1. Aledhari, M., Marhoon, A., Hamad, A., & Saeed, F. (2017). A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services. Paper presented at the 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
2. Aledhari, M., Marhoon, A., Hamad, A., & Saeed, F. (2017). A New Cryptography Algorithm to Protect Cloud-based Healthcare Services. IEEE.
3. Bowen, Z., Li, W., Deng, P., Gérardy, L., Zhu, Q., & Shankar, N. (2015). Design and verification for transportation system security. Paper presented at the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
4. Cashion, J., & Bassiouni, M. (2011). Protocol for mitigating the risk of hijacking social networking sites. Paper presented at the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
5. Cashion, J., & Bassiouni, M. (2011). Protocol for Mitigating the Risk of Hijacking Social Networking Sites. IEEE.