Muteb Al Zaidi

Muteb Al Zaidi
St. Vincent's Hospital / King Abdullah Medical City

MBBS / Saudi Board of General Surgery

About

4
Publications
1,327
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10
Citations
Additional affiliations
April 2019 - April 2021
St. Vincent's Hospital / King Abdullah Medical City
Position
  • Fellow
April 2019 - February 2021
St. Vincent's Hospital Melbourne
Position
  • Fellow
January 2019 - February 2021
St. Vincent's Hospital Melbourne
Position
  • Fellow

Publications

Publications (4)
Article
Full-text available
Robotic-assisted surgery, a technological advancement in the field of surgery, has become increasingly popular among surgeons of many specialties over time. Robotic-assisted thoracic surgery (RATS) is comparable to video-assisted thoracic surgery (VATS) in terms of patient care outcomes; however, the perception of increased operative time and a lac...
Article
Full-text available
Background: The decision for administering adjuvant chemotherapy (AC) in completely resected node-negative non-small cell lung cancer (NSCLC) is guided by likelihood of disease recurrence or death based on tumor, node, metastasis (TNM) stage. However, within each TNM stage are sub-groups of patients that are more or less likely to relapse than sta...
Article
Full-text available
One reason that lung cancer is the leading cause of cancer mortality worldwide, is that surgical intervention is highly dependent on earlier tumor stage and good patient condition. As large proportion of cases are already metastatic at presentation and many are locally advanced, curative surgery is only possible in a minority of fit patients. Incre...
Conference Paper
Full-text available
One advanced tactic used to deliver a malware payload to a target operating system is Dynamic Link Library (DLL) injection, which has the capabilities to bypass many security settings. In cases of compromise involving DLL injection, volatile memory contains critical evidence, as these attacks typically leave no footprint on the hard disk. In this p...

Network

Cited By