A SURVEY OF PRIVACY PRESERVING DATA MINING ALGORITHMS
Hussein, Abou el ela Abdou, Hamza, Nermin, Shahen, Ashraf A., Hefny, Hesham A.
Published in Yanbu journal of engineering and science (14.05.2021)
Published in Yanbu journal of engineering and science (14.05.2021)
Get full text
Journal Article
Inhibition of Glucosyltransferase enzyme of Streptococcus mutans by natural products- A Literature Review
Balbaa, Mona, Taher, Heba, Kamal Hamza, Nermin, Balbool, Bassem
Published in MSA Dental Journal (01.10.2023)
Published in MSA Dental Journal (01.10.2023)
Get full text
Journal Article
Factors that Influence the Adoption of Information Security on Requirement Phase for Custom-Made Software at SMEs
Alghamdi, Fatimah, Hamza, Nermin, Tamimi, Moutasm
Published in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (01.05.2019)
Published in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (01.05.2019)
Get full text
Conference Proceeding
Toward Privacy Protection for Location based Recommender Systems: A Survey of the state-of-the-art
Al-Nazzawi, Tahani S., Alotaibi, Reem M., Hamza, Nermin
Published in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS) (01.04.2018)
Published in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS) (01.04.2018)
Get full text
Conference Proceeding
A proposed covert channel based on memory reclamation
Hussein, Omar, Hamza, Nermin, Hefny, Hesham
Published in 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS) (01.12.2015)
Published in 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS) (01.12.2015)
Get full text
Conference Proceeding
A secure algorithm for executing queries over encrypted data
Refaie, Rasha, Ahmed, Abd El-Aziz, Hamza, Nermin, Al-monem, Mahmood, Hefny, Hesham
Published in 2015 Third World Conference on Complex Systems (WCCS) (01.11.2015)
Published in 2015 Third World Conference on Complex Systems (WCCS) (01.11.2015)
Get full text
Conference Proceeding
A new efficient algorithm for executing queries over encrypted data
Refaie, Rasha, Abd El-Aziz, A. A., Hamza, Nermin, Mahmood, Mahmood A., Hefny, Hesham
Published in 2015 International Conference on Computing, Communication and Security (ICCCS) (01.12.2015)
Published in 2015 International Conference on Computing, Communication and Security (ICCCS) (01.12.2015)
Get full text
Conference Proceeding
A dynamic ID-based authentication scheme with smart token
Hamza, N., Hassan, B.E.-D.M.
Published in 2009 International Conference on Computer Engineering & Systems (01.12.2009)
Published in 2009 International Conference on Computer Engineering & Systems (01.12.2009)
Get full text
Conference Proceeding