الأبحاث المنشورة


عنوان البحثاسم المجلةموضوع البحثسنة النشرDOIالرابط الالكتروني
Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A SurveyJournal of Applied Security ResearchCybersecurity2022  زيارة الرابط
Feature-based Sentiment Analysis for Slang Arabic TextInternational Journal of Advanced Computer Science and ApplicationsInformation System2019  زيارة الرابط
A hybrid Secure Watermarking Scheme Using Nonnegative Matrix Factorization and Fast Walsh-Hadamard TransformJournal of Applied Security ResearchInformation System Security2019  زيارة الرابط
A new digital signature scheme with message recovery using hybrid problems,International Journal of Electrical and Computer Engineering (IJECE),Information System Security2019  زيارة الرابط
Hybrid Publicly Verifiable Authenticated Encryption Scheme based on Chaotic Maps and Factoring ProblemsJournal of Applied Security Research,Information System Security2018  زيارة الرابط
Automated labelling and severity prediction of software bug reportsInternational Journal of Computational Science and EngineeringPattern Recognition2018  زيارة الرابط
Local Patterns for Offline Arabic Handwritten RecognitionInternational Journal of Advanced Intelligence ParadigmsPattern Recognition2017  زيارة الرابط
Blind Users Assistive Technology Based on the Android PlatformInternational Journal of Innovative Computing and Applications (IJICA),Information System2017  زيارة الرابط
A Proxy Partially Blind Signature Approach Using Elliptic Curve CryptosystemInternational Journal of Mathematics in Operational ResearchInformation System Security2016  زيارة الرابط
Randomized Geographic-based Routing with Nearly Guaranteed Delivery for 3D Ad Hoc NetworkInternational Journal of Distributed Sensor NetworksNetwork2016  زيارة الرابط
An Index-Based Approach for Wireless Sensor NetworksJournal of Wireless Personal Communications, Network2015  زيارة الرابط
Breast Cancer Classification Comparative Performance Analysis of Image Shape-Based Features and Microarray Gene Expression DataInternational Journal of Bio-Science and Bio-Technology,Pattern Recognition2015  زيارة الرابط
Power Aware Ant Colony Routing Algorithm for Mobile Ad-hoc NetworksInternational Journal of Software Engineering and its Applications,Network2015  زيارة الرابط
Effective Diagnosis and Monitoring of Heart Disease," International Journal of Software Engineering and Its Applications, Pattern Recognition2015  زيارة الرابط
A Blind 3D Watermarking Technique Using Spherical Coordinates and Skewness MeasureInternational Journal of Security and networksSecurity2015  زيارة الرابط
Cluster-Based Online Routing Protocols for Ad Hoc NetworkInternational Journal of Information Technology and Web Engineering, Network2014  زيارة الرابط
An Intelligent System for Author Attribution Based on a Hybrid Feature SetInternational Journal of Advanced Inelligence Paradigms, Pattern Recognition2014  زيارة الرابط
A New signing algorithm based on elliptic curve discrete logarithms and quadratic residue problemsItalian Journal of Pure and Applied Mathematics, Security2014  زيارة الرابط
Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes FingerprintingInternational Journal of Information Technology and Web EngineeringSecurity2014  زيارة الرابط
Simplified approach for generating integrity tests in distributed database systemsInternational Journal of Innovation and LearningDatabase, Security2013  زيارة الرابط
Texture recognition by using a non-linear kernelInternational Journal of Computer Applications in TechnologyPattern Recognition, Multimedia 2013  زيارة الرابط
Simplified features for email authorship identificationInternational Journal of Security and networksSecurity2013  زيارة الرابط
Secure local algorithm for establishing a virtual backbone in 3D ad hoc networkInternational Journal of Networking and Virtual OrganizationsNetwork Security2013  زيارة الرابط
An Economic Model for Resource Adaptation in 2D Mesh Multicomputer NetworksInternational Journal of Computers and Their ApplicationNetwork Security2013  زيارة الرابط
Checking the efficiency of integrity tests in distributed and parallel databaseInternational Journal of Business Information SystemsDatabase, Security2012  زيارة الرابط
An energy-efficient threshold-based clustering protocol for wireless sensor networksJournal of Wireless Personal CommunicationsNetwork2012  زيارة الرابط
Enhanced fast spread replication strategy for data gridJournal of Network and Computer ApplicationsNetwork2011  زيارة الرابط
Video watermarking using wavelet transform and tensor algebraSignal, Image and Video Processing, Springer JournalMultimedia Security2010  زيارة الرابط
Watermarking 3D models using spectral mesh compressionSignal, Image and Video Processing, Springer JournalMultimedia Security2009  زيارة الرابط
Improved image watermarking scheme using fast Hadamard and discrete wavelet transformsJournal of Electronic ImagingMultimedia Security2007  زيارة الرابط