Application of Intelligent Data Mining Approach in Securing the Cloud Computing IEEAAA Hanna M. Said1, Bader A. Alyoubi3 (IJACSA) International Journal of Advanced Computer Science and Applications …, 2016 | 10* | 2016 |
Exploiting computational intelligence paradigms in e-technologies and activities HM Said, ABM Salem Procedia Computer Science 65, 396-405, 2015 | 10 | 2015 |
Smart E-B.usiness Model based on Block Chain (BC) and Internet of Things (IoT) Technologies HMSABM Salem 7th International Conference on Computational Intelligence (CI'19),Rome …, 2019 | 9 | 2019 |
An integrated approach towards a penetration testing for cyberspaces HM Said, M Hamdy, R El Gohary, ABM Salem European Journal of Computer Science and Information Technology 3 (1), 108-128, 2015 | 2 | 2015 |
Artificial Intelligence (AI) technology for Monitoring COVID-19 diagnosis to prevention and control HM Said Egyptian Computer Science Journal (ECS J). ISSN-1110-2586, vol. 45 No. 3 …, 2021 | | 2021 |
A blockchain architecture for cloud gateway environment and IoT MGAAH Hanaa Mohammad Saied International Transaction Journal of Engineering, Management, & Applied …, 2021 | | 2021 |
Data Mining and Knowledge Discovery in “big data” for Decision Making in Higher Education HMABM Salem An Open Access International Journal Vol 14 No (4) Oct-Nov-Dec 2021 (In …, 2021 | | 2021 |
Business Intelligence in the world of IoT ABMS Hanna Mohammad Said International Conference on Pure Mathematics, Applied Mathematics and …, 2019 | | 2019 |
A Study on the Smart Tutoring Systems D Ratniece, HM Said, ABM Salem International Journal of Education and Learning Systems 3, 2018 | | 2018 |
A Study on the Smart Tutoring Systems ABMS Dace Ratniece, Hanaa Mohammad Said Systems’’8th International Conference on Biomedical Electronics and …, 2018 | | 2018 |
A Simple Integrated Smart Green Home Design AMBIA A. D. Asham, Hanaa. M. Said, BdareAlyoubi Intelligent Systems Conference (IntelliSys), Conference Location: London, UK …, 2018 | | 2018 |
Business Intelligence in the Cloud computing Environment MSKABMS Hanaa Mohammad saida, A. D. Ashamb 2ND. INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGIEERING AND BIG DATA ANALYTICS …, 2017 | | 2017 |
Intelligence Techniques for e-government applications REGABMS Hanaa. M. Said, Mohamed Hamdy International Journal of Emerging Trends & Technology in Computer Science …, 2015 | | 2015 |
Cyber Space Security Assessment Case Study HM Said, R El Gohary, M Hamdy, AM Salem Handbook of Research on Threat Detection and Countermeasures in Network …, 2015 | | 2015 |
NEURAL NETWORKS APPROACH FOR MONITORING AND SECURING THE E-GOVERNMENT INFORMATION SYSTEMS HM Said, M Hamdy, R El Gohary, AM Salem European Journal of Computer Science and Information Technology 2 (4), 29-39, 2014 | | 2014 |
Hierarchical Clustering Approach For Monitoring and Securing the Data in E-Government Systems REGABMS Hanaa. M. Said, Mohamed Hamdy International Journal of Emerging Trends & Technology in Computer Science …, 2014 | | 2014 |
Data Mining Techniques for Predicting the Cyber Security Threats REGABMS Hanaa. M. Said, Mohamed Hamdy Proceedings ICICIS'13 International Conferences, December, International …, 2013 | | 2013 |
A RAPID COMPARATIVE ASSESSMENT FOR CYBER - SECURITY THREAT CHARACTERIZATION ABS Rania Elgohary, Hanaa Saied IJETTCS-2013-12-23-086 International Journal of Emerging Trends …, 2012 | | 2012 |
Machine learning in E-Technologies HM SAID, ABM SALEM | | |
A Study on Data Mining Frameworks in Cyber Security HM SAID, R El GOHARY, M HAMDY, ABM SALEM | | |