Tarek S. Sobh

Orcid: 0000-0002-5232-5865

Affiliations:
  • El Shorouk Academy, Cairo, Egypt
  • Egyptian Armed Forces, Information Systems Department, Cairo, Egypt
  • Al-Azhar University, Computer and Systems Engineering Department, Cairo, Egypt


According to our database1, Tarek S. Sobh authored at least 27 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Identity management using SAML for mobile clients and Internet of Things.
J. High Speed Networks, 2019

2016
Evaluation of ASHFIK as Core-Based Routing Protocol for Critical MANETs.
Wirel. Pers. Commun., 2016

2015
Design of a Framework to Facilitate Decisions Using Information Fusion.
CoRR, 2015

2014
An efficient and dependable protocol for critical MANETs.
J. High Speed Networks, 2014

IFPDM: a framework to integrate information fusion and probabilistic decision making.
Int. J. Inf. Decis. Sci., 2014

IP Tracing and Active Network Response.
CoRR, 2014

2013
Anomaly detection based on hybrid artificial immune principles.
Inf. Manag. Comput. Secur., 2013

2012
Using Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS.
Inf. Secur. J. A Glob. Perspect., 2012

2011
Effective and Extensive Virtual Private Network.
J. Information Security, 2011

PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services.
Int. J. Netw. Secur., 2011

A cooperative immunological approach for detecting network anomaly.
Appl. Soft Comput., 2011

2009
Information Fusion Using Ontology-Based Communication between Agents.
Int. Arab. J. e Technol., 2009

Intelligent System for Worm Detection.
Int. Arab. J. e Technol., 2009

2008
Performance Improvements on the Network Level Security Protocols.
Int. J. Netw. Secur., 2008

2007
A systematic algorithm to construct neuro-fuzzy inference system.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

2006
Explanation-based learning to recognize network malfunctions.
Inf. Knowl. Syst. Manag., 2006

Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art.
Comput. Stand. Interfaces, 2006

Design of an enhancement for SSL/TLS protocols.
Comput. Secur., 2006

Mobile Architecture for Discovering and Reacting to System Threats.
Proceedings of the ISCA 19th International Conference on Parallel and Distributed Computing Systems, 2006

2005
Attack abstraction using a multiagent system for intrusion detection.
J. Intell. Fuzzy Syst., 2005

MSGAI: A Multiagent System for Gathering Attack Information.
Int. J. Comput. Their Appl., 2005

NCDS: data mining for discovering interesting network characteristics.
Inf. Softw. Technol., 2005

Neuro Fuzzy Techniques Using MATLAB/SIMULINK Applied to Real Process.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005

Hybrid Learning Rules for Identifying Spacecraft System.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

2004
A cooperative agent-based model for active security systems.
J. Netw. Comput. Appl., 2004

An Integrated Model to Overcome IP Spoofing.
Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2004

2001
A learning database system to observe malfunctions and to support network planning.
J. Syst. Softw., 2001


  Loading...