Insider threats detection using CNN-LSTM model A Saaudi, Z Al-Ibadi, Y Tong, C Farkas 2018 International conference on computational science and computational …, 2018 | 11 | 2018 |
Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM. A Saaudi, Y Tong, C Farkas Icissp, 461-470, 2019 | 6 | 2019 |
Stream Data Access Control Model: The Need for Data Semantics. T Rhujittawiwat, A Saaudi, C Farkas KDIR, 19-30, 2022 | 1 | 2022 |
Clustering and Visualizing of Chest X-ray Images for Covid-19 Detection A Saaudi, R Mansoor, AK Abed 2021 2nd Information Technology To Enhance e-learning and Other Application …, 2021 | 1 | 2021 |
Database Recovery from Malicious Transactions: A Use of Provenance Information. T Rhujittawiwat, J Ravan, A Saaudi, SM Banik, C Farkas DATA, 39-48, 2021 | 1 | 2021 |
Insider’s Misuse Detection: From Hidden Markov Model to Deep Learning A Saaudi University of South Carolina, 2019 | 1 | 2019 |
Scholar Commons A Saaudi | | 2019 |
Semantic-based Obligation for Context-Based Access Control ALW Mouiad, A Saaudi, C Farkas | | 2019 |