
Abdullah M. AlgarniKing Abdulaziz University · Department of Computer Science
Abdullah M. Algarni
About
26
Publications
8,549
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
337
Citations
Publications
Publications (26)
The implementation of AI-based healthcare communication systems presents a significant challenge for the development of cost-effective medical environments. Despite numerous approaches introduced internationally, the field continues to grapple with real-world issues, demands, and a rising number of unforeseen diseases stemming from vulnerabilities,...
We live in a modern environment where learning does not have any barriers. Our work aims to become the main gateway for people of any interest to take advantage of the full opportunities of e-learning. We also built a dataset of e-learning courses from various sources and developed a platform that can understand search queries. We introduce a unifi...
Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed nature. Detecting and addressing attacks is an ope...
Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and their internal functions, features, and devices prov...
The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase in security challenges, including cybersecurity vulnerabilities (CVs). The cybersecurity-related symmetry of big data communication systems used in autonomous vehicles may...
Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to serious security and economic risks, especially regarding black markets. In the current era, this is a relationship that requires careful scrutiny from society as a whole. Therefore, in this study, we analyzed the actual data relating to vulnerability-re...
Software-defined networking (SDN) has emerged as a flexible and programmable network architecture that takes advantage of the benefits of global visibility and centralized control over a network. One of the main properties of the SDN architecture is the ability to offer a northbound interface (NBI), which enables network applications to access the...
The transportation industries forecast that by 2050 more than 50% of vehicles on the road will be autonomous vehicles, and automotive services will dynamically support all vehicles. All of them will be serviced using the latest technology, which includes the Software Defined Network (SDN) and available new generations (5G+ or 6G) at the time. Altho...
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, developing and improving attack detection techniques are prominent methods to defend against cyb...
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surfac...
With the increasing computing power of processors, more complex web and mobile applications are being developed by the developers. To meet the consistent high standard software deliverables, software developers need to follow the software design life cycle as a standard practice. The conventional way suffers certain drawbacks in project management...
Exascale computing systems (ECS) are anticipated to perform at Exaflop speed (10¹⁸ operations per second) using power consumption <20 MW. This ultrascale performance requires the speedup in the system by thousand‐fold enhancement in current Petascale. For future high‐performance computing (HPC), power consumption is one of the vital challenges face...
In this paper, we introduce a translation tool that translates any sequential C++ source code into parallel source code written in C++ and OpenACC programming model. The tool generates different types of dependency graphs: class, method, loop, and block-of-statements graphs. The class and method dependency graphs are created for the sequential code...
We recently noticed the advancement and growth in the field of artificial intelligence and in its various branches such as Machine Learning (ML) and Deep Learning in various vital fields such as robotics, smart cars, smart cities, health care, software engineering and many other fields. Software bug prediction are one of the most important ML uses...
With the increasing progress of high performance computing
infrastructure, it has become necessary to design and implement
easy to use tools that are able to translate any legacy software
application to parallel. A deep observation of the existing tools
allowing such translation or conversion reveals that all of them are
still far away from their e...
The emerging high-performance computing (HPC) Exascale supercomputing system, which is anticipated to be available in 2020, will unravel many scientific mysteries. This extraordinary processing framework will accomplish a thousand-folds increment in figuring power contrasted with the current Petascale framework. The prospective framework will help...
The emerging Exascale supercomputing system expected till 2020 will unravel many scientific mysteries. This extreme computing system will achieve a thousand-fold increase in computing power compared to the current petascale computing system. The forthcoming system will assist system designers and development communities in navigating from tradition...
Injection attacks remain yet one of the major challenges in non-relational data stores or NoSQL databases. Indeed, such databases are intended to store big data and are classified into four categories; Key-values Stores, Wide Column Stores, Document Stores, and Graph Databases. The different vulnerabilities of these NoSQL databases have attracted m...
Many security breaches have been reported in the past few years impacting both large and small organizations. There has often been considerable disagreement about the overall cost of such breaches. No significant formal studies have yet addressed this issue, though some proprietary approaches exist. A few computational models for evaluating partial...
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaf...
In this paper, we investigate the factors that motivate and enable successful vulnerability discovery and the role of vulnerability markets. This is done by studying the career, motivation and methods of the most successful vulnerability discoverers. Vulnerability discovery takes considerable expertise. Some vulnerabilities, if exploited, can cause...