Abdullah M. Algarni

Abdullah M. Algarni
King Abdulaziz University · Department of Computer Science

About

26
Publications
8,549
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
337
Citations

Publications

Publications (26)
Article
Full-text available
The implementation of AI-based healthcare communication systems presents a significant challenge for the development of cost-effective medical environments. Despite numerous approaches introduced internationally, the field continues to grapple with real-world issues, demands, and a rising number of unforeseen diseases stemming from vulnerabilities,...
Article
Full-text available
We live in a modern environment where learning does not have any barriers. Our work aims to become the main gateway for people of any interest to take advantage of the full opportunities of e-learning. We also built a dataset of e-learning courses from various sources and developed a platform that can understand search queries. We introduce a unifi...
Article
Full-text available
Distributed software applications are one of the most important applications currently used. Rising demand has led to a rapid increase in the number and complexity of distributed software applications. Such applications are also more vulnerable to different types of attacks due to their distributed nature. Detecting and addressing attacks is an ope...
Article
Full-text available
Sixth-generation (6G)-based communications have many applications and are emerging as a new system to utilize existing vehicles and communication devices in autonomous vehicles (AVs). Electric vehicles and AVs not supporting the integration of intelligent cybersecurity will become vulnerable, and their internal functions, features, and devices prov...
Article
Full-text available
The possible applications of communication based on big data have steadily increased in several industries, such as the autonomous vehicle industry, with a corresponding increase in security challenges, including cybersecurity vulnerabilities (CVs). The cybersecurity-related symmetry of big data communication systems used in autonomous vehicles may...
Article
Full-text available
Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to serious security and economic risks, especially regarding black markets. In the current era, this is a relationship that requires careful scrutiny from society as a whole. Therefore, in this study, we analyzed the actual data relating to vulnerability-re...
Article
Full-text available
Software-defined networking (SDN) has emerged as a flexible and programmable network architecture that takes advantage of the benefits of global visibility and centralized control over a network. One of the main properties of the SDN architecture is the ability to offer a northbound interface (NBI), which enables network applications to access the...
Article
Full-text available
The transportation industries forecast that by 2050 more than 50% of vehicles on the road will be autonomous vehicles, and automotive services will dynamically support all vehicles. All of them will be serviced using the latest technology, which includes the Software Defined Network (SDN) and available new generations (5G+ or 6G) at the time. Altho...
Article
Full-text available
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, developing and improving attack detection techniques are prominent methods to defend against cyb...
Article
Full-text available
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surfac...
Conference Paper
Full-text available
With the increasing computing power of processors, more complex web and mobile applications are being developed by the developers. To meet the consistent high standard software deliverables, software developers need to follow the software design life cycle as a standard practice. The conventional way suffers certain drawbacks in project management...
Article
Full-text available
Exascale computing systems (ECS) are anticipated to perform at Exaflop speed (10¹⁸ operations per second) using power consumption <20 MW. This ultrascale performance requires the speedup in the system by thousand‐fold enhancement in current Petascale. For future high‐performance computing (HPC), power consumption is one of the vital challenges face...
Conference Paper
In this paper, we introduce a translation tool that translates any sequential C++ source code into parallel source code written in C++ and OpenACC programming model. The tool generates different types of dependency graphs: class, method, loop, and block-of-statements graphs. The class and method dependency graphs are created for the sequential code...
Article
Full-text available
We recently noticed the advancement and growth in the field of artificial intelligence and in its various branches such as Machine Learning (ML) and Deep Learning in various vital fields such as robotics, smart cars, smart cities, health care, software engineering and many other fields. Software bug prediction are one of the most important ML uses...
Conference Paper
With the increasing progress of high performance computing infrastructure, it has become necessary to design and implement easy to use tools that are able to translate any legacy software application to parallel. A deep observation of the existing tools allowing such translation or conversion reveals that all of them are still far away from their e...
Article
Full-text available
The emerging high-performance computing (HPC) Exascale supercomputing system, which is anticipated to be available in 2020, will unravel many scientific mysteries. This extraordinary processing framework will accomplish a thousand-folds increment in figuring power contrasted with the current Petascale framework. The prospective framework will help...
Article
Full-text available
The emerging Exascale supercomputing system expected till 2020 will unravel many scientific mysteries. This extreme computing system will achieve a thousand-fold increase in computing power compared to the current petascale computing system. The forthcoming system will assist system designers and development communities in navigating from tradition...
Conference Paper
Injection attacks remain yet one of the major challenges in non-relational data stores or NoSQL databases. Indeed, such databases are intended to store big data and are classified into four categories; Key-values Stores, Wide Column Stores, Document Stores, and Graph Databases. The different vulnerabilities of these NoSQL databases have attracted m...
Conference Paper
Full-text available
Many security breaches have been reported in the past few years impacting both large and small organizations. There has often been considerable disagreement about the overall cost of such breaches. No significant formal studies have yet addressed this issue, though some proprietary approaches exist. A few computational models for evaluating partial...
Article
Full-text available
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaf...
Conference Paper
Full-text available
In this paper, we investigate the factors that motivate and enable successful vulnerability discovery and the role of vulnerability markets. This is done by studying the career, motivation and methods of the most successful vulnerability discoverers. Vulnerability discovery takes considerable expertise. Some vulnerabilities, if exploited, can cause...

Network

Cited By