关注
Tarek Salah Sobh
Tarek Salah Sobh
Egyptian Armed Forces, Information Systems Department (ISD)
在 afmic.gov.eg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
TS Sobh
Computer Standards & Interfaces 28 (6), 670-694, 2006
1382006
A cooperative immunological approach for detecting network anomaly
TS Sobh, WM Mostafa
applied soft computing 11 (1), 1275-1283, 2011
442011
Design of an enhancement for SSL/TLS protocols
A Elgohary, TS Sobh, M Zaki
computers & security 25 (4), 297-306, 2006
422006
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
THE Helmy, M zaki Abd-ElMegied, TS Sobh, KMS Badran
Journal of Theoretical and Applied Information Technology 85 (3), 425–436, 2016
342016
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
TH Eldin Helmy, M Abd-ElMegied, TS Sobh, KMS Badran
International Journal of Computer Networks and Applications 1 (1), 15-25, 2014
34*2014
Wi-Fi networks security and accessing control
TS Sobh
International Journal of Computer Network and Information Security 5 (7), 9, 2013
282013
A cooperative agent-based model for active security systems
M Zaki, TS Sobh
Journal of network and computer applications 27 (4), 201-220, 2004
222004
Anti money laundering using a two-phase system
TH Moustafa, MZ Abd El-Megied, TS Sobh, KM Shafea
Journal of Money Laundering Control 18 (3), 304-329, 2015
192015
An intelligent and secure framework for anti-money laundering
TS Sobh
Journal of Applied Security Research 15 (4), 517-546, 2020
162020
Identity Management: Lightweight SAML for Less Processing Power
M Ali, TS Sobh, S El-Gamal
IJ Information Technology and Computer Science, 42-49, 2015
162015
Effective and extensive virtual private network
TS Sobh, Y Aly
Journal of Information Security 2 (01), 39, 2011
152011
Attack abstraction using a multiagent system for intrusion detection
M Zaki, TS Sobh
Journal of Intelligent & Fuzzy Systems 16 (2), 141-150, 2005
152005
Intelligent System for Worm Detection
IA Farag, MA Shouman, TS Sobh, HZ El-Fiqi
Journal: International Arab Journal of e-Technology ISSN 1 (1), 58=67, 2009
122009
NCDS: data mining for discovering interesting network characteristics
M Zaki, TS Sobh
Information and Software Technology 47 (3), 189-198, 2005
122005
Performance improvements on the network security protocols
TS Sobh, A Elgohary, M Zaki
International Journal of Network Security 6 (1), 103-115, 2008
112008
Anomaly detection based on hybrid artificial immune principles
T Salah Sobh
Information Management & Computer Security 21 (4), 288-314, 2013
82013
Identity management using SAML for mobile clients and Internet of Things
TS Sobh
Journal of High Speed Networks 25 (1), 101-126, 2019
72019
PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services
TS Sobh, MI Amer
International Journal of Network Security 13 (2), 79–91, 2011
72011
Evaluating Web Services Functionality and Performance
TS Sobh, M Fakhry
International Journal of Information Technology and Computer Science (IJITCS …, 2014
62014
An efficient and dependable protocol for critical MANETs
A Elgohary, TS Sobh, SA Nouh, M Zaki
Journal of High Speed Networks 20 (3), 153-168, 2014
62014
系统目前无法执行此操作,请稍后再试。
文章 1–20