-
1Conference
Source: 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE) Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on. :76-84 Oct, 2014
Relation: 2014 9th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)
-
2Periodical
Authors: Hemied, Omar S., Gadelrab, Mohammed S., Sharara, Elsayed A., Soliman, Taysir Hassan A., Tsuji, Akinori, Terada, Kenji
Source: IEEJ transactions on electrical and electronic engineering. 17(7):1038-1047
-
3Conference
Authors: Gadelrab, Mohammed S., Ghorbani, Ali
Source: 2012 SC Companion: High Performance Computing, Networking Storage and Analysis High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion:. :539-546 Nov, 2012
Relation: 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC)
-
4Academic Journal
Authors: Gadelrab, Mohammed S., Abouhogail, Reham A.
Source: In Measurement August 2021 181
-
5Academic Journal
Authors: Abouhogail, Reham Abdellatif *, Gadelrab, Mohammed S.
Source: In Computers & Security August 2018 77:745-755
-
6Conference
Source: Proceedings of the 2007 ACM Workshop: Quality of Protection; 10/29/2007, p40-42, 3p