A survey on malware and malware detection systems IA Saeed, A Selamat, AMA Abuagoub International Journal of Computer Applications 67 (16), 2013 | 161 | 2013 |
A systematic state-of-the-art analysis of multi-agent intrusion detection IA Saeed, A Selamat, MF Rohani, O Krejcar, JA Chaudhry IEEE Access 8, 180184-180209, 2020 | 11 | 2020 |
Multi-agent architecture with dynamic model checking for malware detection IA Saeed, A Selamat LabuanSchool of Informatics Science 15 (16), 47, 2013 | 5 | 2013 |
Elliptic curve cryptosystem JK Mandal, A Sarkar, A Bose, S Halder RCES 4 (2), 66-69, 2017 | 2 | 2017 |
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless Sensor Networks IAS Mayada S. A. Mustafa, Borhanuddin M Ali, MFA Rasid , Shaiful J. Hashim international journal of wireless and mobile networks 14 (1), 20, 2022 | | 2022 |
Kusum Yadav Imtithal A. Saeed A El Berry | | 2012 |
International Journal of Information Technology and Network Application AEBIAS Kusum Yadav International Journal of Information Technology and Network Application 3, 7-11, 2012 | | 2012 |
Computer Modeling to Predict the Impact of Cold Air Stream on Multi-Chip Memory A El Berry, K Yadav, IA Saeed International Journal of Computer Applications 59 (3), 2012 | | 2012 |
Tuning Performance of Remotely Accessed Databases IA Saeed Sudan University of Science and Technology, 2005 | | 2005 |