Published Researchs

Research TitleMAG. TITLERESEARCH AREAPUBLISH YEARDOIJournal URL
Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A SurveyJournal of Applied Security ResearchCybersecurity2022  Visit URL
Feature-based Sentiment Analysis for Slang Arabic TextInternational Journal of Advanced Computer Science and ApplicationsInformation System2019  Visit URL
A hybrid Secure Watermarking Scheme Using Nonnegative Matrix Factorization and Fast Walsh-Hadamard TransformJournal of Applied Security ResearchInformation System Security2019  Visit URL
A new digital signature scheme with message recovery using hybrid problems,International Journal of Electrical and Computer Engineering (IJECE),Information System Security2019  Visit URL
Hybrid Publicly Verifiable Authenticated Encryption Scheme based on Chaotic Maps and Factoring ProblemsJournal of Applied Security Research,Information System Security2018  Visit URL
Automated labelling and severity prediction of software bug reportsInternational Journal of Computational Science and EngineeringPattern Recognition2018  Visit URL
Local Patterns for Offline Arabic Handwritten RecognitionInternational Journal of Advanced Intelligence ParadigmsPattern Recognition2017  Visit URL
Blind Users Assistive Technology Based on the Android PlatformInternational Journal of Innovative Computing and Applications (IJICA),Information System2017  Visit URL
A Proxy Partially Blind Signature Approach Using Elliptic Curve CryptosystemInternational Journal of Mathematics in Operational ResearchInformation System Security2016  Visit URL
Randomized Geographic-based Routing with Nearly Guaranteed Delivery for 3D Ad Hoc NetworkInternational Journal of Distributed Sensor NetworksNetwork2016  Visit URL
An Index-Based Approach for Wireless Sensor NetworksJournal of Wireless Personal Communications, Network2015  Visit URL
Breast Cancer Classification Comparative Performance Analysis of Image Shape-Based Features and Microarray Gene Expression DataInternational Journal of Bio-Science and Bio-Technology,Pattern Recognition2015  Visit URL
Power Aware Ant Colony Routing Algorithm for Mobile Ad-hoc NetworksInternational Journal of Software Engineering and its Applications,Network2015  Visit URL
Effective Diagnosis and Monitoring of Heart Disease," International Journal of Software Engineering and Its Applications, Pattern Recognition2015  Visit URL
A Blind 3D Watermarking Technique Using Spherical Coordinates and Skewness MeasureInternational Journal of Security and networksSecurity2015  Visit URL
Cluster-Based Online Routing Protocols for Ad Hoc NetworkInternational Journal of Information Technology and Web Engineering, Network2014  Visit URL
An Intelligent System for Author Attribution Based on a Hybrid Feature SetInternational Journal of Advanced Inelligence Paradigms, Pattern Recognition2014  Visit URL
A New signing algorithm based on elliptic curve discrete logarithms and quadratic residue problemsItalian Journal of Pure and Applied Mathematics, Security2014  Visit URL
Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes FingerprintingInternational Journal of Information Technology and Web EngineeringSecurity2014  Visit URL
Simplified approach for generating integrity tests in distributed database systemsInternational Journal of Innovation and LearningDatabase, Security2013  Visit URL
Texture recognition by using a non-linear kernelInternational Journal of Computer Applications in TechnologyPattern Recognition, Multimedia 2013  Visit URL
Simplified features for email authorship identificationInternational Journal of Security and networksSecurity2013  Visit URL
Secure local algorithm for establishing a virtual backbone in 3D ad hoc networkInternational Journal of Networking and Virtual OrganizationsNetwork Security2013  Visit URL
An Economic Model for Resource Adaptation in 2D Mesh Multicomputer NetworksInternational Journal of Computers and Their ApplicationNetwork Security2013  Visit URL
Checking the efficiency of integrity tests in distributed and parallel databaseInternational Journal of Business Information SystemsDatabase, Security2012  Visit URL
An energy-efficient threshold-based clustering protocol for wireless sensor networksJournal of Wireless Personal CommunicationsNetwork2012  Visit URL
Enhanced fast spread replication strategy for data gridJournal of Network and Computer ApplicationsNetwork2011  Visit URL
Video watermarking using wavelet transform and tensor algebraSignal, Image and Video Processing, Springer JournalMultimedia Security2010  Visit URL
Watermarking 3D models using spectral mesh compressionSignal, Image and Video Processing, Springer JournalMultimedia Security2009  Visit URL
Improved image watermarking scheme using fast Hadamard and discrete wavelet transformsJournal of Electronic ImagingMultimedia Security2007  Visit URL