Hisham M. Haddad

According to our database1, Hisham M. Haddad authored at least 67 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022

Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
CoRR, 2022

Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit Patients.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications.
Int. J. Inf. Secur. Priv., 2021

A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification.
Proceedings of the IEEE International Conference on Digital Health, 2021

Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Malicious URL Detection Using Supervised Machine Learning Techniques.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Epileptic Seizure Detection for Imbalanced Datasets Using an Integrated Machine Learning Approach.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Actionable Knowledge Extraction Framework for COVID-19.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Cyber Fraud Prediction with Supervised Machine Learning Techniques.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Supervised and Unsupervised-Based Analytics of Intensive Care Unit Data.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Smart Contract-Based Secured Business-to-Consumer Supply Chain Systems.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Accessibility and Activity-Centered Design for ICT Users: ACCESIBILITIC Ontology.
IEEE Access, 2018

Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
LDAP Vulnerability Detection in Web Applications.
Int. J. Secur. Softw. Eng., 2017

Mitigating distributed denial of service attacks at the application layer.
Proceedings of the Symposium on Applied Computing, 2017

Ontology to Profile User Models with Disabilities.
Proceedings of the Model and Data Engineering - 7th International Conference, 2017

An Iris-Based Authentication Framework to Prevent Presentation Attacks.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications.
Int. J. Secur. Softw. Eng., 2016

Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications.
Int. J. Secur. Softw. Eng., 2016

A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Object injection vulnerability discovery based on latent semantic indexing.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Internet-of-Things Based Smart Resource Management System: A Case Study Intelligent Chair System.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Information Theoretic Anomaly Detection Framework for Web Application.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Request and Response Analysis Framework for Mitigating Clickjacking Attacks.
Int. J. Secur. Softw. Eng., 2015

Client-Side Detection of Clickjacking Attacks.
Int. J. Inf. Secur. Priv., 2015

Security assessment of clickjacking risks in web applications: metrics based approach.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

2014
Content Provider Leakage Vulnerability Detection in Android Applications.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Risk assessment of code injection vulnerabilities using fuzzy logic-based system.
Proceedings of the Symposium on Applied Computing, 2014

A Survey of Android Malware Characterisitics and Mitigation Techniques.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Best managerial practices in agile development.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
ProClick: a framework for testing clickjacking attacks in web applications.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

One-Semester CS Capstone: A 40-60 Teaching Approach.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Challenges Faced While Simultaneously Implementing CMMI and Scrum: A Case Study in the Tax Preparation Software Industry.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2011
Instituting Software Metrics in Small Organizations: A Practical Approach.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Asset Assessment in Web Applications.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Security Vulnerabilities and Mitigation Strategies for Application Development.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Software Engineering Challenges in Game Development.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

2008
Agile Development: Do advantages outweigh short comings?
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

The State of Metrics in Software Industry.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
UML Modeling of Reusable Atomic Domains.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Enhanced Component Reuse with Atomic Domains: Application Scenarios.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Wrapper-Based Framework for Domain-Specific Software Reuse.
J. Inf. Sci. Eng., 2006

Conceptual Model for Integration of COTS Components.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Study of Information Retrieval Systems and Software Reuse Libraries.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Critical Systems and Software Risk to Public Safety: Issues and Research Directions.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Integrated Collections: Approach to Software Component Reuse.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

On Novelty Evaluation of Potentially Useful Patterns.
Proceedings of the 2006 International Conference on Data Mining, 2006

2005
Integration of Wrapper Preprocessor into C/C++ IDE for Implementing Reusable Components.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

Towards a model of student success in programming courses.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Application development for desktop and PDA-style devices: issues and lessons learned.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
A Wrapper Pre-Processor for Implementing Domain-Specific Reusable Components.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

2003
A Framework for Domain-Specific Reusable Component.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Component-Based Software Engineering: Issues and Concerns.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

2002
Reusable subsystems: domain-based approach.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

2000
Instrumentation: a multi-science integrated sequence.
Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, 2000

1997
Megaprogramming education.
Proceedings of the 28th SIGCSE Technical Symposium on Computer Science Education, 1997

1994
A practical approach for teaching reuse in a data structures course using Ada (abstract).
Proceedings of the 25th SIGCSE Technical Symposium on Computer Science Education, 1994


  Loading...