Enhanced Android Malware Detection and Family Classification, using Conversation-level Network Traffic Features M Abuthawabeh, K Mahmoud The International Arab Journal of Information Technology 17 (4A), 607-614, 2020 | 39 | 2020 |
Location-based kerberos authentication protocol NT Abdelmajid, MA Hossain, S Shepherd, K Mahmoud 2010 IEEE Second International Conference on Social Computing, 1099-1104, 2010 | 33 | 2010 |
Frequency domain watermarking: An overview. KW Mahmoud, S Datta, JA Flint Int. Arab J. Inf. Technol. 2 (1), 33-47, 2005 | 31 | 2005 |
Android Malware Detection and Categorization Based on Conversation-level Network Traffic Features MKA Abuthawabeh, KW Mahmoud 2019 International Arab Conference on Information Technology (ACIT), 42-47, 2019 | 29 | 2019 |
URL Phishing Detection using Machine Learning Techniques based on URLs Lexical Analysis M Abutaha, M Ababneh, K Mahmoud, SAH Baddar 2021 12th International Conference on Information and Communication Systems …, 2021 | 22 | 2021 |
Copy-move forgery detection using zernike and pseudo zernike moments. K Mahmoud, A Husien Int. Arab J. Inf. Technol. 13 (6A), 930-937, 2016 | 14 | 2016 |
Improved Kerberos security protocol evaluation using modified BAN logic NT Abdelmajid, MA Hossain, S Shepherd, K Mahmoud 2010 10th IEEE International Conference on Computer and Information …, 2010 | 14 | 2010 |
Moment based copy move forgery detection methods K Mahmoud, AHA Al-Rukab Int J Comput Sci Inf Secur (IJCSIS) 14 (7), 2016 | 11 | 2016 |
Printed Document Authentication using Texture Coding J Blackledge, M Khaled ISAST Transaction on Electronics and Signal Processing 4 (1), 81-98, 2009 | 9 | 2009 |
A New Password Authentication Mechanism Using 2D Shapes BE Fayyadh, K Mansour, KW Mahmoud 2018 8th International Conference on Computer Science and Information …, 2018 | 6 | 2018 |
Elastic password: A new mechanism for strengthening passwords using time delays between keystrokes KW Mahmoud 2017 8th International Conference on Information and Communication Systems …, 2017 | 5 | 2017 |
Print protection using high-frequency fractal noise KW Mahmoud, JM Blackledge, S Datta, JA Flint Security, Steganography, and Watermarking of Multimedia Contents VI 5306 …, 2004 | 4 | 2004 |
Low Resolution Watermarking for Print Security KW Mahmoud Loughborough University, 2004 | 3 | 2004 |
Forensic approach for distinguishing between source and destination regions in copy-move forgery SY Iseed, KW Mahmoud Multimedia Tools and Applications, 2023 | 2 | 2023 |
Global Position System Location-Based Authentication (KERBEROS AS AN EXAMPLE) NT Abdelmajid, KW Mahmoud ITEE Journal Information Technology & Electrical Engineering 5 (3), 13-18, 2016 | 2 | 2016 |
A new approach for textual password hardening using keystroke latency times. K Mansour, K Mahmoud Int. Arab J. Inf. Technol. 18 (3), 336-346, 2021 | 1 | 2021 |
Detecting Password File Theft using Predefined Time-Delays between Certain Password Characters KW Mahmoud, K Mansour, A Makableh Journal of Telecommunications and Information Technology 4, 101-108, 2017 | 1 | 2017 |
“Where you are” Based Authentication: An Improved Security Protocol Using BAN Logic A Nabih, A Hossain, S Shepherd, M Khaled 7th European Conference on Information Warfare and Security, 30th June–1st July, 2008 | 1 | 2008 |
Android Malware Detection Based on Network Traffic Using CICAndMal2017 Dataset MKA Abuthawabeh PQDT-Global, 2019 | | 2019 |
Print Protection Using a Diffused Background Watermark KW Mahmoud, JM Blackledge, S Datta, JA Flint The 5th International Arab Conference on Information Technology, 627–634, 2004 | | 2004 |