Stebėti
Huwida Said
Pavadinimas
Cituota
Cituota
Metai
Personal Identification Based on Handwriting
HES Said, TN Tan, KD Baker
Pattern Recognition 33 (1), 149-160, 2000
5582000
Personal Identification Based on Handwriting
HES SAID, GS Peake, TN TAN, KD Baker
IEEE International Conference on Pattern Recognition (ICPR'98), 1761-1764, 1998
5581998
Forensic Analysis of Private Browsing Artifacts
H Said, N Al Mutawa, I Al Awadhi, M Guimaraes
Innovations in Information Technology (IIT), 2011 International Conference …, 2011
1042011
Writer Identification from Non-uniformly Skewed Handwriting Images.
HES Said, GS Peake, TN Tan, KD Baker
British Machine Vision Conference (BMVC98), Vol 2, 478-487, 1998
1011998
Dealing with the problem of cybercrime
A Alkaabi, G Mohay, A McCullagh, N Chantler
Digital Forensics and Cyber Crime: Second International ICST Conference …, 2011
592011
Analysis of cloud computing attacks and countermeasures
RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said
2016 18th international conference on advanced communication technology …, 2016
492016
Social Networks IM Forensics: Encryption Analysis.
NB Al Barghuthi, H Said
Journal of Communications 8 (11), 708-715, 2013
492013
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges
M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said
2018 International Conference on Innovations in Information Technology (IIT …, 2018
262018
Database Forensics
MAM Guimaraes, R Austin, H Said
2010 Information Security Curriculum Development Conference, 62-65, 2010
26*2010
State of art of the effectiveness in adopting blockchain technology-UAE survey study
NB Al Barghuthi, C Ncube, H Said
2019 Sixth HCT Information Technology Trends (ITT), 54-59, 2019
192019
Blockchain in supply chain trading
NB Al Barghuthi, HJ Mohamed, HE Said
2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018
182018
Forensics and War-driving on Unsecured Wireless Network
H Said, M Guimaraes, N Al Mutawa, I Al Awadhi
Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011
172011
IPhone Forensics Techniques and Crime Investigation
H Said, A Yousif, H Humaid
Current Trends in Information Technology (CTIT), 2011 International …, 2011
162011
Database and Database Application Security
H Said, MA Guimaraes, Z Maamar, L Jololian
ACM SIGCSE Bulletin 41 (3), 90-93, 2009
132009
Mining the web and literature to discover new knowledge about diabetes
F Marir, H Said, F Al-Obeidat
Procedia Computer Science 83, 1256-1261, 2016
122016
Sentiment analysis on predicting presidential election: Twitter used case
N Baker Al Barghuthi, H E. Said
International Symposium on Intelligent Computing Systems, 105-117, 2020
112020
Using Video games to Teach Security
M Guimaraes, H Said, R Austin
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
112011
Writer Identification Based on Handwriting
HES Said, TN Tan, KD Baker
IET Digital Library, 1998
91998
Experience With Video Games for Security
MAM Guimaraes, H Said, R Austin
Journal of Computing Sciences in Colleges 27 (3), 95-104, 2012
72012
An analytical study towards the UAE universities smart education innovated approaches
SS Mohamed, NB Al Barghuthi, H Said
2017 IEEE 19th International Conference on High Performance Computing and …, 2017
52017
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20