Khair Eddin Sabri

Orcid: 0000-0002-8865-920X

According to our database1, Khair Eddin Sabri authored at least 28 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Digital Evidences Preservation Framework for a Logic Based Smart Contract.
Informatica (Slovenia), 2023

2022
A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer.
Appl. Intell., 2022

Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review.
Proceedings of the International Conference on Computer and Applications, 2022

An Enhanced Opposition-Based Evolutionary Feature Selection Approach.
Proceedings of the Applications of Evolutionary Computation - 25th European Conference, 2022

2021
Salp Swarm Optimization Search Based Feature Selection for Enhanced Phishing Websites Detection.
Proceedings of the Applications of Evolutionary Computation, 2021

A feature selection algorithm for intrusion detection system based on Moth Flame Optimization.
Proceedings of the International Conference on Information Technology, 2021

A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish.
Proceedings of the International Conference on Information Technology, 2021

2020
Object Authentication in the Context of the Internet of Things: A Survey.
J. Cyber Secur. Mobil., 2020

Searchable encryption architectures: survey of the literature and proposing a unified architecture.
Int. J. Inf. Priv. Secur. Integr., 2020

A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer.
Expert Syst. Appl., 2020

On the Logical Foundation of a Personalized Medical Prescription System.
IEEE Access, 2020

2019
Hybrid SDN-ICN Architecture Design for the Internet of Things.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

2018
Generating Test Cases from Role-Based Access Control Policies using Cause-Effect Graph.
J. Softw., 2018

Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities.
J. Netw. Comput. Appl., 2018

2016
A temporal defeasible logic for handling access control policies.
Appl. Intell., 2016

Detecting and Preventing SQL Injection Attacks: A Formal Approach.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Algebraic Model for Handling Access Control Policies.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Investigative support for information confidentiality.
J. Ambient Intell. Humaniz. Comput., 2015

Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9.
CoRR, 2015

2014
Algebraic Analysis of Object-Based Key Assignment Schemes.
J. Softw., 2014

Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
An Algebraic Approach Towards Data Cleaning.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

2012
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution.
Fundam. Informaticae, 2011

A formal test for detecting information leakage via covert channels.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2009
Verification of Information Flow in Agent-Based Systems.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

2005
Automark++: A Case Tool to Automatically Mark Student Java Programs.
Int. Arab J. Inf. Technol., 2005


  Loading...