Machine learning: algorithms and applications M Mohammed, MB Khan, EBM Bashier Crc Press, 2016 | 757 | 2016 |
A novel fitted operator finite difference method for a singularly perturbed delay parabolic partial differential equation EBM Bashier, KC Patidar Applied mathematics and Computation 217 (9), 4728-4739, 2011 | 69 | 2011 |
Optimal control of an epidemiological model with multiple time delays EBM Bashier, KC Patidar Applied Mathematics and Computation 292, 47-56, 2017 | 56 | 2017 |
Speech scrambling based on chaotic maps and one time pad SMH Alwahbani, EBM Bashier 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC …, 2013 | 31 | 2013 |
Detection of zero-day polymorphic worms using principal component analysis MMZE Mohammed, HA Chan, N Ventura, M Hashim, I Amin, E Bashier 2010 Sixth International Conference on Networking and Services, 277-281, 2010 | 27 | 2010 |
A second-order fitted operator finite difference method for a singularly perturbed delay parabolic partial differential equation EBM Bashier, KC Patidar Journal of Difference Equations and Applications 17 (05), 779-794, 2011 | 25 | 2011 |
A fitted numerical method for a system of partial delay differential equations EBM Bashier, KC Patidar Computers & Mathematics with Applications 61 (6), 1475-1492, 2011 | 19 | 2011 |
A mathematical model of glucose-insulin interaction with time delay S Saber, E Bashier, S Alzahrani, IA Noaman J Appl Computat Math 7 (416), 2, 2018 | 14 | 2018 |
Practical Numerical and Scientific Computing with MATLAB® and Python EBM Bashier CRC Press, 2020 | 12 | 2020 |
An end-to-end secure mail system based on certificateless cryptography in the standard security model M Hassouna, N Mohamed, B Barry, E Bashier International Journal of Computer Science Issues (IJCSI) 10 (2), 264, 2013 | 12 | 2013 |
Hiding secret messages using artificial DNA sequences generated by integer chaotic maps E Bashier, G Ahmed, HA Othman, R Shappo international journal of computer applications 70 (15), 2013 | 12 | 2013 |
Accurate signature generation for polymorphic worms using principal component analysis MMZE Mohammed, HA Chan, N Ventura, M Hashim, I Amin, E Bashier 2010 IEEE Globecom Workshops, 1555-1560, 2010 | 12 | 2010 |
Analysis of Topological Aspects for Metal‐Insulator Transition Superlattice Network R Huang, MH Muhammad, MK Siddiqui, S Khalid, S Manzoor, E Bashier Complexity 2022 (1), 8344699, 2022 | 11 | 2022 |
Enhanced model for PKI certificate validation in the mobile banking MO Albasheer, EBM Bashier 2013 International Conference on Computing, Electrical and Electronic …, 2013 | 10 | 2013 |
An Efficient Secure Image Encryption Algorithm Based on Total Shuffling, Integer Chaotic Maps and Median Filter E Bashier, TB Jabeur | 8 | 2021 |
Numerical solutions of a system of odes based on lie-trotter and strang operator-splitting methods R Omer, E Bashier, AI Arbab Universal Journal of Computational Mathematics 5 (2), 20-24, 2017 | 8 | 2017 |
Fitted Galerkin spectral method to solve delay partial differential equations AMA Adam, EBM Bashier, MHA Hashim, KC Patidar Mathematical Methods in the Applied Sciences 39 (11), 3102-3115, 2016 | 8 | 2016 |
An integrated public key infrastructure model based on certificateless cryptography M Hassouna, B Barry, NA Farah, EBM Bashier University of Khartoum, 2013 | 8 | 2013 |
An automated signature generation approach for polymorphic worms using principal component analysis M Mohammed, HA Chan, N Ventura, M Hashim, E Bashier Int’l Journal for Information Security Research (IJISR) 1 (1), 45-52, 2011 | 8 | 2011 |
A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model. M Hassouna, BIA Barry, E Bashier Int. J. Netw. Secur. 19 (4), 551-558, 2017 | 7 | 2017 |