Application of Data Encryption Standard to Bitmap and JPEG images IE Ziedan, MM Fouad, DH Salem Radio Science Conference, 2003. NRSC 2003. Proceedings of the Twentieth National, 2003 | 67 | 2003 |
Penguin: a tool for predicting pseudouridine sites in direct RNA nanopore sequencing data D Hassan, D Acevedo, SV Daulatabad, Q Mir, SC Janga Methods 203, 478-487, 2022 | 33 | 2022 |
"A Text Mining Approach for Evaluating Event Credibility on Twitter" D Hassan In Proceedings of 27th IEEE International Conference on Enabling …, 2018 | 19 | 2018 |
On Determining the Most Effective Subset of Features for Detecting Phishing Websites D Hassan International Journal of Computer Applications 122 (20), 1-7, 2015 | 15 | 2015 |
Cost-Sensitive Access Control for Detecting Remote to Local (R2L) and User to Root (U2R) Attacks D Hassan International Journal of Computer Trends and Technology (IJCTT) 43 (2), 124-129, 2017 | 14 | 2017 |
Investigating the Effect of Combining Text Clustering with Classification on Improving Spam Email Detection D Hassan The 16th International Conference on Intelligent Systems Design and …, 2017 | 13 | 2017 |
Developing a Security Typed Java Servlet D Hassan, S El-Kassas, I Ziedan Information Assurance and Security, 2008. IAS08. Fourth International …, 2008 | 13 | 2008 |
The Impact of False Negative Cost on the Performance of Cost Sensitive Learning Based on Bayes Minimum Risk: A Case Study in Detecting Fraudulent Transactions D Hassan International Journal of Intelligent Systems and Applications(IJISA) 9 (2 …, 2017 | 11 | 2017 |
A Comparative study of intrusion detection systems applied to NSL-KDD Dataset M Eshak Magdy, A M MATTER, S Hussin, D Hassan, S Elsaid The Egyptian International Journal of Engineering Sciences and Technology 43 …, 2023 | 7 | 2023 |
Combining transfer learning with retinal lesion features for accurate detection of diabetic retinopathy D Hassan, HM Gill, M Happe, AD Bhatwadekar, AR Hajrasouliha, ... Frontiers in Medicine 9, 1050436, 2022 | 7 | 2022 |
Anomaly-based intrusion detection system based on feature selection and majority voting SAE Mina Eshak Magdy, Ahmed M. Matter, Saleh Hussin, Doaa Hassan Indonesian Journal of Electrical Engineering and Computer Science 30 (3), 2023 | 5 | 2023 |
A Similarity-Based Machine Learning Approach for Detecting Adversarial Android Malware D Hassan, M Might, V Srikumar http://www.cs.utah.edu/research/techreports/2014/pdf/UUCS-14-002.pdf, 2014 | 5 | 2014 |
Mining Intrusion Detection Alerts for Predicting Severity of Detected Attacks D Hassan http://ieeexplore.ieee.org/document/7492742/, 2015 | 3 | 2015 |
A language based security approach for securing map-reduce computations in the cloud D Hassan, R Hill 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing …, 2013 | 3 | 2013 |
Encoding secure Information Flow with Restricted Delegation and Revocation in Haskell D Hassan, A Sabry Proceedings of the 1st annual workshop on Functional programming concepts in …, 2013 | 3 | 2013 |
RDR: A language for restricted delegation and revocation D Hassan, MR Mousavi Technical report, Eindhoven University of Technology, 2011 | 3 | 2011 |
Restricted delegation and revocation in language-based security: (position paper) D Hassan, MR Mousavi, MA Reniers Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010 | 3 | 2010 |
Supervised Link Prediction in Co-authorship Networks Based on Research Performance and Similarity of Research Interests and Affiliations D Hassan In Proceedings of the International Conference on Machine Learning and …, 2019 | 2 | 2019 |
Predicting the Degree of Collaboration of Researchers on Co-authorship Social Networks D Hassan In Proceedings of the 18th International Conference on Hybrid Intelligent …, 2018 | 2 | 2018 |
Supervised Versus Unsupervised Discretization for Improving Network Intrusion Detection D Hassan International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 2 | 2016 |