Follow
Huwida Said
Title
Cited by
Cited by
Year
Personal Identification Based on Handwriting
HES Said, TN Tan, KD Baker
Pattern Recognition 33 (1), 149-160, 2000
5092000
Personal identification based on handwriting
HES Said, TN Tan, KD Baker
Pattern Recognition 33 (1), 149-160, 2000
5092000
Personal Identification Based on Handwriting
HES SAID, GS Peake, TN TAN, KD Baker
IEEE International Conference on Pattern Recognition (ICPR'98), 1761-1764, 1998
5091998
Writer Identification from Non-uniformly Skewed Handwriting Images.
HES Said, GS Peake, TN Tan, KD Baker
British Machine Vision Conference (BMVC98), Vol 2, 478-487, 1998
971998
Forensic Analysis of Private Browsing Artifacts
H Said, N Al Mutawa, I Al Awadhi, M Guimaraes
Innovations in Information Technology (IIT), 2011 International Conference …, 2011
912011
Dealing with the problem of cybercrime
A Alkaabi, G Mohay, A McCullagh, N Chantler
International Conference on Digital Forensics and Cyber Crime, 1-18, 2010
472010
Social Networks IM Forensics: Encryption Analysis.
NB Al Barghuthi, H Said
Journal of Communications 8 (11), 708-715, 2013
412013
Analysis of cloud computing attacks and countermeasures
RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said
2016 18th International Conference on Advanced Communication Technology …, 2016
352016
Database Forensics
MAM Guimaraes, R Austin, H Said
2010 Information Security Curriculum Development Conference, 62-65, 2010
23*2010
Forensics and War-driving on Unsecured Wireless Network
H Said, M Guimaraes, N Al Mutawa, I Al Awadhi
Internet Technology and Secured Transactions (ICITST), 2011 International …, 2011
162011
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges
M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said
2018 International Conference on Innovations in Information Technology (IIT …, 2018
142018
Blockchain in supply chain trading
NB Al Barghuthi, HJ Mohamed, HE Said
2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018
132018
IPhone Forensics Techniques and Crime Investigation
H Said, A Yousif, H Humaid
Current Trends in Information Technology (CTIT), 2011 International …, 2011
132011
Database and Database Application Security
H Said, MA Guimaraes, Z Maamar, L Jololian
ACM SIGCSE Bulletin 41 (3), 90-93, 2009
112009
Writer Identification Based on Handwriting
HES Said, TN Tan, KD Baker
IET Digital Library, 1998
91998
Mining the web and literature to discover new knowledge about diabetes
F Marir, H Said, F Al-Obeidat
Procedia Computer Science 83, 1256-1261, 2016
82016
Using Video games to Teach Security
M Guimaraes, H Said, R Austin
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
72011
State of art of the effectiveness in adopting blockchain technology-UAE survey study
NB Al Barghuthi, C Ncube, H Said
2019 Sixth HCT Information Technology Trends (ITT), 54-59, 2019
62019
Evaluation of Linux SMTP server security aspects—A case study
S Khanji, R Jabir, L Ahmad, O Alfandi, H Said
2016 7th International Conference on Information and Communication Systems …, 2016
62016
Experience With Video Games for Security
MAM Guimaraes, H Said, R Austin
Journal of Computing Sciences in Colleges 27 (3), 95-104, 2012
62012
The system can't perform the operation now. Try again later.
Articles 1–20