An in-depth review of machine learning based Android malware detection A Muzaffar, HR Hassen, MA Lones, H Zantout Computers & Security 121, 102833, 2022 | 72 | 2022 |
Key management for content access control in a hierarchy HR Hassen, A Bouabdallah, H Bettahar, Y Challal Computer Networks 51 (11), 3197-3219, 2007 | 71 | 2007 |
Enhanced WEP: An efficient solution to WEP threats HR Hassan, Y Challal Second IFIP International Conference on Wireless and Optical Communications …, 2005 | 39 | 2005 |
A review of amplification-based distributed denial of service attacks and their mitigation S Ismail, HR Hassen, M Just, H Zantout Computers & Security 109, 102380, 2021 | 31 | 2021 |
An efficient key management scheme for content access control for linear hierarchies HR Hassen, H Bettahar, A Bouadbdallah, Y Challal Computer Networks 56 (8), 2107-2118, 2012 | 30 | 2012 |
A self-managing volatile key scheme for wireless sensor networks A Laouid, A Dahmani, HR Hassen, A Bounceur, R Euler, F Lalem, A Tari Journal of Ambient Intelligence and Humanized Computing 10, 3349-3364, 2019 | 20 | 2019 |
An efficient key management algorithm for hierarchical group communication HR Hassan, A Bouabdallah, H Bettahar, Y Challal First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 19 | 2005 |
Optimal placement of near ground VHF/UHF radio communication network as a multi objective problem HA Shehadeh, MYI Idris, I Ahmedy, HR Hassen Wireless Personal Communications 110 (3), 1169-1197, 2020 | 11 | 2020 |
Stick: an end-to-end encryption protocol tailored for social network platforms O Basem, A Ullah, HR Hassen IEEE Transactions on Dependable and Secure Computing 20 (2), 1258-1269, 2022 | 10 | 2022 |
A new and efficient key management scheme for content access control within tree hierarchies HR Hassen, A Bouabdallah, H Bettahar 21st International Conference on Advanced Information Networking and …, 2007 | 10 | 2007 |
Hi-kd: Hash-based hierarchical key distribution for group communication HR Hassan, A Bouabdallah, H Bettahar, Y Challal IEEE INFOCOM 5, 2005 | 10 | 2005 |
NFC-based asset management for medical equipment N Shetty, H Ragab-Hassen 2015 IEEE 11th International Conference on Wireless and Mobile Computing …, 2015 | 8 | 2015 |
Android malware detection using API calls: a comparison of feature selection and machine learning models A Muzaffar, H Ragab Hassen, MA Lones, H Zantout International Conference on Applied CyberSecurity, 3-12, 2021 | 6 | 2021 |
Droiddissector: A static and dynamic analysis tool for android malware detection A Muzaffar, H Ragab Hassen, H Zantout, MA Lones International Conference on Applied CyberSecurity, 3-9, 2023 | 4 | 2023 |
File synchronization systems survey Z Mehdi, H Ragab-Hassen arXiv preprint arXiv:1611.05346, 2016 | 4 | 2016 |
A key management scheme evaluation using Markov processes H Ragab-Hassen, E Lounes International Journal of Information Security 16, 271-280, 2017 | 3 | 2017 |
Rabit: a reputation architecture for BitTorrent H Ragab-Hassen, O Jones, N Galanis 2012 IEEE global communications conference (GLOBECOM), 850-855, 2012 | 3 | 2012 |
D2TS: a dual diversity tree selection approach to pruning of random forests H Ragab Hassen, YZ Alabdeen, MM Gaber, M Sharma International Journal of Machine Learning and Cybernetics 14 (2), 467-481, 2023 | 2 | 2023 |
A Comprehensive Investigation of Feature and Model Importance in Android Malware Detection A Muzaffar, H Ragab Hassen, H Zantout, MA Lones arXiv e-prints, arXiv: 2301.12778, 2023 | 2 | 2023 |
Efficient key management model and scheme for content access control in hierarchies H Ragab-Hassen 2010 IEEE Globecom Workshops, 1492-1496, 2010 | 2 | 2010 |