Alert correlation in collaborative intelligent intrusion detection systems—A survey HT Elshoush, IM Osman Applied Soft Computing 11 (7), 4349-4365, 2011 | 225 | 2011 |
Feature selection using information gain for improved structural-based alert correlation TA Alhaj, MM Siraj, A Zainal, HT Elshoush, F Elhaj PloS one 11 (11), e0166017, 2016 | 171 | 2016 |
An improved framework for intrusion alert correlation HT Elshoush, IM Osman Proceedings of the World Congress on Engineering 1, 1-6, 2012 | 46 | 2012 |
Reducing false positives through fuzzy alert correlation in collaborative intelligent intrusion detection systems—A review HT Elshoush, IM Osman International Conference on Fuzzy Systems, 1-8, 2010 | 35 | 2010 |
Breast cancer detection using machine learning approaches: a comparative study. MA Elsadig, A Altigani, HT Elshoush International Journal of Electrical & Computer Engineering (2088-8708) 13 (1), 2023 | 27 | 2023 |
A polymorphic advanced encryption standard–a novel approach A Altigani, S Hasan, B Barry, S Naserelden, MA Elsadig, HT Elshoush IEEE Access 9, 20191-20207, 2021 | 25 | 2021 |
Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography–an innovative approach MM Mahmoud, HT Elshoush IEEE Access 10, 29954-29971, 2022 | 22 | 2022 |
Chaos-based audio steganography and cryptography using LSB method and one-time pad SMH Alwahbani, HTI Elshoush Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume …, 2018 | 22 | 2018 |
Using adaboost and stochastic gradient descent (sgd) algorithms with R and orange software for filtering e-mail spam HT Elshoush, EA Dinar 2019 11th computer science and electronic engineering (ceec), 41-46, 2019 | 21 | 2019 |
Intrusion alert correlation framework: An innovative approach HT Elshoush, IM Osman IAENG Transactions on Engineering Technologies: Special Volume of the World …, 2013 | 20 | 2013 |
A new high capacity and secure image realization steganography based on ASCII code matching HT Elshoush, MM Mahmoud, A Altigani Multimedia Tools and Applications, 1-47, 2022 | 17 | 2022 |
An innovative framework for collaborative intrusion alert correlation HTI Elshoush 2014 Science and Information Conference, 607-614, 2014 | 13 | 2014 |
A Novel Approach to Information Hiding Technique using ASCII Mapping Based Image Steganography. HTI Elshoush, IA Ali, MM Mahmoud, A Altigani J. Inf. Hiding Multim. Signal Process. 12 (2), 65-82, 2021 | 12 | 2021 |
Hybrid audio steganography and cryptography method based on high Least Significant Bit (LSB) layers and one-time pad—a novel approach SMH Alwahbani, HTI Elshoush Intelligent Systems and Applications: Extended and Selected Results from the …, 2018 | 12 | 2018 |
Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art FF Fadlalla, HT Elshoush IEEE Access 11, 40128-40161, 2023 | 5 | 2023 |
Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption HT Elshoush, BM Al-Tayeb, KT Obeid PeerJ Computer Science 7, e812, 2021 | 4 | 2021 |
Biometrics solutions for blind person authentication BSE Ahmed, HTI Elshoush 2017 Intelligent systems conference (IntelliSys), 1053-1058, 2017 | 4 | 2017 |
Ameliorating LSB using piecewise linear chaotic map and one-time pad for superlative capacity, imperceptibility and secure audio steganography HT Elshoush, MM Mahmoud IEEE Access 11, 33354-33380, 2023 | 3 | 2023 |
A novel enhanced LSB algorithm for high secure audio steganography M Mustafa, M Mahmoud, H Tagelsir, I Elshoush 2018 10th Computer Science and Electronic Engineering (CEEC), 125-130, 2018 | 3 | 2018 |
A Novel Approach to Improve the Performance of Serpent Algorithm using Lorenz 96 Chaos-based Block Key Generation. HTI Elshoush, KT Obeid, MM Mahmoud J. Inf. Hiding Multim. Signal Process. 13 (1), 49-63, 2022 | 1 | 2022 |