Sherif Saad
Orcid: 0000-0002-5506-5261
According to our database1,
Sherif Saad
authored at least 39 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
1
2
2
1
2
1
1
1
2
2
3
2
1
2
4
3
1
1
1
2
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
IEEE Trans. Comput. Soc. Syst., August, 2024
TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Finding a Needle in the Adversarial Haystack: A Targeted Paraphrasing Approach For Uncovering Edge Cases with Minimal Distribution Distortion.
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics, 2024
2023
Evaluating the effectiveness of pseudonym changing strategies for location privacy in vehicular ad-hoc network.
Secur. Priv., 2023
CoRR, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 20th International Conference on Smart Business Technologies, 2023
Preserving Privacy Through Dememorization: An Unlearning Technique For Mitigating Memorization Risks In Language Models.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
2022
A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks.
Internet Things, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Predicting the Outcome of Soccer Matches Using Machine Learning and Statistical Analysis.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022
2021
Automated detection of unstructured context-dependent sensitive information using deep learning.
Internet Things, 2021
Comput. Secur., 2021
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains.
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
Proceedings of the 15th International Conference on Software Technologies, 2020
Proceedings of the 3rd IEEE Connected and Automated Vehicles Symposium, 2020
2019
Int. J. Netw. Secur., 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
2018
Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018
Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning.
Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, 2018
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018
2017
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017
2014
J. Networks, 2014
Proceedings of the 10th International Conference on Information Assurance and Security, 2014
2013
Comput. Secur., 2013
Proceedings of the International Conference on Computer, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Ontology-based Intelligent Network-Forensics Investigation.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010