default search action
Hisham M. Haddad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c57]Sharaban Tahora, Bilash Saha, Nazmus Sakib, Hossain Shahriar, Hisham Haddad:
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly. COMPSAC 2023: 1047-1056 - [i2]Sharaban Tahora, Bilash Saha, Nazmus Sakib, Hossain Shahriar, Hisham Haddad:
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly. CoRR abs/2306.04071 (2023) - 2022
- [c56]Jagan Moahan Reddy Danda, Kumar Priyansh, Hossain Shahriar, Hisham Haddad, Alfredo Cuzzocrea, Nazmus Sakib:
Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit Patients. COMPSAC 2022: 1402-1407 - [d1]Brunil Dalila Romero-Mariño, María José Rodríguez-Fórtiz, María Visitación Hurtado-Torres, Hisham M. Haddad:
ACCESIBILITIC ontology - version 3. IEEE DataPort, 2022 - [i1]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. CoRR abs/2207.09902 (2022) - 2021
- [j8]Hossain Shahriar, Hisham M. Haddad, Maryam Farhadi:
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications. Int. J. Inf. Secur. Priv. 15(2): 181-195 (2021) - [c55]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea, Fan Wu:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. IEEE BigData 2021: 5413-5419 - [c54]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad, WenZhan Song:
A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification. ICDH 2021: 293-298 - 2020
- [c53]Zhoulin Li, Hao Zhang, Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Cyber Fraud Prediction with Supervised Machine Learning Techniques. ACM Southeast Regional Conference 2020: 176-180 - [c52]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad, Md. Shafiul Alam:
r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework. IEEE BigData 2020: 1374-1379 - [c51]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad, Sheikh Iqbal Ahamed, Sweta Sneha, Mohammad Ashiqur Rahman, Alfredo Cuzzocrea:
Actionable Knowledge Extraction Framework for COVID-19. IEEE BigData 2020: 4036-4041 - [c50]Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset. COMPSAC 2020: 684-692 - [c49]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad:
Epileptic Seizure Detection for Imbalanced Datasets Using an Integrated Machine Learning Approach. EMBC 2020: 5416-5419 - [c48]Vara Vundavalli, Farhat Lamia Barsha, Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Malicious URL Detection Using Supervised Machine Learning Techniques. SIN 2020: 21:1-21:6
2010 – 2019
- 2019
- [c47]Feiyang Qu, Hisham Haddad, Hossain Shahriar:
Smart Contract-Based Secured Business-to-Consumer Supply Chain Systems. Blockchain 2019: 580-585 - [c46]Rehnuma Afrin, Hisham Haddad, Hossain Shahriar:
Supervised and Unsupervised-Based Analytics of Intensive Care Unit Data. COMPSAC (2) 2019: 417-422 - [c45]Maryam Farhadi, Hisham Haddad, Hossain Shahriar:
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements. COMPSAC (1) 2019: 704-713 - 2018
- [j7]Brunil Dalila Romero Marino, María José Rodríguez-Fórtiz, María Visitación Hurtado, Hisham M. Haddad:
Accessibility and Activity-Centered Design for ICT Users: ACCESIBILITIC Ontology. IEEE Access 6: 60655-60665 (2018) - [c44]Maryam Farhadi, Hisham Haddad, Hossain Shahriar:
Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications. COMPSAC (2) 2018: 474-479 - [e11]Hisham M. Haddad, Roger L. Wainwright, Richard Chbeir:
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, Pau, France, April 09-13, 2018. ACM 2018 [contents] - 2017
- [j6]Hossain Shahriar, Hisham Haddad, Pranahita Bulusu:
LDAP Vulnerability Detection in Web Applications. Int. J. Secur. Softw. Eng. 8(4): 31-50 (2017) - [c43]Hossain Shahriar, Hisham Haddad, Mahbubul Islam:
An Iris-Based Authentication Framework to Prevent Presentation Attacks. COMPSAC (2) 2017: 504-509 - [c42]Brunil Dalila Romero-Mariño, Vanesa Espín, María José Rodríguez-Fórtiz, María Visitación Hurtado-Torres, Luis Ramos, Hisham M. Haddad:
Ontology to Profile User Models with Disabilities. MEDI 2017: 372-385 - [c41]Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
Mitigating distributed denial of service attacks at the application layer. SAC 2017: 693-696 - 2016
- [j5]Hossain Shahriar, Hisham Haddad:
Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications. Int. J. Secur. Softw. Eng. 7(2): 1-18 (2016) - [j4]Hossain Shahriar, Hisham M. Haddad, David Lebron, Rubana Yasmin Lupu:
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications. Int. J. Secur. Softw. Eng. 7(4): 1-18 (2016) - [c40]Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
Information Theoretic Anomaly Detection Framework for Web Application. COMPSAC Workshops 2016: 394-399 - [c39]Hossain Shahriar, Hisham M. Haddad, Pranahita Bulusu:
OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities. COMPSAC Workshops 2016: 455-460 - [c38]Jing He, Amir Atabekov, Hisham M. Haddad:
Internet-of-Things Based Smart Resource Management System: A Case Study Intelligent Chair System. ICCCN 2016: 1-6 - [c37]Hossain Shahriar, Hisham Haddad:
Object injection vulnerability discovery based on latent semantic indexing. SAC 2016: 801-807 - [c36]Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. SIN 2016: 32-39 - 2015
- [j3]Hossain Shahriar, Hisham M. Haddad:
Client-Side Detection of Clickjacking Attacks. Int. J. Inf. Secur. Priv. 9(1): 1-25 (2015) - [j2]Hossain Shahriar, Hisham M. Haddad, Vamshee Krishna Devendran:
Request and Response Analysis Framework for Mitigating Clickjacking Attacks. Int. J. Secur. Softw. Eng. 6(3): 1-25 (2015) - [c35]Pranahita Bulusu, Hossain Shahriar, Hisham M. Haddad:
Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques. CTS 2015: 337-344 - [c34]Hossain Shahriar, Hisham M. Haddad:
Security assessment of clickjacking risks in web applications: metrics based approach. SAC 2015: 791-797 - 2014
- [c33]Manasvi Talluri, Hisham M. Haddad:
Best managerial practices in agile development. ACM Southeast Regional Conference 2014: 3:1-3:5 - [c32]Vanessa N. Cooper, Hossain Shahriar, Hisham M. Haddad:
A Survey of Android Malware Characterisitics and Mitigation Techniques. ITNG 2014: 327-332 - [c31]Hossain Shahriar, Hisham Haddad:
Risk assessment of code injection vulnerabilities using fuzzy logic-based system. SAC 2014: 1164-1170 - [c30]Hossain Shahriar, Hisham M. Haddad:
Content Provider Leakage Vulnerability Detection in Android Applications. SIN 2014: 359 - 2013
- [c29]Jing He, Shouling Ji, Xiaojing Liao, Hisham M. Haddad, Raheem A. Beyah:
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences. IPCCC 2013: 1-8 - [c28]Hisham M. Haddad:
One-Semester CS Capstone: A 40-60 Teaching Approach. ITNG 2013: 97-102 - [c27]Hossain Shahriar, Hisham M. Haddad:
Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities. ITNG 2013: 627-632 - [c26]Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad:
ProClick: a framework for testing clickjacking attacks in web applications. SIN 2013: 144-151 - 2012
- [c25]James R. Miller, Hisham M. Haddad:
Challenges Faced While Simultaneously Implementing CMMI and Scrum: A Case Study in the Tax Preparation Software Industry. ITNG 2012: 314-318 - 2011
- [c24]Hisham M. Haddad, Donald Eric Meredith:
Instituting Software Metrics in Small Organizations: A Practical Approach. ITNG 2011: 227-232 - 2010
- [c23]Brunil Dalila Romero Marino, Hisham M. Haddad:
Asset Assessment in Web Applications. ITNG 2010: 762-767
2000 – 2009
- 2009
- [c22]Brunil Dalila Romero Marino, Hisham M. Haddad, Jorge E. Molero A.:
A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment. ICSEA 2009: 413-418 - [c21]Brunil Dalila Romero Marino, Hisham M. Haddad:
Security Vulnerabilities and Mitigation Strategies for Application Development. ITNG 2009: 235-240 - [c20]Christopher M. Kanode, Hisham M. Haddad:
Software Engineering Challenges in Game Development. ITNG 2009: 260-265 - 2008
- [c19]Mauricio Jose Ordoñez, Hisham M. Haddad:
The State of Metrics in Software Industry. ITNG 2008: 453-458 - [c18]Olayemi Olagbegi, Hisham Haddad:
Agile Development: Do advantages outweigh short comings? Software Engineering Research and Practice 2008: 46-52 - [e10]Roger L. Wainwright, Hisham Haddad:
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. ACM 2008, ISBN 978-1-59593-753-7 [contents] - 2007
- [c17]Hisham M. Haddad, Mauricio Jose Ordoñez:
Enhanced Component Reuse with Atomic Domains: Application Scenarios. ITNG 2007: 597-602 - [c16]Mauricio Jose Ordoñez, Hisham M. Haddad:
UML Modeling of Reusable Atomic Domains. Software Engineering Research and Practice 2007: 319-325 - [e9]Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo:
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007. ACM 2007, ISBN 1-59593-480-4 [contents] - 2006
- [j1]Hisham M. Haddad, Ying Xie:
Wrapper-Based Framework for Domain-Specific Software Reuse. J. Inf. Sci. Eng. 22(2): 269-282 (2006) - [c15]Ying Xie, Manmathasivaram Nagarajan, Vijay V. Raghavan, Hisham Haddad:
On Novelty Evaluation of Potentially Useful Patterns. DMIN 2006: 211-217 - [c14]Hisham M. Haddad:
Integrated Collections: Approach to Software Component Reuse. ITNG 2006: 28-33 - [c13]Shreedevi Inamdar, Hisham Haddad:
Critical Systems and Software Risk to Public Safety: Issues and Research Directions. Software Engineering Research and Practice 2006: 93-99 - [c12]Usa Rungratchakanon, Hisham Haddad:
Study of Information Retrieval Systems and Software Reuse Libraries. Software Engineering Research and Practice 2006: 173-178 - [c11]James Tollerson, Hisham Haddad:
Conceptual Model for Integration of COTS Components. Software Engineering Research and Practice 2006: 613-619 - [e8]Hisham Haddad:
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006. ACM 2006, ISBN 1-59593-108-2 [contents] - 2005
- [c10]Theodore (Ted) Roberts, Hisham M. Haddad:
Application development for desktop and PDA-style devices: issues and lessons learned. ACM Southeast Regional Conference (2) 2005: 242-247 - [c9]Amy B. Woszczynski, Hisham M. Haddad, Anita F. Zgambo:
Towards a model of student success in programming courses. ACM Southeast Regional Conference (1) 2005: 301-302 - [c8]Walter Fortner, Hisham Haddad:
Integration of Wrapper Preprocessor into C/C++ IDE for Implementing Reusable Components. Software Engineering Research and Practice 2005: 408-416 - [e7]Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, Roger L. Wainwright:
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005. ACM 2005, ISBN 1-58113-964-0 [contents] - 2004
- [c7]Hisham Haddad, Walter Fortner:
A Wrapper Pre-Processor for Implementing Domain-Specific Reusable Components. Software Engineering Research and Practice 2004: 748-752 - [e6]Hisham Haddad, Andrea Omicini, Roger L. Wainwright, Lorie M. Liebrock:
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004. ACM 2004, ISBN 1-58113-812-1 [contents] - 2003
- [c6]Hisham Haddad, Walter Fortner:
A Framework for Domain-Specific Reusable Component. Software Engineering Research and Practice 2003: 384-390 - [c5]Hisham Haddad, Erol Biberoglu:
Component-Based Software Engineering: Issues and Concerns. Software Engineering Research and Practice 2003: 391-397 - [e5]Gary B. Lamont, Hisham Haddad, George A. Papadopoulos, Brajendra Panda:
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, USA. ACM 2003, ISBN 1-58113-624-2 [contents] - 2002
- [c4]Hisham Haddad, Herbert Tesser:
Reusable subsystems: domain-based approach. SAC 2002: 971-975 - [e4]Gary B. Lamont, Hisham Haddad, George A. Papadopoulos, Brajendra Panda:
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain. ACM 2002, ISBN 1-58113-445-2 [contents] - 2000
- [c3]Herbert Tesser, Hisham Al-Haddad, Gary Anderson:
Instrumentation: a multi-science integrated sequence. SIGCSE 2000: 232-236 - [e3]Barrett R. Bryant, Janice H. Carroll, Ernesto Damiani, Hisham Haddad, Dave Oppenheim:
Applied Computing 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March 19-21, 2000. Volume 1. ACM 2000, ISBN 1-58113-240-9 [contents] - [e2]Barrett R. Bryant, Janice H. Carroll, Ernesto Damiani, Hisham Haddad, Dave Oppenheim:
Applied Computing 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March 19-21, 2000. Volume 2. ACM 2000 [contents]
1990 – 1999
- 1999
- [e1]Barrett R. Bryant, Gary B. Lamont, Hisham Haddad, Janice H. Carroll:
Proceedings of the 1999 ACM Symposium on Applied Computing, SAC'99, San Antonio, Texas, USA, February 28 - March 2, 1999. ACM 1999, ISBN 1-58113-086-4 [contents] - 1997
- [c2]Hisham Haddad, Herbert Tesser, Steven P. Wartik:
Megaprogramming education. SIGCSE 1997: 282-286 - 1994
- [c1]Akhtar Lodgher, Hisham Al-Haddad:
A practical approach for teaching reuse in a data structures course using Ada (abstract). SIGCSE 1994: 407
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint