Comparing and Evaluating Open Source E-learning Platforms FA Saeed | 32 | 2013 |
A comparative analysis of machine learning algorithms to build a predictive model for detecting diabetes complications AA Abaker, FA Saeed Informatica 45 (1), 2021 | 30 | 2021 |
Using wassec to evaluate commercial web application security scanners FA Saeed International Journal of Soft Computing and Engineering (IJSCE) 4 (1), 177-181, 2014 | 19 | 2014 |
Assessment of open source web application security scanners FA Saeed, EA Elgabar Journal of Theoretical and Applied Information Technology 61 (2), 281-287, 2014 | 16 | 2014 |
Using WASSEC to analysis and evaluate open source web application security scanners FA Saeed International Journal of Computer Science and Network 3 (2), 43-49, 2014 | 7 | 2014 |
Current directions and future research priorities of customer data analysis MM Mohammed, NA Mohamed, AA Adam, SS Ahmed, FA Saeed Journal of Information Systems and Informatics 2 (2), 300-311, 2020 | 4 | 2020 |
NEW HIERARCHICAL MODEL FOR MULTICLASS IMBALANCED CLASSIFICATION. HS ABDALAZIZ, FA SAEED Journal of Theoretical & Applied Information Technology 95 (16), 2017 | 3 | 2017 |
Towards transparent machine learning models using feature sensitivity algorithm AA Abaker, FA Saeed J. Inform 14, 15-22, 2020 | 2 | 2020 |
E-learning based Cloud Computing Environment: A Systematic Review, Challenges, and Opportunities H Eljak, AO Ibrahim, F Saeed, IAT Hashem, A Abdelmaboud, HJ Syed, ... IEEE Access, 2023 | | 2023 |
An Ensemble Machine Learning Model to Investigate the Screening System for Identification of Potential Patients with COVID-19 in Sudan AA Adam, NAA Elhag, FA Saeed, M Yagob, F Mohamed, N Eassa, ... 2021 International Congress of Advanced Technology and Engineering (ICOTEN), 1-5, 2021 | | 2021 |
A NOVEL MODEL FOR SECURING ACCESS OF CLOUD-BASED E-LEARNING SYSTEMS MO Hussen, N Sharma, HF El-Sofany, F Abbas | | 2019 |
Using WASSEC to Analysis and Evaluate Open Source Web Application Security Scanners Application Security Scanners FA Saeed International Journal of Computer Science and Network 3 (2), 34-94, 2014 | | 2014 |
JPEG versus GIF Images in forms of LSB Steganography JPEG versus GIF Images in forms of LSB Steganography EEA ELGABAR, FA MOHAMMED | | |