Mohammed Alkatheiri

About

Mohammed S Alkatheiri is an assistant professor in the Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Saudi Arabia. Currently, he is a Vice-dean for Graduate Studies and Scientific Research and Chair of Information Technology Department. His current research interest focuses on the area of cyber security, digital authentication, machine learning and pattern recognition, security in resource-constraint devices, and technological innovation management. Previously, he worked as a researcher in the Center of Excellence in Information Assurance at King Saud University, Riyadh, Saudi Arabia. Also, he served as consultant for national projects and joined Prince Muqrin Chair for Information Security Technology (PMC) along with government departments on National Information Security Strategy project as a security consultant. He received a bachelor’s degree in Computer Science from King Abdulaziz University, Jeddah, Saudi Arabi and his master’s degree in Communication Network Security from Beijing University of Aeronautics and Astronautics (Beihang), China. He was awarded with full-scholarship and finished his Ph.D. in Computer Science from Texas Tech University, USA.

Work

University of Jeddah
|

Assistant Professor

Saudi Arabia

Education

Mohammed Alkatheiri
United States of America

Ph.D

Publications

Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry

Published by

Electronics

Summary

journal-article

Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry

Published by

Electronics

Summary

journal-article

RETRACTED ARTICLE: PCOS—Privacy-Controlled Offloading Scheme for Secure Service Data Offloading in Edge-Internet of Things-Cloud Scenario

Published by

Arabian Journal for Science and Engineering

Summary

journal-article

Artificial intelligence assisted improved human-computer interactions for computer systems

Published by

Computers and Electrical Engineering

Summary

journal-article

Spectrum Handoff Aware AODV Routing Protocol for Cognitive Radio Vehicular Ad Hoc Networks

Published by

OpenAlex

Summary

other

Spectrum Handoff Aware AODV Routing Protocol for Cognitive Radio Vehicular Ad Hoc Networks

Published by

OpenAlex

Summary

other

Cooperative Caching Scheme for Machine-to-Machine Information-Centric IoT Networks

Published by

IEEE Canadian Journal of Electrical and Computer Engineering

Summary

journal-article

Fingerprinting of Relational Databases for Stopping the Data Theft

Published by

Electronics

Summary

journal-article

Secure opinion sharing for reputation-based systems in mobile ad hoc networks

Published by

OpenAlex

Summary

other

Secure opinion sharing for reputation-based systems in mobile ad hoc networks

Published by

OpenAlex

Summary

other

A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

Published by

IEEE Transactions on Industrial Informatics

Summary

journal-article

Emerging Computer Vision Based Machine Learning Issues for Smart Cities

Summary

book-chapter

A Subspace Pre-learning Approach to Fast High-Accuracy Machine Learning of Large XOR PUFs with Component-Differential Challenges

Published by

Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018

Summary

conference-paper

Big Data Dimensionality Reduction for Wireless Sensor Networks Using Stacked Autoencoders

Summary

book-chapter

Cognitive AODV routing protocol with novel channel-route failure detection

Published by

Multimedia Tools and Applications

Summary

journal-article

Cognitive AODV routing protocol with novel channel-route failure detection

Published by

Multimedia tools and applications

Summary

journal-article

LaHiIO: Accelerating Persistent Big Data Machine Learning via Latency Hiding IOs

Published by

Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018

Summary

conference-paper

A Subspace Pre-learning Approach to Fast High-Accuracy Machine Learning of Large XOR PUFs with Component-Differential Challenges

Published by

2018 IEEE International Conference on Big Data (Big Data)

Summary

other

LaHiIO: Accelerating Persistent Big Data Machine Learning via Latency Hiding IOs

Published by

2018 IEEE International Conference on Big Data (Big Data)

Summary

other

5G-WLAN Security

Published by

A Comprehensive Guide to 5G Security

Summary

other

5G-WLAN security

Published by

A Comprehensive Guide to 5G Security

Summary

book

A Memory Capacity-Aware Algorithm for Fast Clustering of Disk-Resident Big Datasets

Published by

Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017

Summary

conference-paper

A machine learning-based security vulnerability study on XOR PUFs for resource-constraint internet of things

Published by

Proceedings - 2018 IEEE International Congress on Internet of Things, ICIOT 2018 - Part of the 2018 IEEE World Congress on Services

Summary

conference-paper

A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things

Published by

2018 IEEE International Congress on Internet of Things (ICIOT)

Summary

other

AODV routing protocol for Cognitive radio access based Internet of Things (IoT)

Published by

Future Generation Computer Systems

Summary

journal-article

Abjad: Towards Interactive Learning Approach to Arabic Reading Based on Speech Recognition

Published by

Procedia Computer Science

Summary

journal-article

An experimental study of the state-of-the-art PUFs implemented on FPGAs

Published by

2017 IEEE Conference on Dependable and Secure Computing

Summary

conference-paper

An experimental study of the state-of-the-art PUFs implemented on FPGAs

Published by

2017 IEEE Conference on Dependable and Secure Computing

Summary

other

Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs

Published by

2017 IEEE Conference on Dependable and Secure Computing

Summary

conference-paper

Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs

Published by

2017 IEEE Conference on Dependable and Secure Computing

Summary

other

BAN logic-based security proof for mobile OTP authentication scheme

Published by

Lecture Notes in Electrical Engineering

Summary

book

AODV routing protocol under several routing attacks in MANETs

Published by

International Conference on Communication Technology Proceedings, ICCT

Summary

conference-paper

AODV routing protocol under several routing attacks in MANETs

Published by

2011 IEEE 13th International Conference on Communication Technology

Summary

other