Huwida Said
Cited by
Cited by
Personal Identification Based on Handwriting
HES Said, TN Tan, KD Baker
Pattern Recognition 33 (1), 149-160, 2000
Personal identification based on handwriting
HES Said, TN Tan, KD Baker
Pattern Recognition 33 (1), 149-160, 2000
Personal Identification Based on Handwriting
HES SAID, GS Peake, TN TAN, KD Baker
IEEE International Conference on Pattern Recognition (ICPR'98), 1761-1764, 1998
Writer Identification from Non-uniformly Skewed Handwriting Images.
HES Said, GS Peake, TN Tan, KD Baker
British Machine Vision Conference (BMVC98), Vol 2, 478-487, 1998
Forensic Analysis of Private Browsing Artifacts
H Said, N Al Mutawa, I Al Awadhi, M Guimaraes
Innovations in Information Technology (IIT), 2011 International Conference …, 2011
Dealing with the problem of cybercrime
A Alkaabi, G Mohay, A McCullagh, N Chantler
International Conference on Digital Forensics and Cyber Crime, 1-18, 2010
Social Networks IM Forensics: Encryption Analysis.
NB Al Barghuthi, H Said
Journal of Communications 8 (11), 708-715, 2013
Analysis of cloud computing attacks and countermeasures
RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said
2016 18th International Conference on Advanced Communication Technology …, 2016
Database Forensics
MAM Guimaraes, R Austin, H Said
2010 Information Security Curriculum Development Conference, 62-65, 2010
Forensics and War-driving on Unsecured Wireless Network
H Said, M Guimaraes, N Al Mutawa, I Al Awadhi
Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges
M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said
2018 International Conference on Innovations in Information Technology (IIT …, 2018
Blockchain in supply chain trading
NB Al Barghuthi, HJ Mohamed, HE Said
2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018
IPhone Forensics Techniques and Crime Investigation
H Said, A Yousif, H Humaid
Current Trends in Information Technology (CTIT), 2011 International …, 2011
Database and Database Application Security
H Said, MA Guimaraes, Z Maamar, L Jololian
ACM SIGCSE Bulletin 41 (3), 90-93, 2009
Mining the web and literature to discover new knowledge about diabetes
F Marir, H Said, F Al-Obeidat
Procedia Computer Science 83, 1256-1261, 2016
Writer Identification Based on Handwriting
HES Said, TN Tan, KD Baker
IET Digital Library, 1998
State of art of the effectiveness in adopting blockchain technology-UAE survey study
NB Al Barghuthi, C Ncube, H Said
2019 Sixth HCT Information Technology Trends (ITT), 54-59, 2019
Using Video games to Teach Security
M Guimaraes, H Said, R Austin
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
Sentiment analysis on predicting presidential election: Twitter used case
N Baker Al Barghuthi, H E Said
International Symposium on Intelligent Computing Systems, 105-117, 2020
Evaluation of Linux SMTP server security aspects—A case study
S Khanji, R Jabir, L Ahmad, O Alfandi, H Said
2016 7th International Conference on Information and Communication Systems …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20