Tarek Salah Sobh
Tarek Salah Sobh
Egyptian Armed Forces, Information Systems Department (ISD)
Verified email at
Cited by
Cited by
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
TS Sobh
Computer Standards & Interfaces 28 (6), 670-694, 2006
Design of an enhancement for SSL/TLS protocols
A Elgohary, TS Sobh, M Zaki
computers & security 25 (4), 297-306, 2006
A cooperative immunological approach for detecting network anomaly
TS Sobh, WM Mostafa
applied soft computing 11 (1), 1275-1283, 2011
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
THE Helmy, M zaki Abd-ElMegied, TS Sobh, KMS Badran
Journal of Theoretical and Applied Information Technology 85 (3), 425–436, 2016
Design of a Monitor for Detecting Money Laundering and Terrorist Financing
TH Eldin Helmy, M Abd-ElMegied, TS Sobh, KMS Badran
International Journal of Computer Networks and Applications 1 (1), 15-25, 2014
Wi-Fi Networks Security and Accessing Control.
TS Sobh
International Journal of Computer Network & Information Security 5 (7), 2013
A cooperative agent-based model for active security systems
M Zaki, TS Sobh
Journal of network and computer applications 27 (4), 201-220, 2004
Attack abstraction using a multiagent system for intrusion detection
M Zaki, TS Sobh
Journal of Intelligent & Fuzzy Systems 16 (2), 141-150, 2005
Effective and extensive virtual private network
TS Sobh, Y Aly
Journal of Information Security 2 (01), 39, 2011
Anti money laundering using a two-phase system
TH Moustafa, MZ Abd El-Megied, TS Sobh, KM Shafea
Journal of Money Laundering Control, 2015
Performance improvements on the network security protocols
TS Sobh, A Elgohary, M Zaki
International Journal of Network Security 6 (1), 103-115, 2008
NCDS: data mining for discovering interesting network characteristics
M Zaki, TS Sobh
Information and Software Technology 47 (3), 189-198, 2005
Intelligent System for Worm Detection
IA Farag, MA Shouman, TS Sobh, HZ El-Fiqi
Journal: International Arab Journal of e-Technology ISSN 1 (1), 58=67, 2009
Anomaly detection based on hybrid artificial immune principles
TS Sobh
Information Management & Computer Security, 2013
PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services
TS Sobh, MI Amer
International Journal of Network Security 13 (2), 79–91, 2011
Evaluating Web Services Functionality and Performance
TS Sobh, M Fakhry
International Journal of Information Technology and Computer Science (IJITCS …, 2014
An efficient and dependable protocol for critical MANETs
A Elgohary, TS Sobh, SA Nouh, M Zaki
Journal of High Speed Networks 20 (3), 153-168, 2014
An intelligent and secure framework for anti-money laundering
TS Sobh
Journal of Applied Security Research 15 (4), 517-546, 2020
Information Fusion Using Ontology-Based Communication between Agents.
TS Sobh
Int. Arab. J. e Technol. 1 (2), 18-25, 2009
A systematic algorithm to construct neuro-fuzzy inference system
AHK Tharwat E. Alhanafy, Tarek S. Sobh
16th Software Engineering and Data Engineering (SEDE), 137-142, 2007
The system can't perform the operation now. Try again later.
Articles 1–20