Shouki A. Ebad

Orcid: 0000-0003-1043-2774

According to our database1, Shouki A. Ebad authored at least 29 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Enhanced Deep Learning-Based Optimization Model for the Coverage Optimization in Wireless Sensor Networks.
Int. J. Comput. Intell. Syst., December, 2025

Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility.
Int. J. Hum. Comput. Interact., July, 2025

Joint optimization for 6G beyond diagonal IRS-assisted multi-carrier NOMA vehicle-to-infrastructure communication.
J. Supercomput., May, 2025

Advanced clustering and transfer learning based approach for rice leaf disease segmentation and classification.
PeerJ Comput. Sci., 2025

EEG-based schizophrenia diagnosis using deep learning with multi-scale and adaptive feature selection.
PeerJ Comput. Sci., 2025

Optimized deep learning approach for lung cancer detection using flying fox optimization and bidirectional generative adversarial networks.
PeerJ Comput. Sci., 2025

A Hybrid Deep Learning Approach for Skin Lesion Segmentation With Dual Encoders and Channel-Wise Attention.
IEEE Access, 2025

2024
Improving laryngeal cancer detection using chaotic metaheuristics integration with squeeze-and-excitation resnet model.
Health Inf. Sci. Syst., December, 2024

Exploiting Feature Fusion With Deep Learning-Based Next-Generation Consumer Products Detection on Video Surveillance Monitoring Systems.
IEEE Trans. Consumer Electron., November, 2024

A big data analysis algorithm for massive sensor medical images.
PeerJ Comput. Sci., 2024

2023
Quantifying IoT Security Parameters: An Assessment Framework.
IEEE Access, 2023

Cyber Threats Classifications and Countermeasures in Banking and Financial Sector.
IEEE Access, 2023

2022
Lessons learned from offline assessment of security-critical systems: the case of microsoft's active directory.
Int. J. Syst. Assur. Eng. Manag., 2022

What topics should or should not be included in software security education - Qualitative content analysis.
Comput. Appl. Eng. Educ., 2022

Exploring How to Apply Secure Software Design Principles.
IEEE Access, 2022

Deep-Ensemble and Multifaceted Behavioral Malware Variant Detection Model.
IEEE Access, 2022

An Exploratory Study of Why UMLsec Is Not Adopted.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
Measuring Software Obfuscation Quality-A Systematic Literature Review.
IEEE Access, 2021

2020
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.
Symmetry, 2020

Healthcare software design and implementation - A project failure case.
Softw. Pract. Exp., 2020

2019
Investigating the effect of software packaging on modular structure stability.
Comput. Syst. Sci. Eng., 2019

2018
The influencing causes of software unavailability: A case study from industry.
Softw. Pract. Exp., 2018

2017
Inspection reading techniques applied to software artifacts - a systematic review.
Comput. Syst. Sci. Eng., 2017

2016
Review and Evaluation of Cohesion and Coupling Metrics at Package and Subsystem Level.
J. Softw., 2016

Influencing Factors for IT Software Project Failures in Developing Countries - A Critical Literature Survey.
J. Softw., 2016

An Empirical Comparison of Java and C# Programs in Following Naming Conventions.
Int. J. People Oriented Program., 2016

2015
Functionality-based software packaging using sequence diagrams.
Softw. Qual. J., 2015

Measuring stability of object-oriented software architectures.
IET Softw., 2015

2011
Software Packaging Approaches - A Comparison Framework.
Proceedings of the Software Architecture - 5th European Conference, 2011


  Loading...