Dr. Huwida E. Said
Dr. Huwida E. Said
Associate Professor
Verified email at - Homepage
Cited by
Cited by
Personal identification based on handwriting
HES Said, TN Tan, KD Baker
Pattern Recognition 33 (1), 149-160, 2000
Writer Identification from Non-uniformly Skewed Handwriting Images.
HES Said, GS Peake, TN Tan, KD Baker
BMVC, 1-10, 1998
Forensic analysis of private browsing artifacts
H Said, N Al Mutawa, I Al Awadhi, M Guimaraes
2011 International Conference on Innovations in Information Technology, 197-202, 2011
Social Networks IM Forensics: Encryption Analysis.
N Al Barghouthy, H Said
J. Commun. 8 (11), 708-715, 2013
Analysis of cloud computing attacks and countermeasures
RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said
2016 18th International Conference on Advanced Communication Technology …, 2016
Database forensics
MAM Guimaraes, R Austin, H Said
2010 Information Security Curriculum Development Conference, 62-65, 2010
Forensics and war-driving on unsecured wireless network
H Said, M Guimaraes, N Al Mutawa, I Al Awadhi
2011 International Conference for Internet Technology and Secured …, 2011
Blockchain for UAE Organizations: Insights from CIOs with opportunities and challenges
M AlTaei, NB Al Barghuthi, QH Mahmoud, S Al Barghuthi, H Said
2018 International Conference on Innovations in Information Technology (IIT …, 2018
Blockchain in supply chain trading
NB Al Barghuthi, HJ Mohamed, HE Said
2018 Fifth HCT Information Technology Trends (ITT), 336-341, 2018
IPhone forensics techniques and crime investigation
H Said, A Yousif, H Humaid
The 2011 International Conference and Workshop on Current Trends in …, 2011
Database and database application security
HE Said, MA Guimaraes, Z Maamar, L Jololian
ACM SIGCSE Bulletin 41 (3), 90-93, 2009
Writer identification based on handwriting
HES Said, TN Tan, KD Baker
IET Digital Library, 1998
Mining the web and literature to discover new knowledge about diabetes
F Marir, H Said, F Al-Obeidat
Procedia Computer Science 83, 1256-1261, 2016
State of art of the effectiveness in adopting blockchain technology-UAE survey study
NB Al Barghuthi, C Ncube, H Said
2019 Sixth HCT Information Technology Trends (ITT), 54-59, 2019
Using video games to teach security
M Guimaraes, H Said, R Austin
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
Sentiment analysis on predicting presidential election: Twitter used case
N Baker Al Barghuthi, H E Said
International Symposium on Intelligent Computing Systems 187, 105-117, 2020
Experience with video games for security
MAM Guimaraes, H Said, R Austin
Journal of Computing Sciences in Colleges 27 (3), 95-104, 2012
Evaluation of Linux SMTP server security aspects—A case study
S Khanji, R Jabir, L Ahmad, O Alfandi, H Said
2016 7th International Conference on Information and Communication Systems …, 2016
Ethics behind Cyber Warfare: A study of Arab Citizens Awareness
HS NB Al Barghuthi
2014 IEEE International Symposium on Ethics in Engineering, Science, and ., 2014
A brief review on integrated audio-visual processing for personal identification
H Said, TN Tan
IET Digital Library, 1996
The system can't perform the operation now. Try again later.
Articles 1–20