The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tarek S. Sobh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tarek S. Sobh, Awad H. Khalil
    Mobile Architecture for Discovering and Reacting to System Threats. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2006, pp:70-75 [Conf]
  2. Tharwat E. Alhanafy, H. Tantawi, M. Refai, Tarek S. Sobh, Awad H. Khalil
    Hybrid Learning Rules for Identifying Spacecraft System. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:397-403 [Conf]
  3. Tharwat E. Alhanafy, Tarek S. Sobh, Awad H. Khalil
    Neuro Fuzzy Techniques Using MATLAB/SIMULINK Applied to Real Process. [Citation Graph (0, 0)][DBLP]
    IASSE, 2005, pp:40-45 [Conf]
  4. Tarek S. Sobh, Awad H. Khalil
    An Integrated Model to Overcome IP Spoofing. [Citation Graph (0, 0)][DBLP]
    IASSE, 2004, pp:227-232 [Conf]
  5. Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki
    Design of an enhancement for SSL/TLS protocols. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:4, pp:297-306 [Journal]
  6. Mohammed Zaki, Tarek S. Sobh
    NCDS: data mining for discovering interesting network characteristics. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2005, v:47, n:3, pp:189-198 [Journal]
  7. M. Zaki, Tarek S. Sobh
    Attack abstraction using a multiagent system for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Journal of Intelligent and Fuzzy Systems, 2005, v:16, n:2, pp:141-150 [Journal]
  8. Mohammed Zaki, Hany Harb, Tarek S. Sobh
    A learning database system to observe malfunctions and to support network planning. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:1, pp:33-46 [Journal]
  9. Tharwat E. Alhanafy, Tarek S. Sobh, Awad H. Khalil
    A systematic algorithm to construct neuro-fuzzy inference system. [Citation Graph (0, 0)][DBLP]
    SEDE, 2007, pp:137-142 [Conf]
  10. Mohammed Zaki, Tarek S. Sobh
    A cooperative agent-based model for active security systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2004, v:27, n:4, pp:201-220 [Journal]

  11. A cooperative immunological approach for detecting network anomaly. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002