Personal identification based on handwriting HES Said, TN Tan, KD Baker Pattern Recognition 33 (1), 149-160, 2000 | 551 | 2000 |
Forensic analysis of private browsing artifacts H Said, N Al Mutawa, I Al Awadhi, M Guimaraes 2011 International Conference on Innovations in Information Technology, 197-202, 2011 | 103 | 2011 |
Writer Identification from Non-uniformly Skewed Handwriting Images. HES Said, GS Peake, TN Tan, KD Baker BMVC, 1-10, 1998 | 98 | 1998 |
Social Networks IM Forensics: Encryption Analysis. N Al Barghouthy, H Said J. Commun. 8 (11), 708-715, 2013 | 48 | 2013 |
Analysis of cloud computing attacks and countermeasures RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said 2016 18th international conference on advanced communication technology …, 2016 | 47 | 2016 |
Database forensics MAM Guimaraes, R Austin, H Said 2010 Information Security Curriculum Development Conference, 62-65, 2010 | 22 | 2010 |
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said 2018 International Conference on Innovations in Information Technology (IIT …, 2018 | 18 | 2018 |
Forensics and war-driving on unsecured wireless network H Said, M Guimaraes, N Al Mutawa, I Al Awadhi 2011 International Conference for Internet Technology and Secured …, 2011 | 17 | 2011 |
Digital forensics and cyber crime I Baggili International ICST Conference ICDF2C 2010, 2011 | 17 | 2011 |
State of art of the effectiveness in adopting blockchain technology-UAE survey study NB Al Barghuthi, C Ncube, H Said 2019 Sixth HCT Information Technology Trends (ITT), 54-59, 2019 | 15 | 2019 |
Blockchain in supply chain trading NB Al Barghuthi, HJ Mohamed, HE Said 2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018 | 15 | 2018 |
IPhone forensics techniques and crime investigation H Said, A Yousif, H Humaid The 2011 International Conference and Workshop on Current Trends in …, 2011 | 13 | 2011 |
Database and database application security HE Said, MA Guimaraes, Z Maamar, L Jololian ACM SIGCSE Bulletin 41 (3), 90-93, 2009 | 13 | 2009 |
Mining the web and literature to discover new knowledge about diabetes F Marir, H Said, F Al-Obeidat Procedia Computer Science 83, 1256-1261, 2016 | 11 | 2016 |
Using video games to teach security M Guimaraes, H Said, R Austin Proceedings of the 16th annual joint conference on Innovation and technology …, 2011 | 10 | 2011 |
Writer identification based on handwriting HES Said, TN Tan, KD Baker IET Digital Library, 1998 | 9 | 1998 |
Sentiment analysis on predicting presidential election: Twitter used case N Baker Al Barghuthi, H E Said International Symposium on Intelligent Computing Systems 187, 105-117, 2020 | 8 | 2020 |
Experience with video games for security MAM Guimaraes, H Said, R Austin Journal of Computing Sciences in Colleges 27 (3), 95-104, 2012 | 7 | 2012 |
Evaluation of Linux SMTP server security aspects—A case study S Khanji, R Jabir, L Ahmad, O Alfandi, H Said 2016 7th International Conference on Information and Communication Systems …, 2016 | 6 | 2016 |
A brief review on integrated audio-visual processing for personal identification H Said, TN Tan IET Digital Library, 1996 | 6 | 1996 |