Seguir
Tarek Salah Sobh
Tarek Salah Sobh
Egyptian Armed Forces, Information Systems Department (ISD)
Dirección de correo verificada de afmic.gov.eg
Título
Citado por
Citado por
Año
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
TS Sobh
Computer Standards & Interfaces 28 (6), 670-694, 2006
1372006
A cooperative immunological approach for detecting network anomaly
TS Sobh, WM Mostafa
applied soft computing 11 (1), 1275-1283, 2011
422011
Design of an enhancement for SSL/TLS protocols
A Elgohary, TS Sobh, M Zaki
computers & security 25 (4), 297-306, 2006
422006
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
TH Eldin Helmy, M Abd-ElMegied, TS Sobh, KMS Badran
International Journal of Computer Networks and Applications 1 (1), 15-25, 2014
33*2014
Wi-Fi networks security and accessing control
TS Sobh
International Journal of Computer Network and Information Security 5 (7), 9, 2013
272013
A cooperative agent-based model for active security systems
M Zaki, TS Sobh
Journal of network and computer applications 27 (4), 201-220, 2004
222004
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
THE Helmy, M zaki Abd-ElMegied, TS Sobh, KMS Badran
Journal of Theoretical and Applied Information Technology 85 (3), 425–436, 2016
212016
Anti money laundering using a two-phase system
TH Moustafa, MZ Abd El-Megied, TS Sobh, KM Shafea
Journal of Money Laundering Control 18 (3), 304-329, 2015
162015
Attack abstraction using a multiagent system for intrusion detection
M Zaki, TS Sobh
Journal of Intelligent & Fuzzy Systems 16 (2), 141-150, 2005
152005
Effective and extensive virtual private network
TS Sobh, Y Aly
Journal of Information Security 2 (01), 39, 2011
142011
An intelligent and secure framework for anti-money laundering
TS Sobh
Journal of Applied Security Research 15 (4), 517-546, 2020
122020
Intelligent System for Worm Detection
IA Farag, MA Shouman, TS Sobh, HZ El-Fiqi
Journal: International Arab Journal of e-Technology ISSN 1 (1), 58=67, 2009
122009
NCDS: data mining for discovering interesting network characteristics
M Zaki, TS Sobh
Information and Software Technology 47 (3), 189-198, 2005
122005
Performance improvements on the network security protocols
TS Sobh, A Elgohary, M Zaki
International Journal of Network Security 6 (1), 103-115, 2008
112008
Identity Management: Lightweight SAML for Less Processing Power
M Ali, TS Sobh, S El-Gamal
IJ Information Technology and Computer Science, 42-49, 2015
92015
Anomaly detection based on hybrid artificial immune principles
T Salah Sobh
Information Management & Computer Security 21 (4), 288-314, 2013
82013
Identity management using SAML for mobile clients and Internet of Things
TS Sobh
Journal of High Speed Networks 25 (1), 101-126, 2019
72019
PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services
TS Sobh, MI Amer
International Journal of Network Security 13 (2), 79–91, 2011
72011
Evaluating Web Services Functionality and Performance
TS Sobh, M Fakhry
International Journal of Information Technology and Computer Science (IJITCS …, 2014
62014
An efficient and dependable protocol for critical MANETs
A Elgohary, TS Sobh, SA Nouh, M Zaki
Journal of High Speed Networks 20 (3), 153-168, 2014
62014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20