-
1
Lattice-based ring signcryption for consortium blockchain
Published 2023-07-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
2
Corrigendum to “Effective and scalable black-box fuzzing approach for modern web applications” [J. King Saud Univ. Comp. Info. Sci. 34(10) (2022) 10068–10078]
Published 2024-11-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
3
Credit card fraud detection in the era of disruptive technologies: A systematic review
Published 2023-01-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
4
Semantic similarity on multimodal data: A comprehensive survey with applications
Published 2024-12-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
5
A Secured Cognitive Agent based Multi-strategic Intelligent Search System
Published 2018-04-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
6
Neuro-evolutionary models for imbalanced classification problems
Published 2022-06-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
7
ILA4: Overcoming missing values in machine learning datasets – An inductive learning approach
Published 2022-07-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
8
PSO based test case generation for critical path using improved combined fitness function
Published 2020-05-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
9
A rule-based stemmer for Arabic Gulf dialect
Published 2015-04-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
10
CFNet: Cross-scale fusion network for medical image segmentation
Published 2024-09-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
11
An UML profile for representing real-time design patterns
Published 2018-10-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
12
Multi-objective test suite optimization for detection and localization of software faults
Published 2022-06-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
13
Identifying the influential nodes in complex social networks using centrality-based approach
Published 2022-11-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
14
Improved Black Hole optimization algorithm for data clustering
Published 2022-09-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
15
An empirical study on the state-of-the-art methods for requirement-to-code traceability link recovery
Published 2024-07-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
16
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆
Published 2023-07-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
17
Systematic Literature Review of Social Media Bots Detection Systems
Published 2023-05-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
18
FACS: Fairness aware clustering scheme for monitoring applications of internet of things based wireless sensor networks
Published 2022-06-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
19
An algorithmic implementation of entropic ternary reduct soft sentiment set (ETRSSS) using soft computing technique on big data sentiment analysis (BDSA) for optimal selection of a...
Published 2022-05-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article -
20
Backtracking search optimization algorithm with dual scatter search strategy for automated test case generation
Published 2023-07-01“…Journal of King Saud University: Computer and Information Sciences…”
Get full text
Article