关注
Tamer Gayed
Tamer Gayed
在 ca.ibm.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cyber forensics: Representing and (im) proving the chain of custody using the semantic web
TF Gayed, H Lounis, M Bari
COGNITIVE 2012: The Fourth International Conference on Advanced Cognitive …, 2012
282012
Computer Forensics: Toward the Construction of Electronic Chain of Custody on the Semantic Web.
TF Gayed, H Lounis, M Bari
SEKE, 406-411, 2012
92012
Machine-learning models for software quality: a compromise between performance and intelligibility
H Lounis, TF Gayed, M Boukadoum
2011 IEEE 23rd International Conference on Tools with Artificial …, 2011
82011
Using efficient machine-learning models to assess two important quality factors: Maintainability and reusability
H Lounis, TF Gayed, M Boukadoum
2011 Joint Conference of the 21st International Workshop on Software …, 2011
82011
Cyber forensics: representing and managing tangible chain of custody using the linked data principles
TF Gayed, H Lounis, M Bari, R Nicolas
The international conference on Advanced Cognitive technologies and …, 2013
72013
Usage of the HMM‐Based Speech Synthesis for Intelligent Arabic Voice
TS Fares, AH Khalil, AEFA Hegazy
AIP Conference Proceedings 1019 (1), 93-98, 2008
52008
Linked closed data using PKI: a case study on publishing and consuming data in a forensic process
TF Gayed, H Lounis, M Bari
The Sixth International Conference on Advanced Cognitive Technologies and …, 2014
22014
Representing Chains of Custody Along a Forensic Process: A Case Study on Kruse Model.
TF Gayed, H Lounis, M Bari
SEKE, 674-680, 2013
22013
Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process.
TF Gayed, H Lounis, M Bari
SEKE, 76-81, 2014
12014
Representing and managing chains of custody in cyber forensics using linked data principles
T Gayed
Université du Québec à Montréal, 2016
2016
Representing and Publishing Cyber Forensic Data and its Provenance Metadata: From Open to Closed Consumption
TF Gayed, H Lounis, M Bari
系统目前无法执行此操作,请稍后再试。
文章 1–11