Personal Identification Based on Handwriting HES Said, TN Tan, KD Baker Pattern Recognition 33 (1), 149-160, 2000 | 477 | 2000 |
Personal identification based on handwriting HES Said, TN Tan, KD Baker Pattern Recognition 33 (1), 149-160, 2000 | 477 | 2000 |
Personal Identification Based on Handwriting HES SAID, GS Peake, TN TAN, KD Baker IEEE International Conference on Pattern Recognition (ICPR'98), 1761-1764, 1998 | 477 | 1998 |
Writer Identification from Non-uniformly Skewed Handwriting Images. HES Said, GS Peake, TN Tan, KD Baker British Machine Vision Conference (BMVC98), Vol 2, 478-487, 1998 | 88 | 1998 |
Forensic Analysis of Private Browsing Artifacts H Said, N Al Mutawa, I Al Awadhi, M Guimaraes Innovations in Information Technology (IIT), 2011 International Conference …, 2011 | 80 | 2011 |
Dealing with the problem of cybercrime A Alkaabi, G Mohay, A McCullagh, N Chantler International Conference on Digital Forensics and Cyber Crime, 1-18, 2010 | 36 | 2010 |
Social Networks IM Forensics: Encryption Analysis. NB Al Barghuthi, H Said Journal of Communications 8 (11), 708-715, 2013 | 34 | 2013 |
Analysis of cloud computing attacks and countermeasures RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said 2016 18th International Conference on Advanced Communication Technology …, 2016 | 27 | 2016 |
Database Forensics MAM Guimaraes, R Austin, H Said 2010 Information Security Curriculum Development Conference, 62-65, 2010 | 21* | 2010 |
IPhone Forensics Techniques and Crime Investigation H Said, A Yousif, H Humaid Current Trends in Information Technology (CTIT), 2011 International …, 2011 | 13 | 2011 |
Forensics and War-driving on Unsecured Wireless Network H Said, M Guimaraes, N Al Mutawa, I Al Awadhi Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011 | 11 | 2011 |
Database and Database Application Security H Said, MA Guimaraes, Z Maamar, L Jololian ACM SIGCSE Bulletin 41 (3), 90-93, 2009 | 11 | 2009 |
Writer Identification Based on Handwriting HES Said, TN Tan, KD Baker IET Digital Library, 1998 | 8 | 1998 |
Blockchain in supply chain trading NB Al Barghuthi, HJ Mohamed, HE Said 2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018 | 7 | 2018 |
Mining the web and literature to discover new knowledge about diabetes F Marir, H Said, F Al-Obeidat Procedia Computer Science 83, 1256-1261, 2016 | 6 | 2016 |
Experience With Video Games for Security MAM Guimaraes, H Said, R Austin Journal of Computing Sciences in Colleges 27 (3), 95-104, 2012 | 6 | 2012 |
Using Video games to Teach Security M Guimaraes, H Said, R Austin Proceedings of the 16th annual joint conference on Innovation and technology …, 2011 | 6 | 2011 |
Ethics behind Cyber Warfare: A study of Arab Citizens Awareness NB Al Barghuthi, H Said 2014 IEEE International Symposium on Ethics in Engineering, Science, and …, 2014 | 5 | 2014 |
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said 2018 International Conference on Innovations in Information Technology (IIT …, 2018 | 4 | 2018 |
Evaluation of Linux SMTP server security aspects—A case study S Khanji, R Jabir, L Ahmad, O Alfandi, H Said 2016 7th International Conference on Information and Communication Systems …, 2016 | 4 | 2016 |