Hisham M. Haddad
  According to our database1,
  Hisham M. Haddad
  authored at least 73 papers
  between 1994 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
  2023
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly.
    
  
    Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
    
  
  2022
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
    
  
    CoRR, 2022
    
  
Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit Patients.
    
  
    Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
    
  
  2021
    Int. J. Inf. Secur. Priv., 2021
    
  
A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification.
    
  
    Proceedings of the IEEE International Conference on Digital Health, 2021
    
  
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
    
  
    Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
    
  
  2020
    Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
    
  
Epileptic Seizure Detection for Imbalanced Datasets Using an Integrated Machine Learning Approach.
    
  
    Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020
    
  
Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset.
    
  
    Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
    
  
    Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
    
  
r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework.
    
  
    Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
    
  
    Proceedings of the 2020 ACM Southeast Conference, 2020
    
  
  2019
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements.
    
  
    Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
    
  
    Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
    
  
    Proceedings of the IEEE International Conference on Blockchain, 2019
    
  
  2018
    IEEE Access, 2018
    
  
Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications.
    
  
    Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
    
  
  2017
    Proceedings of the Symposium on Applied Computing, 2017
    
  
    Proceedings of the Model and Data Engineering - 7th International Conference, 2017
    
  
    Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
    
  
  2016
    Int. J. Secur. Softw. Eng., 2016
    
  
    Int. J. Secur. Softw. Eng., 2016
    
  
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm.
    
  
    Proceedings of the 9th International Conference on Security of Information and Networks, 2016
    
  
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
    
  
Internet-of-Things Based Smart Resource Management System: A Case Study Intelligent Chair System.
    
  
    Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
    
  
    Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
    
  
    Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
    
  
  2015
    Int. J. Secur. Softw. Eng., 2015
    
  
Security assessment of clickjacking risks in web applications: metrics based approach.
    
  
    Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
    
  
Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques.
    
  
    Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015
    
  
  2014
    Proceedings of the 7th International Conference on Security of Information and Networks, 2014
    
  
    Proceedings of the Symposium on Applied Computing, 2014
    
  
    Proceedings of the 11th International Conference on Information Technology: New Generations, 2014
    
  
    Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
    
  
  2013
    Proceedings of the 6th International Conference on Security of Information and Networks, 2013
    
  
    Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
    
  
    Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
    
  
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
    
  
    Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
    
  
  2012
    J. Comput. Sci. Coll., 2012
    
  
Converting users to testers: an alternative approach to load test script creation, parameterization and data corellation.
    
  
    J. Comput. Sci. Coll., 2012
    
  
    J. Comput. Sci. Coll., 2012
    
  
Challenges Faced While Simultaneously Implementing CMMI and Scrum: A Case Study in the Tax Preparation Software Industry.
    
  
    Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
    
  
  2011
    Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
    
  
  2010
    Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
    
  
  2009
    Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
    
  
    Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
    
  
A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment.
    
  
    Proceedings of the Fourth International Conference on Software Engineering Advances, 2009
    
  
  2008
Agile Development: Do advantages outweigh short comings?
  
    Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008
    
  
    Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
    
  
  2007
UML Modeling of Reusable Atomic Domains.
  
    Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007
    
  
    Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
    
  
  2006
Conceptual Model for Integration of COTS Components.
  
    Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006
    
  
Study of Information Retrieval Systems and Software Reuse Libraries.
  
    Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006
    
  
Critical Systems and Software Risk to Public Safety: Issues and Research Directions.
  
    Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006
    
  
    Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
    
  
On Novelty Evaluation of Potentially Useful Patterns.
  
    Proceedings of the 2006 International Conference on Data Mining, 2006
    
  
  2005
Integration of Wrapper Preprocessor into C/C++ IDE for Implementing Reusable Components.
  
    Proceedings of the International Conference on Software Engineering Research and Practice, 2005
    
  
    Proceedings of the 43nd Annual Southeast Regional Conference, 2005
    
  
Application development for desktop and PDA-style devices: issues and lessons learned.
    
  
    Proceedings of the 43nd Annual Southeast Regional Conference, 2005
    
  
  2004
A Wrapper Pre-Processor for Implementing Domain-Specific Reusable Components.
  
    Proceedings of the International Conference on Software Engineering Research and Practice, 2004
    
  
  2003
A Framework for Domain-Specific Reusable Component.
  
    Proceedings of the International Conference on Software Engineering Research and Practice, 2003
    
  
Component-Based Software Engineering: Issues and Concerns.
  
    Proceedings of the International Conference on Software Engineering Research and Practice, 2003
    
  
  2002
    J. Comput. Sci. Coll., 2002
    
  
    J. Comput. Sci. Coll., 2002
    
  
    Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
    
  
  2000
    Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, 2000
    
  
  1997
    Proceedings of the 28th SIGCSE Technical Symposium on Computer Science Education, 1997
    
  
  1994
A practical approach for teaching reuse in a data structures course using Ada (abstract).
    
  
    Proceedings of the 25th SIGCSE Technical Symposium on Computer Science Education, 1994