Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art TS Sobh Computer Standards & Interfaces 28 (6), 670-694, 2006 | 138 | 2006 |
A cooperative immunological approach for detecting network anomaly TS Sobh, WM Mostafa applied soft computing 11 (1), 1275-1283, 2011 | 44 | 2011 |
Design of an enhancement for SSL/TLS protocols A Elgohary, TS Sobh, M Zaki computers & security 25 (4), 297-306, 2006 | 42 | 2006 |
Design of a Monitor for Detecting Money Laundering and Terrorist Financing THE Helmy, M zaki Abd-ElMegied, TS Sobh, KMS Badran Journal of Theoretical and Applied Information Technology 85 (3), 425–436, 2016 | 34 | 2016 |
Design of a Monitor for Detecting Money Laundering and Terrorist Financing TH Eldin Helmy, M Abd-ElMegied, TS Sobh, KMS Badran International Journal of Computer Networks and Applications 1 (1), 15-25, 2014 | 34* | 2014 |
Wi-Fi networks security and accessing control TS Sobh International Journal of Computer Network and Information Security 5 (7), 9, 2013 | 28 | 2013 |
A cooperative agent-based model for active security systems M Zaki, TS Sobh Journal of network and computer applications 27 (4), 201-220, 2004 | 22 | 2004 |
Anti money laundering using a two-phase system TH Moustafa, MZ Abd El-Megied, TS Sobh, KM Shafea Journal of Money Laundering Control 18 (3), 304-329, 2015 | 19 | 2015 |
An intelligent and secure framework for anti-money laundering TS Sobh Journal of Applied Security Research 15 (4), 517-546, 2020 | 16 | 2020 |
Identity Management: Lightweight SAML for Less Processing Power M Ali, TS Sobh, S El-Gamal IJ Information Technology and Computer Science, 42-49, 2015 | 16 | 2015 |
Effective and extensive virtual private network TS Sobh, Y Aly Journal of Information Security 2 (01), 39, 2011 | 15 | 2011 |
Attack abstraction using a multiagent system for intrusion detection M Zaki, TS Sobh Journal of Intelligent & Fuzzy Systems 16 (2), 141-150, 2005 | 15 | 2005 |
Intelligent System for Worm Detection IA Farag, MA Shouman, TS Sobh, HZ El-Fiqi Journal: International Arab Journal of e-Technology ISSN 1 (1), 58=67, 2009 | 12 | 2009 |
NCDS: data mining for discovering interesting network characteristics M Zaki, TS Sobh Information and Software Technology 47 (3), 189-198, 2005 | 12 | 2005 |
Performance improvements on the network security protocols TS Sobh, A Elgohary, M Zaki International Journal of Network Security 6 (1), 103-115, 2008 | 11 | 2008 |
Anomaly detection based on hybrid artificial immune principles T Salah Sobh Information Management & Computer Security 21 (4), 288-314, 2013 | 8 | 2013 |
Identity management using SAML for mobile clients and Internet of Things TS Sobh Journal of High Speed Networks 25 (1), 101-126, 2019 | 7 | 2019 |
PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services TS Sobh, MI Amer International Journal of Network Security 13 (2), 79–91, 2011 | 7 | 2011 |
Evaluating Web Services Functionality and Performance TS Sobh, M Fakhry International Journal of Information Technology and Computer Science (IJITCS …, 2014 | 6 | 2014 |
An efficient and dependable protocol for critical MANETs A Elgohary, TS Sobh, SA Nouh, M Zaki Journal of High Speed Networks 20 (3), 153-168, 2014 | 6 | 2014 |