![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Safia Abbas
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Sarah M. Alhammad, Nada Ahmed, Safia Abbas, Hussein Abulkasim, Ahmed Elhadad:
Robust 3D object watermarking scheme using shape features for copyright protection. PeerJ Comput. Sci. 10: e2020 (2024) - [j9]Mahmoud G. Ismail, Mohammed A.-M. Salem, Mohamed A. Abd El Ghany, Eman Abdullah Aldakheel, Safia Abbas:
Outlier detection for keystroke biometric user authentication. PeerJ Comput. Sci. 10: e2086 (2024) - 2022
- [j8]Muhammad Adil
, Houbing Song
, Jehad Ali
, Mian Ahmad Jan
, Muhammad Attique
, Safia Abbas
, Ahmed Farouk
:
Enhanced-AODV: A Robust Three Phase Priority-Based Traffic Load Balancing Scheme for Internet of Things. IEEE Internet Things J. 9(16): 14426-14437 (2022) - [j7]Muhammad Adil
, Mian Ahmad Jan
, Spyridon Mastorakis
, Houbing Song
, Muhammad Mohsin Jadoon, Safia Abbas
, Ahmed Farouk
:
Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22173-22183 (2022) - [j6]Muhammad Adil
, Jehad Ali
, Muhammad Attique
, Muhammad Mohsin Jadoon
, Safia Abbas
, Sattam Alotaibi
, Varun G. Menon
, Ahmed Farouk
:
Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 23(7): 9358-9369 (2022) - [c14]Ahmed Samir Ahmed Ibrahim El khadrawy, Safia Abbas, Yasser Kamal Omar, Nady Hussain Abd Jawad:
Extracting Semantic Relationship Between Fatiha Chapter (Sura) and the Holy Quran. AISI 2022: 612-626 - 2021
- [i5]Muhammad Adil, Mian Ahmad Jan, Spyridon Mastorakis, Houbing Song, Muhammad Mohsin Jadoon, Safia Abbas, Ahmed Farouk:
Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems. CoRR abs/2105.07711 (2021) - 2020
- [j5]Ahmed Elhadad
, Safia Abbas
, Hussein Abulkasim, Safwat H. Hamad
:
Improving the security of multi-party quantum key agreement with five-qubit Brown states. Comput. Commun. 159: 155-160 (2020) - [c13]Safia Abbas
:
Cyber-Medicine Service for Medical Diagnosis Based on IoT and Cloud Infrastructure. AICV 2020: 617-627
2010 – 2019
- 2019
- [c12]Aya A. Salah Farrag, Safia Abbas Mohamad, El-Sayed M. El-Horbaty:
Swarm Optimization for Solving Load Balancing in Cloud Computing. AMLTA 2019: 102-113 - 2017
- [c11]Dalia Fadl, Safia Abbas
, Mostafa Aref:
Automatic Arabic Ontology Construction Framework: An Insectivore's Animal Case Study. AISI 2017: 458-466 - 2016
- [c10]Abdulelah Saif, Safia Abbas
, Zaki Fayed:
Finding The Best Software Project Options by PDBO Algorithm for Improving Software Development Effort, Time and Quality. INFOS 2016: 304-311 - 2015
- [c9]Mohamed Sobhy, Safia Abbas
, Abdel-Badeeh M. Salem:
Knowledge Discovery for Banking Risk Management. IPAC 2015: 86:1-86:6 - [i4]Safia Abbas:
Deposit subscribe Prediction using Data Mining Techniques based Real Marketing Dataset. CoRR abs/1503.04344 (2015) - [i3]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. CoRR abs/1503.04796 (2015) - [i2]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Innovative Method for enhancing Key generation and management in the AES-algorithm. CoRR abs/1504.03406 (2015) - 2014
- [j4]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Cryptographic Cloud Computing Environment as a More Trusted Communication Environment. Int. J. Grid High Perform. Comput. 6(2): 38-51 (2014) - [c8]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Statistical analysis for random bits generation on quantum key distribution. CyberSec 2014: 45-51 - [c7]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Advanced encryption standard development based quantum key distribution. ICITST 2014: 402-408 - [i1]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A New Trend of Pseudo Random Number Generation using QKD. CoRR abs/1411.2469 (2014) - 2013
- [c6]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A comparative study between modern encryption algorithms based on cloud computing environment. ICITST 2013: 531-535 - 2012
- [j3]Safia Abbas
, Hajime Sawamura:
Argument mining based on a structured database and its usage in an intelligent tutoring environment. Knowl. Inf. Syst. 30(1): 213-246 (2012) - 2011
- [j2]Safia Abbas
, Hajime Sawamura:
ALES: An innovative agent-based learning environment to teach argumentation. Int. J. Knowl. Based Intell. Eng. Syst. 15(1): 25-41 (2011)
2000 – 2009
- 2009
- [c5]Safia Abbas, Hajime Sawamura:
an Argument Learning Environment Using Agent-Based ITS (ALES). EDM 2009: 200-209 - [c4]Taichi Hasegawa, Safia Abbas
, Hajime Sawamura:
Syncretic Argumentation by Means of Lattice Homomorphism. PRIMA 2009: 159-174 - 2008
- [c3]Safia Abbas, Hajime Sawamura:
Towards Argument Mining from Relational DataBase. EDM 2008: 202-209 - [c2]Safia Abbas, Hajime Sawamura:
A First Step towards Argument Mining and Its Use in Arguing Agents and ITS. KES (1) 2008: 149-157 - [c1]Syuusuke Kuribara, Safia Abbas
, Hajime Sawamura:
Applying the Logic of Multiple-Valued Argumentation to Social Web: SNS and Wikipedia. PRIMA 2008: 251-258 - 2001
- [j1]Abdel-Badeeh M. Salem, Mohamed Roushdy, Khaled Ahmed Nagaty, Safia Abbas:
Rough sets Approach for Data Mining in Medicine. Egypt. Comput. Sci. J. 23(1) (2001)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint