Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building ontological models from Arabic Wikipedia: a proposed hybrid approach., , and . iiWAS, page 899-902. ACM, (2010)Visualizing PHPIDS log files for better understanding of web server attacks., , , and . VizSEC, page 1-8. ACM, (2013)Extracting Named Entities from Prophetic Narration Texts (Hadith)., , and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 289-297. Springer, (2011)Arabic Text-Dependent Speaker Verification for Mobile Devices Using Artificial Neural Networks., , and . ICMLA (2), page 350-353. IEEE Computer Society, (2011)978-0-7695-4607-0.Measuring the credibility of Arabic text content in Twitter., , and . ICDIM, page 285-291. IEEE, (2010)Towards Building Arabic Corpus For Drug Information., , and . MEDES, page 67-71. ACM, (2014)Towards the development of haptic-based interface for teaching visually impaired arabic handwriting., , and . ASSETS, page 73:1-73:2. ACM, (2013)Visualizing web server attacks: patterns in PHPIDS logs‡., , , and . Secur. Commun. Networks, 8 (11): 1991-2003 (2015)Applying topic segmentation algorithms on arabic language., , and . AICCSA, page 865-868. IEEE Computer Society, (2009)Comparative Survey of Indoor Positioning Technologies, Techniques, and Algorithms., , , , , , and . CW, page 245-252. IEEE Computer Society, (2014)