Sanaa Kaddoura

Orcid: 0000-0002-4384-4364

According to our database1, Sanaa Kaddoura authored at least 21 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EnhancedBERT: A feature-rich ensemble model for Arabic word sense disambiguation with statistical analysis and optimized data collection.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

2023
SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs.
Peer Peer Netw. Appl., September, 2023

Arabic spam tweets classification using deep learning.
Neural Comput. Appl., August, 2023

The rising trend of Metaverse in education: challenges, opportunities, and ethical considerations.
PeerJ Comput. Sci., 2023

Computational Intelligence and Soft Computing Paradigm for Cheating Detection in Online Examinations.
Appl. Comput. Intell. Soft Comput., 2023

The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Applying Neutralisation Theory to Better Understand Ransomware Offenders.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
A comprehensive review on Arabic word sense disambiguation for natural language processing applications.
WIREs Data Mining Knowl. Discov., 2022

A systematic review on machine learning models for online learning and examination systems.
PeerJ Comput. Sci., 2022

A systematic literature review on spam content detection and classification.
PeerJ Comput. Sci., 2022

Towards effective and efficient online exam systems using deep learning-based cheating detection approach.
Intell. Syst. Appl., 2022

2021
A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems.
Future Internet, 2021

Solving the Multi-objective 2-Dimensional Vector Packing Problem Using ε-constraint Method.
Proceedings of the Trends and Applications in Information Systems and Technologies, 2021

Classification of malicious and benign websites by network features using supervised machine learning algorithms.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

2020
A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Promoting Teaching Practices in IT Higher Education.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

2018
Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach.
Telematics Informatics, 2018

2017
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix.
Int. J. Semantic Web Inf. Syst., 2017

2015
Tracking and Repairing Damaged Healthcare Databases Using the Matrix.
Int. J. Distributed Sens. Networks, 2015

Information Warfare: Fighting Back Through the Matrix.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Information matrix: Fighting back using a matrix.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015


  Loading...