Dr. Raed Alsaqour
Dr. Raed Alsaqour
Associate Professor, Saudi Electronic University (SEU)
Verified email at
Cited by
Cited by
Vehicular communication ad hoc routing protocols: A survey
BT Sharef, RA Alsaqour, M Ismail
Journal of network and computer applications 40, 363-396, 2014
Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function
A Taha, R Alsaqour, M Uddin, M Abdelhaq, T Saba
IEEE access 5, 10369-10381, 2017
Cloud computing adoption model for universities to increase ICT proficiency
S Okai, M Uddin, A Arshad, R Alsaqour, A Shah
Sage Open 4 (3), 2158244014546461, 2014
Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic
R Alsaqour, M Abdelhaq, R Saeed, M Uddin, O Alsukour, M Al-Hubaishi, ...
Journal of Network and Computer Applications 47, 32-46, 2015
Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents.
M Uddin, AA Rahman, N Uddin, J Memon, RA Alsaqour, S Kazi
Int. J. Netw. Secur. 15 (2), 97-105, 2013
A local intrusion detection routing security over MANET network
M Abdelhaq, S Serhan, R Alsaqour, R Hassan
Electrical Engineering and Informatics (ICEEI), 2011 International …, 2011
Measuring efficiency of tier level data centers to implement green energy efficient data centers
M Uddin, A Shah, R Alsaqour, J Memon
Middle-East Journal of Scientific Research 15 (2), 200-207, 2013
Effect of network parameters on neighbor wireless link breaks in GPSR protocol and enhancement using mobility prediction model
RA Alsaqour, MS Abdelhaq, OA Alsukour
EURASIP Journal on Wireless Communications and Networking 2012 (1), 171, 2012
Deep learning for depression detection from textual data
A Amanat, M Rizwan, AR Javed, M Abdelhaq, R Alsaqour, S Pandya, ...
Electronics 11 (5), 676, 2022
Mobile ad hoc network energy cost algorithm based on artificial bee colony
M Tareq, R Alsaqour, M Abdelhaq, M Uddin
Wireless Communications and Mobile Computing 2017, 2017
Detecting Sleep Deprivation Attack over MANET Using a Danger Theory–Based Algorithm
M Abdelhaq, R Hassan, M Ismail, R Alsaqour, D Israf
International Journal on New Computer Architectures and Their Applications …, 2012
Security Routing Mechanism for Black Hole Attack over AODV MANET Routing Protocol
M Abdelhaq, S Serhan, R Alsaqour, A Satria
Australian Journal of Basic and Applied Sciences 5 (10), 1137-1145, 2011
Knowledge management framework using green IT to implement sustainable entrepreneur ecosystem
M Uddin, R Chand Hindu, R Alsaqour, A Shah, A Abubakar, T Saba
Applied Mathematics & Information Sciences 9 (5), 2703-2714, 2015
Mobile agent based multi-layer security framework for cloud data centers
M Uddin, J Memon, R Alsaqour, A Shah, MZA Rozan
Indian Journal of Science and Technology 8 (12), 1, 2015
Intrusion detection system to detect DDoS attack in gnutella hybrid P2P network
M Uddin, R Alsaqour, M Abdelhaq
Indian Journal of Science and Technology 6 (2), 71-83, 2013
Optimal deep learning based fusion model for biomedical image classification
RF Mansour, NM Alfar, S Abdel‐Khalek, M Abdelhaq, RA Saeed, ...
Expert Systems 39 (3), e12764, 2022
Hyperledger fabric blockchain: Secure and efficient solution for electronic health records
M Uddin, MS Memon, I Memon, I Ali, J Memon, M Abdelhaq, R Alsaqour
Computers, Materials & Continua 68 (2), 2377-2397, 2021
Enhanced binary exponential backoff algorithm for fair channel access in the ieee 802.11 medium access control protocol
M Al‐Hubaishi, T Alahdal, R Alsaqour, A Berqia, M Abdelhaq, O Alsaqour
International journal of communication systems 27 (12), 4166-4184, 2014
Simplified gateway selection scheme for multihop relay in vehicular ad hoc network
MA Alawi, RA Saeed, AA Hassan, RA Alsaqour
International Journal of Communication Systems 27 (12), 3855-3873, 2014
Femtocell network time synchronization protocols and schemes
MK Hasan, RA Saeed, AHA Hashim, S Islam, RA Alsaqour, TA Alahdal
Research Journal of Applied Sciences, Engineering and Technology 4 (23 …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20