" IEEE 802.11 Wireless LAN Security Overview
M Ahmad
IJCSNS 6 (5B), 2006
A comparative analysis of open source network monitoring tools
A Al Shidhani, K Al Maawali, D Al Abri, H Bourdoucen
International Journal of Open Source Software and Processes (IJOSSP) 7 (2), 1-19, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20