Ahmad S. Almogren

Ahmad S. Almogren
King Saud University | KKUH · Department of Computer Science

Doctor of Philosophy
Cybersecurity Chair, Director

About

208
Publications
86,346
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,801
Citations
Citations since 2016
176 Research Items
5743 Citations
201620172018201920202021202205001,0001,500
201620172018201920202021202205001,0001,500
201620172018201920202021202205001,0001,500
201620172018201920202021202205001,0001,500
Introduction
Almogren is the head of the Cybersecurity Chair and a Professor of Computer Science at the CCIS at King Saud University. He holds a master degree in computer science, a second master in software engineering and a doctorate in computer science from Southern Methodist University in the United States. He held many academic and administrative positions and worked as a consultant in many government agencies and the private sector. He supervises a number of doctorate, master and bachelor students.
Education
January 1994 - August 2002
Southern Methodist University
Field of study
  • Computer Science

Publications

Publications (208)
Article
Full-text available
Vehicular Ad-hoc Network (VANET) is a modern concept of transportation that was formulated by extending Mobile Ad-hoc Networks (MANETs). VANET presents diverse opportunities to modernize transportation to enhance safety, security, and privacy. Direct communication raises various limitations, most importantly, the overhead ratio. The most prominent...
Article
Full-text available
This research work aims at providing power quality improvement for the nonlinear load to improve the system performance indices by eliminating maximum total harmonic distortion (THD) and reducing neutral wire current. The idea is to integrate a shunt hybrid active power filter (SHAPF) with the system using machine learning control techniques. The s...
Article
Full-text available
Utilization of the Internet of Things and ubiquitous computing in medical apparatuses have “smartified” the current healthcare system. These days, healthcare is used for more than simply curing patients. A Smart Healthcare System (SHS) is a network of implanted medical devices and wearables that monitors patients in real-time to detect and avert po...
Article
Full-text available
The authenticity and integrity of healthcare is the primary objective. Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection. A trade-off between robustness, imperceptibilit...
Article
Internet of Cloud Things (IoCT) is a new era of technology introduced as an extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that allows access to the cloud that raises numerous privacy and security challenges. When devices access the cloud for storage or services that are provided by other cloud services, it...
Research
Full-text available
Breast cancer includes genetic and environmental factors and is the most prevalent malignancy in women contributing to the pathogenesis and progression of cancer. Breast cancer prognosis metastasizes towards bones, the liver, brain, and lungs, and is the main cause of death in patients. Furthermore, the selection of features and classification is s...
Article
Full-text available
This paper presents an intelligent system containing FSR-based posture detection using machine learning algorithms. This paper is aimed at detecting the sitting posture of a wheelchair user. Individuals using wheelchairs are at increased risk of pressure ulcers when they hold an incorrect position for too long because the blood supply desists at so...
Article
Full-text available
Internet of Things (IoT) provides a platform where nodes are connected through a wireless medium for sharing information. In IoT, some nodes cannot perform complex operations and computation, and require adequate processing power to perform such operations. To address such challenges, the concept of resource sharing becomes a notable solution by wh...
Article
Full-text available
A secure delegation has a key role in collaborative and dynamic systems, and it brings new challenges to security mechanisms. Secure delegation requires a flexible model that eliminates the challenges of access control and usage control services and provides separation of duty for static and dynamic circumstances. In this study, we propose a securi...
Article
Full-text available
The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devic...
Article
Full-text available
Nowadays, millions of telecommunication devices, IoT sensors, and web services, especially social media sites, are producing big data every second. Such applications with massive data-generating capabilities need to access these data quickly. Among other approaches, cloud computing provides content delivery networks, which utilize data replication...
Article
Full-text available
Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network. A novel privacy-preserving method for smart grid-based home area networks (HAN) is proposed in this research. To aggregate data from diverse household appliances, the proposed approach uses ho...
Article
Full-text available
Deep Neural Networks have offered numerous innovative solutions to brain-related diseases including Alzheimer’s. However, there are still a few standpoints in terms of diagnosis and planning that can be transformed via quantum Machine Learning (QML). In this study, we present a hybrid classical–quantum machine learning model for the detection of Al...
Article
Full-text available
In many smart devices and numerous digital applications, authentication mechanisms are widely used to validate the legitimacy of users’ identification. As a result of the increased use of mobile devices, most people tend to save sensitive and secret information over such devices. Personal Identification Number (PIN)-based and alphanumeric passwords...
Article
Identifying motor and mental imagery electroencephalography (EEG) signals is imperative to realizing automated, robust brain-computer interface (BCI) systems. In the present study, we proposed a pretrained convolutional neural network (CNN)-based new automated framework feasible for robust BCI systems with small and ample samples of motor and menta...
Article
Full-text available
The Internet is an essential part of daily life with the expansion of businesses for maximizing profits. This technology has intensely altered the traditional shopping style in online shopping. Convenience, quick price comparison, saving traveling time, and avoiding crowds are the reasons behind the abrupt adoption of online shopping. However, in m...
Article
Full-text available
An excessive use of non-linear devices in industry results in current harmonics that degrades the power quality with an unfavorable effect on power system performance. In this research, a novel control technique-based Hybrid-Active Power-Filter (HAPF) is implemented for reactive power compensation and harmonic current component for balanced load by...
Article
Full-text available
Obtaining outstanding electricity theft detection (ETD) performance in the realm of advanced metering infrastructure (AMI) and smart grids (SGs) is quite difficult due to various issues. The issues include limited availability of theft data as compared to benign data, neglecting dimensionality reduction, usage of the standalone (single) electricity...
Article
Full-text available
Internet of Underwater Things (IoUT) Networks are used to sense different aquatic parameters like temperature, pressure, pollution, etc. They are also used to forecast the ocean’s weather to collect information about natural disasters. However, they are easily compromised by attackers due to deployment in unattended environments. To overcome these...
Article
Local energy trading has attracted the attention of many researchers as a result of its promising benefits. These benefits include minimizing gas emission, reducing power shortage , and establishing a competitive energy market. However, the energy trading between several prosumers causes trust, security, and privacy challenges in energy systems. On...
Article
Full-text available
Wireless sensor networks (WSNs) are one of the fundamental infrastructures for Internet of Things (IoTs) technology. Efficient energy consumption is one of the greatest challenges in WSNs because of its resource-constrained sensor nodes (SNs). Clustering techniques can significantly help resolve this issue and extend the network's lifespan. In clus...
Article
Full-text available
Social communication has evolved, with e-mail still being one of the most common communication means, used for both formal and informal ways. With many languages being digitized for the electronic world, the use of English is still abundant. However, various native languages of different regions are emerging gradually. The Urdu language, coming fro...
Article
Full-text available
In this paper, Internet of Things (IoTs) devices are used for sensing the data through which the device owners earn revenue. Interested users can purchase data from IoT device owners, according to their demands. However, users are not confident about the quality of data they are purchasing. Moreover , the users do not rely on the device owner and a...
Article
Full-text available
The detection of secure vehicles for content placement in vehicle to vehicle (V2V) communications makes a challenging situation for a well-organized dynamic nature of vehicular ad hoc networks (VANET). With the increase in the demand of efficient and adoptable content delivery, information-centric networking (ICN) can be a promising solution for th...
Article
Full-text available
In literature, proposed approaches mostly focused on household appliances scheduling for reducing consumers' electricity bills, peak-to-average ratio, electricity usage in peak load hours, and enhancing user comfort level. The scheduling of smart home deployed energy resources recently became a critical issue on demand side due to a higher share of...
Article
Full-text available
Deep learning-based methodologies are significant to perform sentiment analysis on social media data. The valuable insights of social media data through sentiment analysis can be employed to develop intelligent applications. Among many networks, convolution neural networks (CNNs) are widely used in many conventional text classification tasks and pe...
Article
Full-text available
In recent studies, emphasis has been placed on optimal power flow (OPF) problems in traditional thermal, wind, and solar energy sources-based hybrid power systems. Various metaheuristic algorithms have been proposed to find optimal solutions to the OPF problems in the hybrid power system. The OPF, due to the quadratic nature of its primary objectiv...
Article
Full-text available
Over the past few years, Micro Grids (MGs) have gained much popularity due to two-way communication in the power network with special emphasis on Distributed Energy Resources (DERs), which comprise of both Renewable Energy Sources (RESs) and Nonrenewable Energy Sources (NRESs). Currently, the main focus of researchers is to deal with the intermitte...
Article
Full-text available
Vehicular Ad hoc Network (VANET) is a modern concept that enables network nodes to communicate and disseminate information. VANET is a heterogeneous network, due to which the VANET environment exposes to have various security and privacy challenges. In the future, the automobile industry will progress towards assembling electric vehicles containing...
Article
Full-text available
Vehicular Ad hoc Network (VANET) is a modern concept that enables network nodes to communicate and disseminate information. VANET is a heterogeneous network, due to which the VANET environment exposes to have various security and privacy challenges. In the future, the automobile industry will progress towards assembling electric vehicles containing...
Article
Full-text available
The deployment of the Millimeter-Wave (mm-Wave) band in 5G and beyond wireless communications networks is one of the emerging fields owing to its potential of providing extensive bandwidth. Frequency Hopping (FH) has a high potential for use in wireless networks due to its key advantages of spreading the interference over wide bandwidth and of prov...
Article
Full-text available
Electrical power consumption and distribution and ensuring its quality are important for industries as the power sector mandates a clean and green process with the least possible carbon footprint and to avoid damage of expensive electrical components. The harmonics elimination has emerged as a topic of prime importance for researchers and industry...
Article
Authentication receives enormous consideration from the research community and it is proven to be an interesting field in today's era. User authentication is the major concern because people have their private data on devices. To strengthen user authentication, passwords have been introduced. In the past, the text-based password was the traditional...
Article
Full-text available
Local energy trading has attracted the attention of many researchers as a result of its promising benefits. These benefits include minimizing gas emission, reducing power shortage, and establishing a competitive energy market. However, the energy trading between several prosumers causes trust, security, and privacy challenges in energy systems. On...
Article
The rapid advancement in information and communication technology has revolutionized military departments and their operations. This advancement also gave birth to the idea of the Internet of Battlefield Things (IoBT). The IoBT refers to the fusion of the Internet of Things (IoT) with military operations on the battlefield. Various IoBT-based frame...
Article
Full-text available
Internet of Things (IoT) is an emerging domain in which different devices communicate with each other through minimum human intervention. IoT devices are usually operated in hostile and unattended environments. Moreover, routing in current IoT architecture becomes inefficient due to malicious and unauthenticated nodes' existence, minimum network li...
Article
Full-text available
User authentication is one of the critical concerns of information security. Users tend to use strong textual passwords, but remembering complex passwords is hard as they often write them on a piece of paper or save it on their mobile phones. Textual passwords are slightly unprotected and are easily attackable. The attacks include a dictionary, sho...
Article
Full-text available
For dealing with the electricity theft detection in the smart grids, this article introduces a hybrid deep learning model. The model tackles various issues such as class imbalance problem, curse of dimensionality and low theft detection rate of the existing models. The model integrates the benefits of both GoogLeNet and gated recurrent unit (GRU)....
Article
Full-text available
Microgrids in smart grid development create a new era towards resilient energy supply, while rendering complicated cyber-physical system development towards high scalability and comprehensiveness. Heterogeneous Small Cell based Networks (HSCNs) endow a suitable cyber infrastructure for microgrid based cyber-physical systems. To tackle this emerging...
Article
Full-text available
Electrical capacitance tomography (ECT) has been used to measure flow by applying gas-solid flow in coal gasification, pharmaceutical, and other industries. ECT is also used for creating images of physically confined objects. The data collected by the acquisition system to produce images undergo blurring because of ambient conditions and the electr...
Article
The pervasiveness of newly introduced Internet-of-Things (IoT) devices has opened up new opportunities in healthcare systems, for example in facilitating remote patient monitoring. There are, however, security and privacy considerations in the transmission of data from these devices to the backend server, and across heterogeneous IoT networks. In t...
Article
The phenomenal increase in the usage of Internet promotes the quality of trust in the scope of Internet of Things (IoT). Trust is beneficial in the provision of an effective, reliable, scalable, and trustworthy environment to users of the IoT network, where they can share their private information with each other on a secure communication platform....
Preprint
Full-text available
Internet of Things (IoT) is bringing revolution into today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous as it provides autonomy to nodes that they can communicate among other nodes and can also exchange information at any period....
Article
Full-text available
Museums have adapted their traditional ways of providing services with the advent of novel digital technologies to match up with the pace and growing needs of current industry revolution. Mixed Reality has revitalized interpretation of numerous domains by offering immersive experiences in digital and real world. In the proposed study, an attempt wa...
Article
Full-text available
Social Internet of Things (SIoT) is a variation of social networks that adopt the property of peer-to-peer networks, in which connections between the things and social actors are automatically established. SIoT is a part of various organizations that inherit the social interaction, and these organizations include industries, institutions, and other...
Article
Internet of Things (IoT) consists of a huge number of sensors along with physical things to gather and forward data intelligently. Green IoT applications based on Wireless Sensor Networks (WSNs) are developed in various domains, such as medical, engineering, industry, and smart cities to grow the production. To increase the performance of sustainab...
Article
Full-text available
The adoption of the Internet of Things (IoT) technology is expanding exponentially because of its capability to provide a better service. This technology has been successfully implemented on various devices. The growth of IoT devices is massive at present. However, security is becoming a major challenge with this growth. Attacks, such as IoT-based...
Article
Full-text available
In Internet of Things (IoTs), the increase in the number of devices is directly proportional to the number of applications. The exponential growth of devices increases both the network complexity and risk against topology robustness. Moreover, the network is also prone to targeted and malicious attacks. In this paper, Enhanced Angle Sum Operation R...
Article
Full-text available
In this paper, two algorithms enhanced differential evolution (EDE) and adaptive EDE (AEDE) are proposed. The proposed algorithms improve the robustness of the IoT network without changing the degree distribution of nodes. The EDE algorithm maintains the diversity in a solution space through the tri-vector mutation operation and explores the hidden...
Article
Full-text available
In internet of things (IoTs), the increase in the number of devices is directly proportional to the number of applications. The exponential growth of devices increases both the network complexity and risk against topology robustness. Moreover, the network is also prone to targeted and malicious attacks. In this paper, enhanced angle sum operation R...
Article
Full-text available
The drastic increase in real-time vehicle generated data of various types has imparted a great concept of data trading in vehicular networks. Whereas immense usage of Electric Vehicles (EVs) as mobile energy carriers have supported distributed energy trading due to their bidirectional charging and discharging capabilities. The trustless environment...
Article
Full-text available
In Vehicular Ad-hoc Networks (VANET), vehicles act like mobile nodes for fetching, sharing, and disseminating important information related to vehicle safety, warning messages, emergency events, and passenger infotainment. Due to continuous information sharing of vehicles with their surrounding nodes, Road Side Units (RSUs), and infrastructures, th...
Article
Full-text available
In Vehicular Ad-hoc Networks (VANETs), a large amount of data is shared between vehicles and Road Side Units (RSUs) in real-time. VANETs assist in sharing traffic information effectively and timely to improve traffic efficiency and reliability. However, less storage capability and selfish behavior of the vehicles are important issues that need to b...
Article
Full-text available
Opportunistic routing is an emerging routing technology that was proposed to overcome the drawback of unreliable transmission, especially in Wireless Sensor Networks (WSNs). Over the years, many forwarder methods were proposed to improve the performance in opportunistic routing. However, based on existing works, the findings have shown that there i...
Article
Full-text available
Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR systems, the recognition accuracy of text is directly dependent on the quality of segmentation. In cursive text OCR systems, the segmentation of handwritten Urdu language text is a complex task because of the context sensitivity and diagonality of the text...
Article
Full-text available
For the last few years, computer-aided diagnosis (CAD) has been increasing rapidly. Numerous machine learning algorithms have been developed to identify different diseases, e.g., leukemia. Leukemia is a white blood cells- (WBC-) related illness affecting the bone marrow and/or blood. A quick, safe, and accurate early-stage diagnosis of leukemia pla...
Article
Smart Grid (SG) faces several challenges to efficiently transfer the power generated to power consumers. So, a robust monitoring tool is required to monitor the transmission lines in order to ensure security of the resource. This power transmission monitoring is a good example of ultra reliable low latency application of 5G with the aim to provide...
Article
Full-text available
Stochastic Internet of Things (IoT)-based communication behavior of the progressing world is tremendously impacting social networks. The growth of social networks helps to quantify the effect on the Social Internet of Things (SIoT). Multiple existences of two persons at several geographical locations in different time frames hint to predict the soc...