Follow
Tarek Salah Sobh
Tarek Salah Sobh
Egyptian Armed Forces, Information Systems Department (ISD)
Verified email at afmic.gov.eg
Title
Cited by
Cited by
Year
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
TS Sobh
Computer Standards & Interfaces 28 (6), 670-694, 2006
1372006
A cooperative immunological approach for detecting network anomaly
TS Sobh, WM Mostafa
applied soft computing 11 (1), 1275-1283, 2011
422011
Design of an enhancement for SSL/TLS protocols
A Elgohary, TS Sobh, M Zaki
computers & security 25 (4), 297-306, 2006
422006
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
TH Eldin Helmy, M Abd-ElMegied, TS Sobh, KMS Badran
International Journal of Computer Networks and Applications 1 (1), 15-25, 2014
33*2014
Wi-Fi networks security and accessing control
TS Sobh
International Journal of Computer Network and Information Security 5 (7), 9, 2013
272013
A cooperative agent-based model for active security systems
M Zaki, TS Sobh
Journal of network and computer applications 27 (4), 201-220, 2004
222004
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
THE Helmy, M zaki Abd-ElMegied, TS Sobh, KMS Badran
Journal of Theoretical and Applied Information Technology 85 (3), 425–436, 2016
212016
Anti money laundering using a two-phase system
TH Moustafa, MZ Abd El-Megied, TS Sobh, KM Shafea
Journal of Money Laundering Control 18 (3), 304-329, 2015
162015
Attack abstraction using a multiagent system for intrusion detection
M Zaki, TS Sobh
Journal of Intelligent & Fuzzy Systems 16 (2), 141-150, 2005
152005
Effective and extensive virtual private network
TS Sobh, Y Aly
Journal of Information Security 2 (01), 39, 2011
142011
An intelligent and secure framework for anti-money laundering
TS Sobh
Journal of Applied Security Research 15 (4), 517-546, 2020
132020
Intelligent System for Worm Detection
IA Farag, MA Shouman, TS Sobh, HZ El-Fiqi
Journal: International Arab Journal of e-Technology ISSN 1 (1), 58=67, 2009
122009
NCDS: data mining for discovering interesting network characteristics
M Zaki, TS Sobh
Information and Software Technology 47 (3), 189-198, 2005
122005
Performance improvements on the network security protocols
TS Sobh, A Elgohary, M Zaki
International Journal of Network Security 6 (1), 103-115, 2008
112008
Identity Management: Lightweight SAML for Less Processing Power
M Ali, TS Sobh, S El-Gamal
IJ Information Technology and Computer Science, 42-49, 2015
92015
Anomaly detection based on hybrid artificial immune principles
T Salah Sobh
Information Management & Computer Security 21 (4), 288-314, 2013
82013
Identity management using SAML for mobile clients and Internet of Things
TS Sobh
Journal of High Speed Networks 25 (1), 101-126, 2019
72019
PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services
TS Sobh, MI Amer
International Journal of Network Security 13 (2), 79–91, 2011
72011
Evaluating Web Services Functionality and Performance
TS Sobh, M Fakhry
International Journal of Information Technology and Computer Science (IJITCS …, 2014
62014
An efficient and dependable protocol for critical MANETs
A Elgohary, TS Sobh, SA Nouh, M Zaki
Journal of High Speed Networks 20 (3), 153-168, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20