关注
Doaa Hassan Salem
Doaa Hassan Salem
Research Scholar, Biohealth Informatics Dept., Luddy School of Informatics, Computing and
在 indiana.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Application of Data Encryption Standard to Bitmap and JPEG images
IE Ziedan, MM Fouad, DH Salem
Radio Science Conference, 2003. NRSC 2003. Proceedings of the Twentieth National, 2003
672003
Penguin: a tool for predicting pseudouridine sites in direct RNA nanopore sequencing data
D Hassan, D Acevedo, SV Daulatabad, Q Mir, SC Janga
Methods 203, 478-487, 2022
332022
"A Text Mining Approach for Evaluating Event Credibility on Twitter"
D Hassan
In Proceedings of 27th IEEE International Conference on Enabling …, 2018
192018
On Determining the Most Effective Subset of Features for Detecting Phishing Websites
D Hassan
International Journal of Computer Applications 122 (20), 1-7, 2015
152015
Cost-Sensitive Access Control for Detecting Remote to Local (R2L) and User to Root (U2R) Attacks
D Hassan
International Journal of Computer Trends and Technology (IJCTT) 43 (2), 124-129, 2017
142017
Investigating the Effect of Combining Text Clustering with Classification on Improving Spam Email Detection
D Hassan
The 16th International Conference on Intelligent Systems Design and …, 2017
132017
Developing a Security Typed Java Servlet
D Hassan, S El-Kassas, I Ziedan
Information Assurance and Security, 2008. IAS08. Fourth International …, 2008
132008
The Impact of False Negative Cost on the Performance of Cost Sensitive Learning Based on Bayes Minimum Risk: A Case Study in Detecting Fraudulent Transactions
D Hassan
International Journal of Intelligent Systems and Applications(IJISA) 9 (2 …, 2017
112017
A Comparative study of intrusion detection systems applied to NSL-KDD Dataset
M Eshak Magdy, A M MATTER, S Hussin, D Hassan, S Elsaid
The Egyptian International Journal of Engineering Sciences and Technology 43 …, 2023
72023
Combining transfer learning with retinal lesion features for accurate detection of diabetic retinopathy
D Hassan, HM Gill, M Happe, AD Bhatwadekar, AR Hajrasouliha, ...
Frontiers in Medicine 9, 1050436, 2022
72022
Anomaly-based intrusion detection system based on feature selection and majority voting
SAE Mina Eshak Magdy, Ahmed M. Matter, Saleh Hussin, Doaa Hassan
Indonesian Journal of Electrical Engineering and Computer Science 30 (3), 2023
52023
A Similarity-Based Machine Learning Approach for Detecting Adversarial Android Malware
D Hassan, M Might, V Srikumar
http://www.cs.utah.edu/research/techreports/2014/pdf/UUCS-14-002.pdf, 2014
52014
Mining Intrusion Detection Alerts for Predicting Severity of Detected Attacks
D Hassan
http://ieeexplore.ieee.org/document/7492742/, 2015
32015
A language based security approach for securing map-reduce computations in the cloud
D Hassan, R Hill
2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing …, 2013
32013
Encoding secure Information Flow with Restricted Delegation and Revocation in Haskell
D Hassan, A Sabry
Proceedings of the 1st annual workshop on Functional programming concepts in …, 2013
32013
RDR: A language for restricted delegation and revocation
D Hassan, MR Mousavi
Technical report, Eindhoven University of Technology, 2011
32011
Restricted delegation and revocation in language-based security: (position paper)
D Hassan, MR Mousavi, MA Reniers
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
32010
Supervised Link Prediction in Co-authorship Networks Based on Research Performance and Similarity of Research Interests and Affiliations
D Hassan
In Proceedings of the International Conference on Machine Learning and …, 2019
22019
Predicting the Degree of Collaboration of Researchers on Co-authorship Social Networks
D Hassan
In Proceedings of the 18th International Conference on Hybrid Intelligent …, 2018
22018
Supervised Versus Unsupervised Discretization for Improving Network Intrusion Detection
D Hassan
International Journal of Computer Science and Information Security (IJCSIS …, 2016
22016
系统目前无法执行此操作,请稍后再试。
文章 1–20