Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL |
Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey | Journal of Applied Security Research | Cybersecurity | 2022 | |
Visit URL
|
A hybrid Secure Watermarking Scheme Using Nonnegative Matrix Factorization and Fast Walsh-Hadamard Transform | Journal of Applied Security Research | Information System Security | 2019 | |
Visit URL
|
A new digital signature scheme with message recovery using hybrid problems, | International Journal of Electrical and Computer Engineering (IJECE), | Information System Security | 2019 | |
Visit URL
|
Feature-based Sentiment Analysis for Slang Arabic Text | International Journal of Advanced Computer Science and Applications | Information System | 2019 | |
Visit URL
|
Automated labelling and severity prediction of software bug reports | International Journal of Computational Science and Engineering | Pattern Recognition | 2018 | |
Visit URL
|
Hybrid Publicly Verifiable Authenticated Encryption Scheme based on Chaotic Maps and Factoring Problems | Journal of Applied Security Research, | Information System Security | 2018 | |
Visit URL
|
Blind Users Assistive Technology Based on the Android Platform | International Journal of Innovative Computing and Applications (IJICA), | Information System | 2017 | |
Visit URL
|
Local Patterns for Offline Arabic Handwritten Recognition | International Journal of Advanced Intelligence Paradigms | Pattern Recognition | 2017 | |
Visit URL
|
A Proxy Partially Blind Signature Approach Using Elliptic Curve Cryptosystem | International Journal of Mathematics in Operational Research | Information System Security | 2016 | |
Visit URL
|
Randomized Geographic-based Routing with Nearly Guaranteed Delivery for 3D Ad Hoc Network | International Journal of Distributed Sensor Networks | Network | 2016 | |
Visit URL
|
A Blind 3D Watermarking Technique Using Spherical Coordinates and Skewness Measure | International Journal of Security and networks | Security | 2015 | |
Visit URL
|
An Index-Based Approach for Wireless Sensor Networks | Journal of Wireless Personal Communications, | Network | 2015 | |
Visit URL
|
Breast Cancer Classification Comparative Performance Analysis of Image Shape-Based Features and Microarray Gene Expression Data | International Journal of Bio-Science and Bio-Technology, | Pattern Recognition | 2015 | |
Visit URL
|
Effective Diagnosis and Monitoring of Heart Disease," | International Journal of Software Engineering and Its Applications, | Pattern Recognition | 2015 | |
Visit URL
|
Power Aware Ant Colony Routing Algorithm for Mobile Ad-hoc Networks | International Journal of Software Engineering and its Applications, | Network | 2015 | |
Visit URL
|
A New signing algorithm based on elliptic curve discrete logarithms and quadratic residue problems | Italian Journal of Pure and Applied Mathematics, | Security | 2014 | |
Visit URL
|
An Intelligent System for Author Attribution Based on a Hybrid Feature Set | International Journal of Advanced Inelligence Paradigms, | Pattern Recognition | 2014 | |
Visit URL
|
Cluster-Based Online Routing Protocols for Ad Hoc Network | International Journal of Information Technology and Web Engineering, | Network | 2014 | |
Visit URL
|
Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes Fingerprinting | International Journal of Information Technology and Web Engineering | Security | 2014 | |
Visit URL
|
An Economic Model for Resource Adaptation in 2D Mesh Multicomputer Networks | International Journal of Computers and Their Application | Network Security | 2013 | |
Visit URL
|
Secure local algorithm for establishing a virtual backbone in 3D ad hoc network | International Journal of Networking and Virtual Organizations | Network Security | 2013 | |
Visit URL
|
Simplified approach for generating integrity tests in distributed database systems | International Journal of Innovation and Learning | Database, Security | 2013 | |
Visit URL
|
Simplified features for email authorship identification | International Journal of Security and networks | Security | 2013 | |
Visit URL
|
Texture recognition by using a non-linear kernel | International Journal of Computer Applications in Technology | Pattern Recognition, Multimedia | 2013 | |
Visit URL
|
An energy-efficient threshold-based clustering protocol for wireless sensor networks | Journal of Wireless Personal Communications | Network | 2012 | |
Visit URL
|
Checking the efficiency of integrity tests in distributed and parallel database | International Journal of Business Information Systems | Database, Security | 2012 | |
Visit URL
|
Enhanced fast spread replication strategy for data grid | Journal of Network and Computer Applications | Network | 2011 | |
Visit URL
|
Video watermarking using wavelet transform and tensor algebra | Signal, Image and Video Processing, Springer Journal | Multimedia Security | 2010 | |
Visit URL
|
Watermarking 3D models using spectral mesh compression | Signal, Image and Video Processing, Springer Journal | Multimedia Security | 2009 | |
Visit URL
|
Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms | Journal of Electronic Imaging | Multimedia Security | 2007 | |
Visit URL
|