رمز بسيط، تكوّن من سلسلة روابط مُحاطة بدائرة، وهي رمز شائع للاتصال أو الارتباط التشعبي. تم تحديد خطوط الأيقونة بلون أسود داكن على الخلفية، مع إضافة عناصر عسكرية من الهوية الوطنية السعودية مثل الغترة والشماع والبشت السعودي، لتعكس الطابعة المحلية المميزة لجامعة القصيم.
روابط المواقع الالكترونية الرسمية التعليمية السعودية تنتهي بـ edu.sa
جميع روابط المواقع الرسمية التعليمية التابعة للجهات الحكومية في المملكة العربية السعودية تنتهي بـ .edu.sa
علامة لفتة سوداء اللون من الجلد البسيط، قبضة بدائرة سوداء، يعلوها رسم واضحي لغترة سعودية مع شماع وعقال، تبرز معالم البشت السعودي في. يرمز هذا التصميم إلى مفهوم الأمان وخصوصية البيانات الرقمية يعكس هوية جامعة القصيم.
المواقع الالكترونية الحكومية تستخدم بروتوكول HTTPS للتشفير و الأمان.
المواقع الالكترونية الآمنة في المملكة العربية السعودية تستخدم بروتوكول HTTPS للتشفير.
هيئة الحكومة الرقمية

أعضاء هيئة التدريس

المحتوى

اطلاق تجريبي

يرتدي رجل يرتدي زيًا أبيض تقليديًا مع شماغ سعودي أحمر وأبيض داخل أحد المباني، مسجون في الكاميرا بتعبير حيادي كما لو كان يلتقط صورة لملف أعضاء هيئة التدريس في جامعة القصيم.
صورة عضو هيئة التدريس

عبداللطيف عبدالرحمن فهد العبداللطيف

أستاذ مشارك
الكلية: ،
قسم

البيانات الشخصية

    المؤهلات العلمية

    • درجة البكالوريوس في علوم الحاسب الآلي - جامعة القصيم - المملكة العربية السعودية
    • درجة الماجستير في علوم الحاسب الآلي - جامعة RMIT - استراليا
    • درجة الدكتوراه في أمن المعلومات -  جامعة RMIT - استراليا

    الاهتمامات البحثية

    • أمن المعلومات - أنترنت الأشياء - الحوسبة السحابية

    الأبحاث المنشورة

    • The internet of things security: A survey encompassing unexplored areas and new insights (2022-01-01)
    • A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities (2021-01-01)
    • Security of blockchain and AI-empowered smart healthcare: application-based analysis (2022-01-01)
    • Secure edge of things for smart healthcare surveillance framework (2019-01-01)
    • Towards an intelligent intrusion detection system to detect malicious activities in cloud computing (2023-01-01)
    • Privacy‐preserving federated learning cyber‐threat detection for intelligent transport systems with blockchain‐based security (2023-01-01)
    • Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption (2020-01-01)
    • Hybrid SVD-based image watermarking schemes: a review (2021-01-01)
    • Secure data analytics for cloud-integrated internet of things applications (2016-01-01)
    • Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey (2022-01-01)
    • Comparative performance evaluation of intrusion detection based on machine learning in in-vehicle controller area network bus (2021-01-01)
    • A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data (2023-01-01)
    • Hybrid cryptographic access control for cloud-based EHR systems (2016-01-01)
    • Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption (2017-01-01)
    • Integration of artificial intelligence (AI) with sensor networks: Trends, challenges, and future directions (2024-01-01)
    • Real-time secure health surveillance for smarter health communities (2018-01-01)
    • A deep-Q learning scheme for secure spectrum allocation and resource management in 6G environment (2022-01-01)
    • Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT) (2021-01-01)
    • SVBE: Searchable and verifiable blockchain-based electronic medical records system (2022-01-01)
    • Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform (2019-01-01)
    • Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities (2019-01-01)
    • Privacy‐preserving cloud‐based billing with lightweight homomorphic encryption for sensor‐enabled smart grid infrastructure (2017-01-01)
    • COVID-CGAN: efficient deep learning approach for COVID-19 detection based on CXR images using conditional GANs (2021-01-01)
    • Protection of electronic health records (EHRs) in cloud (2013-01-01)
    • Multi-criteria decision-making methods for the evaluation of the social internet of things for the potential of defining human behaviors (2024-01-01)
    • Privacy aware internet of medical things data certification framework on healthcare blockchain of 5G edge (2022-01-01)
    • Synergy of AI and blockchain to secure electronic healthcare records (2025-01-01)
    • Dronessl: Self-supervised multimodal anomaly detection in internet of drone things (2024-01-01)
    • Detection of Ponzi scheme on Ethereum using machine learning algorithms (2023-01-01)
    • Design and implementation: an IoT-framework-based automated wastewater irrigation system (2022-01-01)
    • Towards secure searchable electronic health records using consortium blockchain (2022-01-01)
    • Blockchain-based secure voting mechanism underlying 5G network: A smart contract approach (2023-01-01)
    • A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges (2025-01-01)
    • Towards an unsupervised feature selection method for effective dynamic features (2021-01-01)
    • A cognitive deception model for generating fake documents to curb data exfiltration in networks during cyber-attacks (2022-01-01)
    • Internet of Things Authentication Protocols: Comparative Study. (2024-01-01)
    • An energy-aware, highly available, and fault-tolerant method for reliable IoT systems (2021-01-01)
    • Mitigating the risks of malware attacks with deep Learning techniques (2023-01-01)
    • Leveraging artificial intelligence in blockchain-based e-health for safer decision making framework (2023-01-01)
    • A multi-layer semantic approach for digital forensics automation for online social networks (2022-01-01)
    • Internet-of-Things-enabled smart agriculture: security enhancement approaches (2024-01-01)
    • IoT-driven smart agriculture: security issues and authentication schemes classification (2024-01-01)
    • Machine learning model for offensive speech detection in online social networks slang content (2023-01-01)
    • GuardianAI: Privacy-preserving federated anomaly detection with differential privacy (2025-01-01)
    • CSVAG: Optimizing Vertical Handoff Using Hybrid Cuckoo Search and Genetic Algorithm-Based Approaches (2022-01-01)
    • Privacy-preserving data clustering in cloud computing based on fully homomorphic encryption (2017-01-01)
    • An exhaustive survey on authentication classes in the IoT environments (2024-01-01)
    • Bitcoin candlestick prediction with deep neural networks based on real time data (2021-01-01)
    • ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment. (2025-01-01)
    • A robust security detection strategy for next generation IoT networks (2025-01-01)
    • Security issues in internet of medical things (2024-01-01)
    • Analysis of deep learning-based intrusion detection systems in IoT environments (2025-01-01)
    • BlockPres IPFS: performance evaluation of blockchain based secure patients prescription record storage using IPFS for smart prescription management system (2025-01-01)
    • Deep learning-driven anomaly detection for IoMT-based smart healthcare systems (2024-01-01)
    • Privacy preserving cloud computation using Domingo-Ferrer scheme (2016-01-01)
    • Intelligent Transport System based Blockchain to Preventing Routing Attacks. (2023-01-01)
    • Fully homomorphic based privacy-preserving distributed expectation maximization on cloud (2020-01-01)
    • Developing food charity operations management system (2022-01-01)
    • Homomorphic encryption and collaborative machine learning for secure healthcare analytics (2025-01-01)
    • The global impact of artificial intelligence (2024-01-01)
    • Applications of Blockchain in Healthcare:: Review Study (2024-01-01)
    • A systematic literature review on task allocation and performance management techniques in cloud data center (2024-01-01)
    • An efficient lightweight hybrid model with attention mechanism for enhancer sequence recognition (2022-01-01)
    • Adaptation of Federated Explainable Artificial Intelligence for Efficient and Secure E-Healthcare Systems. (2024-01-01)
    • Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme (2023-01-01)
    • An efficient dual encryption of iomt data using lightweight security scheme for cloud based iot environment (2023-01-01)
    • Secure and interoperable IoMT-based smart homes (2025-01-01)
    • Multi-criterial based feature selection for health care system (2024-01-01)
    • Lightblocks: A trusted lightweight signcryption and consensus scheme for industrial iot ecosystems (2024-01-01)
    • Efficient spectrum sharing in 5G and beyond network: a survey (2025-01-01)
    • Blockchain-assisted onion routing protocol for internet of underwater vehicle communication (2023-01-01)
    • Software defined network and graph neural network-based anomaly detection scheme for high speed networks (2025-01-01)
    • Neuro-VGNB: Transfer learning-based approach for detecting brain stroke (2024-01-01)
    • Steam computing paradigm: Cross‐layer solutions over cloud, fog, and edge computing (2024-01-01)
    • Adoption of blockchain to develop a deployable secure healthcare solution: An analysis (2024-01-01)
    • Fusion of artificial intelligence and game theory for resource allocation in non‐orthogonal multiple access‐assisted device‐to‐device cooperative communication (2023-01-01)
    • Hybrid cryptographic access control for cloud based electronic health records systems (2017-01-01)
    • Intelligent Transport Systems: Analysis of Applications, Security Challenges, and Robust Countermeasures. (2024-01-01)
    • The role of cybersecurity in confronting intellectual security threats (2023-01-01)
    • Integration of internet of things (IoT) and cloud computing: Privacy concerns and possible solutions (2018-01-01)
    • Integrated Bayesian and association-rules methods for autonomously orienting COVID-19 patients (2022-01-01)
    • EdgeSOM: Distributed hierarchical edge-driven IoT data analytics framework (2021-01-01)
    • Mitigating blackhole and greyhole routing attacks in vehicular ad hoc networks using blockchain based smart contracts (2024-01-01)
    • Evaluation study of elliptic curve cryptography scalar multiplication on raspberry Pi4 (2021-01-01)
    • Malware-SeqGuard: An Approach Utilizing LSTM and GRU for Effective Detection of Evolving Malware in Android Environments (2025-01-01)
    • Protecting Intellectual Security Through Hate Speech Detection Using an Artificial Intelligence Approach (2025-01-01)
    • Generalizability Assessment of Learning‐Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity (2025-01-01)
    • Privacy-preserving data analytics in cloud computing (2024-01-01)
    • Artificial intelligence-driven cyberbullying detection: A survey of current techniques (2024-01-01)
    • Practical hybrid confidentiality-based analytics framework with Intel SGX (2021-01-01)
    • ECB-MFA: ECC-enabled blockchain-based mutual authentication scheme for resource-constrained IoMT devices in smart healthcare environments (2025-01-01)
    • Blockchain-Envisioned Onion Routing Framework for Internet of Vehicles Communication toward 6G (2024-01-01)
    • Optimized stacked auto-encoder for unnecessary data reduction in cloud of things (2022-01-01)
    • Secure data analytics for IoT cloud-enabled framework using Intel SGX (2020-01-01)
    • A lightweight semi-centralized authentication scheme for Internet of drones (IoD) networks (2026-01-01)
    • Machine learning based dynamic trust estimation framework for Securing wireless sensor networks (2025-01-01)
    • GANCHEST: a multi-GAN-based framework for chest CXR image generation and validation (2025-01-01)
    • A comprehensive survey of contemporary anomaly detection methods for Securing smart IoT systems (2025-01-01)
    • Elliptic curve cryptography and biometrics for IoT authentication (2025-01-01)
    • Robust approach to improve link prediction accuracy in directed social networks based on ensemble learning models and advanced feature extraction tech‑niques (2025-01-01)
    • UFODMV: Unsupervised feature selection for online dynamic multi-views (2023-01-01)
    • IoT-Based Scalable Framework for Pollution Aware Route Recommendation (2022-01-01)
    • Fine-tuning SpeechT5 for tamazight text-to-speech: a foundation for educational technology in low-resource languages (2026-01-01)
    • A critical systematic review of ensemble learning methods for predictive healthcare (2026-01-01)
    • Explainable Intelligence and LLM-Based Secure Framework for Industrial Internet of Things (2026-01-01)
    • Internet of Things and Green Technologies for Smart Environment (2026-01-01)
    • Improved Computational Diffie-Hellman-Based Mechanism for Cyber-Physical Security (2026-01-01)
    • for Cyber-Physical Security (2026-01-01)
    • A Lightweight Sequential AI Framework for Real Time Intrusion Detection in Dynamic Vehicular Networks (2026-01-01)
    • Evaluating Deep Learning Approaches for Intrusion Detection in IoT Networks (2026-01-01)
    • HFXL-Model: A Hybrid Deep Learning and Ensemble Boosting Framework for Binary Intrusion Detection in IoT Networks (2025-01-01)
    • Privacy-preserving medical image encryption based on blockchain and IPFS in 6G-enabled healthcare systems (2025-01-01)
    • Graph-augmented transformer ensemble framework for robust and scalable fake news detection in social media ecosystems (2025-01-01)
    • A lightweight trusted framework for secure data exchange and threat mitigation in IoT-enabled healthcare environments (2025-01-01)
    • Quantum Envisioned Edge Key Distribution System for 6G Assisted Internet‐of‐Battlefield‐Things (2025-01-01)
    • Threat Modeling to Secure CPS‐Based Critical Infrastructures (2025-01-01)
    • Machine learning: enhanced dynamic clustering for privacy preservation and malicious node detection in industrial internet of things (2025-01-01)
    • Multi‐Generation Mixing–Based Network Coding for Reliable Data Dissemination in IoMT Environment (2025-01-01)
    • Federated Autoencoder Model for Secure Medical Image Analysis with Privacy Preservation and Assurance (2025-01-01)
    • Using Blockchain Technology in Healthcare Settings: Empowering Patients with Trustworthy Data (2025-01-01)
    • Blockchain‐Based Network Security Analysis Framework for Telesurgery Systems in Healthcare (2025-01-01)
    • A Comprehensive Study on Deep Learning Techniques for IoT Security (2025-01-01)
    • FedCognis: An Adaptive Federated Learning Framework for Secure Anomaly Detection in Industrial IoT-Enabled Cognitive Cities (2025-01-01)
    • Securing Healthcare Data in IoMT Using Hybrid Cryptosystem and Decentralized Storage Based Blockchain with IPFS (2025-01-01)
    • The Adoption of Artificial Intelligence for Higher Education Sustainability. (2025-01-01)
    • The Impact of Global Data Protection Laws on Cybersecurity Landscape (2024-01-01)
    • Smart Internet of Things for Environment and Healthcare (2024-01-01)
    • Rethinking urbanism in Doha: The Qatar National Museum transit-oriented development (2023-01-01)
    • Acknowledgment to the Reviewers of Electronics in 2022 (2023-01-01)
    • Correction to: Integrated Bayesian and association‑rules methods for autonomously orienting COVID‑19 patients (2022-01-01)
    • Computer and Information Sciences (2022-01-01)
    • AI-Driven Security for Next-Generation IoT Systems (2026-01-01)
    • A Lightweight Semi-Centralized (2026-01-01)
    • MOUNTAIN GAZELLE OPTIMIZED DEEP LEARNING MODEL FOR INTRUSION DETECTION AND MITIGATION IN CLOUD (2026-01-01)
    • MLSIA-LC: DEEP LEARNING-BASED MULTI-LEVEL SELF AND INTER-ATTENTION NETWORKS FOR LUNG CANCER CLASSIFICATION (2026-01-01)
    • COCKROACH SWARM OPTIMIZED SCHEDULE TASKING IN CLOUD ENVIRONMENT (2026-01-01)
    • ICWS 2025 Program Committee (2026-01-01)
    • WETICE 2021 Program Committee (2026-01-01)

    المواد التدريسية

    • مقرر التشفير CS452 - قسم علوم الحاسب - كلية الحاسب

    ملفات تعريف الارتباط

    هذا الموقع يستخدم ملفات تعريف الارتباط الخاصة لضمان سهولة الاستخدام، وتحسين تجربتك أثناء التصفح، كما يوضح الأحكام والسياسات المتعلقة بخصوصية المستخدم. من خلال الاستمرار في تصفح هذا الموقع، فإنك تقر بقبول استخدام ملفات تعريف الارتباط، وما جاء في سياسة الخصوصية