استاذ دكتور | shreif moharm


15


A Review on Steganalysis Techniques: From Image Format Point of View

2014

http://www.ijcaonline.org /archives/volume80/number3/13839-1268

Details | Edit | Delete

Cloud Based Public Collaboration System in Developing Countries

2014

(www.ijacsa.thesai.org) http://thesai.org/Publications/ViewPaper?Volume=5&Issue=9&Code=IJACSA&SerialNo=1

Details | Edit | Delete

The Card Management System, CMS, The Multi-service, multi-agent Service Delivery System

2014

(http://www.ijser.org) http://www.ijser.org/onlineResearchPaperViewer.aspx?The-Card-Management-System-CMS-The-Multi-service-multi-agent-Service.pdf

Details | Edit | Delete

A New Steganalysis Technique using Run Length Matrix (RLM(

2014

http://cnis.sc-conf.org/

Details | Edit | Delete

The effect of Mobility Models on a Secured Enhanced and Reliable Ad Hoc Multicasting Protocol

2013

http://www.ijcaonline.org/archives/volume80/number2/13832-0335

Details | Edit | Delete

Healthcare Cloud Integration using Distributed Cloud Storage and Hybrid Image Compression

2013

http://www.ijcaonline.org/archives/volume80/number3/13839-1268

Details | Edit | Delete

Erroneous Classified Attack: A Time-Bomb

2013

http://www.ijcaonline.org/archives/volume83/number1/14413-2515

Details | Edit | Delete

Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)

2013

Details | Edit | Delete

Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS)

2013

Details | Edit | Delete

Secured hierarchically dependent distributed database Model Applied to Hospitals Information System (HIS)

2013

Details | Edit | Delete

Phases vs. Levels using Decision Trees for Intrusion Detection Systems

2012

Details | Edit | Delete

Adaptive Layered Approach using Machine Learning Techniques with Gain ratio for Intrusion Detection systems

2012

Details | Edit | Delete

A Framework for Integrated Routing Protocols for Mobil Ad Hoc Network

2012

Details | Edit | Delete

Intrusion Detection System using data mining technique

2010

Details | Edit | Delete

Towards Ontology-Based Adaptive Multilevel Model for Intrusion Detection and Prevention System (AMIDPS)

2010

Details | Edit | Delete