Deducing case IDs for unlabeled event logs D Bayomie, I Helal, A Awad, E Ezat, A ElBastawissi International Conference on Business Process Management, 242-254, 2016 | 44 | 2016 |
Adopting security maturity model to the organizations’ capability model OMM Al-Matari, IMA Helal, SA Mazen, S Elhennawy Egyptian Informatics Journal 22 (2), 193-199, 2021 | 40 | 2021 |
Integrated framework for cybersecurity auditing OMM Al-Matari, IMA Helal, SA Mazen, S Elhennawy Information Security Journal: A Global Perspective 30 (4), 189-204, 2021 | 23 | 2021 |
Cybersecurity Tools for IS Auditing OM Al-Matari, IMA Helal, SA Mazen, S Elhennawy The 6th International Conference on Enterprise Systems, 2018 | 17 | 2018 |
A hybrid knowledge-based recommender for product-service systems mass customization L Esheiba, A Elgammal, IMA Helal, ME El-Sharkawi Information 12 (8), 296, 2021 | 14 | 2021 |
Runtime deduction of case ID for unlabeled business process execution events IMA Helal, A Awad, A El Bastawissi 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 13 | 2015 |
A data warehouse-based system for service customization recommendations in product-service systems L Esheiba, IMA Helal, A Elgammal, ME El-Sharkawi Sensors 22 (6), 2118, 2022 | 12 | 2022 |
Online correlation for unlabeled process events: A flexible CEP-based approach IMA Helal, A Awad Information systems 108, 102031, 2022 | 9 | 2022 |
Computer-assisted audit tools for IS auditing: A comparative study S Kamal, IMA Helal, SA Mazen, S Elhennawy Internet of Things—Applications and Future: Proceedings of ITAF 2019, 139-155, 2020 | 7 | 2020 |
A resource recommendation approach based on co-working history NM Abdulhameed, IMA Helal, A Awad, E Ezat International Journal of Advanced Computer Science and Applications 9 (7), 2018 | 5 | 2018 |
Efficient checking of timed ordered anti-patterns over graph-encoded event logs NM Zaki, IMA Helal, EE Hassanein, A Awad International Conference on Model and Data Engineering, 147-161, 2022 | 4 | 2022 |
Correlating unlabeled events at runtime I Helal, A Awad arXiv preprint arXiv:2004.09971, 2020 | 4 | 2020 |
Analytical study on building a comprehensive big data management maturity framework M Helmy, S Mazen, I M Helal, W Youssef International Journal of Information Science and Management (IJISM) 20 (1), 2022 | 3 | 2022 |
Blockchain Interoperability Method for the Cross-organizational Transactions: A Meta-Meta-Model E Nassar, I Helal, S Mazen OkIP Books, 2022 | 2 | 2022 |
Models and frameworks for is outsourcing structure and dimensions: A Holistic Study E Elnakeep, IMA Helal, SA Mazen Proceedings of International Conference on Emerging Technologies and …, 2022 | 2 | 2022 |
Modelling Blockchain-Based Systems Using Model-Driven Engineering EY Nassar, S Mazen, S Craβ, IMA Helal 2023 Fifth International Conference on Blockchain Computing and Applications …, 2023 | 1 | 2023 |
Efficient Checking of Timed Order Compliance Rules over Graph-encoded Event Logs NM Zaki, I Helal, A Awad, EE Hassanein arXiv preprint arXiv:2206.09336, 2022 | 1 | 2022 |
System Integration for Large-Scale Software Projects: Models, Approaches, and Challenges MA Shibl, IMA Helal, SA Mazen Proceedings of International Conference on Emerging Technologies and …, 2022 | 1 | 2022 |
ICCPN: Interval-based Conditional Colored Petri Net IMA Helal, A El-Bastawissy, O Hegazy 2010 The 7th International Conference on Informatics and Systems (INFOS), 1-8, 2010 | 1 | 2010 |
From Data to Diagnosis: Investigating Approaches in Mental Illness Detection RK Montasser, SA Mazen, IMA Helal 2024 Intelligent Methods, Systems, and Applications (IMSA), 563-568, 2024 | | 2024 |