Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building ontological models from Arabic Wikipedia: a proposed hybrid approach., , and . iiWAS, page 899-902. ACM, (2010)Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners., , , , and . Secur. Commun. Networks, (2017)Visualizing PHPIDS log files for better understanding of web server attacks., , , and . VizSEC, page 1-8. ACM, (2013)Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances., , , , , , and . Sensors, 16 (5): 707 (2016)Extracting Named Entities from Prophetic Narration Texts (Hadith)., , and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 289-297. Springer, (2011)Towards Building Arabic Corpus For Drug Information., , and . MEDES, page 67-71. ACM, (2014)Measuring the credibility of Arabic text content in Twitter., , and . ICDIM, page 285-291. IEEE, (2010)Arabic Text-Dependent Speaker Verification for Mobile Devices Using Artificial Neural Networks., , and . ICMLA (2), page 350-353. IEEE Computer Society, (2011)978-0-7695-4607-0.Towards the development of haptic-based interface for teaching visually impaired arabic handwriting., , and . ASSETS, page 73:1-73:2. ACM, (2013)Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation., , , and . J. Parallel Distributed Comput., (2019)