Personal Identification Based on Handwriting HES Said, TN Tan, KD Baker Pattern Recognition 33 (1), 149-160, 2000 | 558 | 2000 |
Personal Identification Based on Handwriting HES SAID, GS Peake, TN TAN, KD Baker IEEE International Conference on Pattern Recognition (ICPR'98), 1761-1764, 1998 | 558 | 1998 |
Forensic Analysis of Private Browsing Artifacts H Said, N Al Mutawa, I Al Awadhi, M Guimaraes Innovations in Information Technology (IIT), 2011 International Conference …, 2011 | 104 | 2011 |
Writer Identification from Non-uniformly Skewed Handwriting Images. HES Said, GS Peake, TN Tan, KD Baker British Machine Vision Conference (BMVC98), Vol 2, 478-487, 1998 | 99 | 1998 |
Dealing with the problem of cybercrime A Alkaabi, G Mohay, A McCullagh, N Chantler Digital Forensics and Cyber Crime: Second International ICST Conference …, 2011 | 57 | 2011 |
Social Networks IM Forensics: Encryption Analysis. NB Al Barghuthi, H Said Journal of Communications 8 (11), 708-715, 2013 | 49 | 2013 |
Analysis of cloud computing attacks and countermeasures RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said 2016 18th international conference on advanced communication technology …, 2016 | 47 | 2016 |
Database Forensics MAM Guimaraes, R Austin, H Said 2010 Information Security Curriculum Development Conference, 62-65, 2010 | 26* | 2010 |
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said 2018 International Conference on Innovations in Information Technology (IIT …, 2018 | 24 | 2018 |
Blockchain in supply chain trading NB Al Barghuthi, HJ Mohamed, HE Said 2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018 | 19 | 2018 |
State of art of the effectiveness in adopting blockchain technology-UAE survey study NB Al Barghuthi, C Ncube, H Said 2019 Sixth HCT Information Technology Trends (ITT), 54-59, 2019 | 17 | 2019 |
Forensics and War-driving on Unsecured Wireless Network H Said, M Guimaraes, N Al Mutawa, I Al Awadhi Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011 | 16 | 2011 |
IPhone Forensics Techniques and Crime Investigation H Said, A Yousif, H Humaid Current Trends in Information Technology (CTIT), 2011 International …, 2011 | 15 | 2011 |
Database and Database Application Security H Said, MA Guimaraes, Z Maamar, L Jololian ACM SIGCSE Bulletin 41 (3), 90-93, 2009 | 12 | 2009 |
Mining the web and literature to discover new knowledge about diabetes F Marir, H Said, F Al-Obeidat Procedia Computer Science 83, 1256-1261, 2016 | 11 | 2016 |
Sentiment analysis on predicting presidential election: Twitter used case N Baker Al Barghuthi, H E. Said Intelligent Computing Systems: Third International Symposium, ISICS 2020 …, 2020 | 10 | 2020 |
Using Video games to Teach Security M Guimaraes, H Said, R Austin Proceedings of the 16th annual joint conference on Innovation and technology …, 2011 | 10 | 2011 |
Writer Identification Based on Handwriting HES Said, TN Tan, KD Baker IET Digital Library, 1998 | 9 | 1998 |
Experience With Video Games for Security MAM Guimaraes, H Said, R Austin Journal of Computing Sciences in Colleges 27 (3), 95-104, 2012 | 6 | 2012 |
An analytical study towards the UAE universities smart education innovated approaches SS Mohamed, NB Al Barghuthi, H Said 2017 IEEE 19th International Conference on High Performance Computing and …, 2017 | 5 | 2017 |