Khair Eddin Sabri
Orcid: 0000-0002-8865-920X
According to our database1,
Khair Eddin Sabri
authored at least 28 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Informatica (Slovenia), 2023
2022
A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer.
Appl. Intell., 2022
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review.
Proceedings of the International Conference on Computer and Applications, 2022
Proceedings of the Applications of Evolutionary Computation - 25th European Conference, 2022
2021
Salp Swarm Optimization Search Based Feature Selection for Enhanced Phishing Websites Detection.
Proceedings of the Applications of Evolutionary Computation, 2021
A feature selection algorithm for intrusion detection system based on Moth Flame Optimization.
Proceedings of the International Conference on Information Technology, 2021
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish.
Proceedings of the International Conference on Information Technology, 2021
2020
J. Cyber Secur. Mobil., 2020
Searchable encryption architectures: survey of the literature and proposing a unified architecture.
Int. J. Inf. Priv. Secur. Integr., 2020
A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer.
Expert Syst. Appl., 2020
IEEE Access, 2020
2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
2018
Generating Test Cases from Role-Based Access Control Policies using Cause-Effect Graph.
J. Softw., 2018
Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities.
J. Netw. Comput. Appl., 2018
2016
Appl. Intell., 2016
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016
Proceedings of the 7th International Conference on Ambient Systems, 2016
2015
J. Ambient Intell. Humaniz. Comput., 2015
Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9.
CoRR, 2015
2014
Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution.
Fundam. Informaticae, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2009
Proceedings of the E-Technologies: Innovation in an Open World, 2009
2005
Int. Arab J. Inf. Technol., 2005