关注
Huwida Said
标题
引用次数
引用次数
年份
Personal Identification Based on Handwriting
HES Said, TN Tan, KD Baker
Pattern Recognition 33 (1), 149-160, 2000
5542000
Personal Identification Based on Handwriting
HES SAID, GS Peake, TN TAN, KD Baker
IEEE International Conference on Pattern Recognition (ICPR'98), 1761-1764, 1998
5541998
Forensic Analysis of Private Browsing Artifacts
H Said, N Al Mutawa, I Al Awadhi, M Guimaraes
Innovations in Information Technology (IIT), 2011 International Conference …, 2011
1022011
Writer Identification from Non-uniformly Skewed Handwriting Images.
HES Said, GS Peake, TN Tan, KD Baker
British Machine Vision Conference (BMVC98), Vol 2, 478-487, 1998
991998
Dealing with the problem of cybercrime
A Alkaabi, G Mohay, A McCullagh, N Chantler
Digital Forensics and Cyber Crime: Second International ICST Conference …, 2011
542011
Social Networks IM Forensics: Encryption Analysis.
NB Al Barghuthi, H Said
Journal of Communications 8 (11), 708-715, 2013
492013
Analysis of cloud computing attacks and countermeasures
RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said
2016 18th international conference on advanced communication technology …, 2016
482016
Database Forensics
MAM Guimaraes, R Austin, H Said
2010 Information Security Curriculum Development Conference, 62-65, 2010
25*2010
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges
M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said
2018 International Conference on Innovations in Information Technology (IIT …, 2018
202018
State of art of the effectiveness in adopting blockchain technology-UAE survey study
NB Al Barghuthi, C Ncube, H Said
2019 Sixth HCT Information Technology Trends (ITT), 54-59, 2019
162019
Blockchain in supply chain trading
NB Al Barghuthi, HJ Mohamed, HE Said
2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018
162018
Forensics and War-driving on Unsecured Wireless Network
H Said, M Guimaraes, N Al Mutawa, I Al Awadhi
Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011
162011
IPhone Forensics Techniques and Crime Investigation
H Said, A Yousif, H Humaid
Current Trends in Information Technology (CTIT), 2011 International …, 2011
132011
Database and Database Application Security
H Said, MA Guimaraes, Z Maamar, L Jololian
ACM SIGCSE Bulletin 41 (3), 90-93, 2009
122009
Sentiment analysis on predicting presidential election: Twitter used case
N Baker Al Barghuthi, H E. Said
Intelligent Computing Systems: Third International Symposium, ISICS 2020 …, 2020
102020
Mining the web and literature to discover new knowledge about diabetes
F Marir, H Said, F Al-Obeidat
Procedia Computer Science 83, 1256-1261, 2016
102016
Using Video games to Teach Security
M Guimaraes, H Said, R Austin
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
102011
Writer Identification Based on Handwriting
HES Said, TN Tan, KD Baker
IET Digital Library, 1998
91998
Experience With Video Games for Security
MAM Guimaraes, H Said, R Austin
Journal of Computing Sciences in Colleges 27 (3), 95-104, 2012
62012
Ethics behind Cyber Warfare: A study of Arab Citizens Awareness
NB Al Barghuthi, H Said
2014 IEEE International Symposium on Ethics in Engineering, Science, and …, 2014
52014
系统目前无法执行此操作,请稍后再试。
文章 1–20