Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohammed Alzaabi
@article{DBLP:journals/jdfsl/MartinJA16, author = {Thomas Anthony Martin and Andy Jones and Mohammed Alzaabi}, title = {The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the {UAE}}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {23--36}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1428}, doi = {10.15394/JDFSL.2016.1428}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MartinJA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Alzaabi15, author = {Mohammed Alzaabi}, title = {The Use of Ontologies in Forensic Analysis of Smartphone Content}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {105--114}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1215}, doi = {10.15394/JDFSL.2015.1215}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Alzaabi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/TahaYZ15, author = {Kamal Taha and Paul D. Yoo and Mohammed Al Zaabi}, title = {iPFPi: {A} System for Improving Protein Function Prediction through Cumulative Iterations}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {12}, number = {4}, pages = {825--836}, year = {2015}, url = {https://doi.org/10.1109/TCBB.2014.2344681}, doi = {10.1109/TCBB.2014.2344681}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/TahaYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlzaabiTM15, author = {Mohammed Alzaabi and Kamal Taha and Thomas Anthony Martin}, title = {{CISRI:} {A} Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {10}, pages = {2196--2211}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2451073}, doi = {10.1109/TIFS.2015.2451073}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlzaabiTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cidm/TahaZ14, author = {Kamal Taha and Mohammed Al Zaabi}, title = {BioHCDP: {A} Hybrid Constituency-Dependency Parser for Biological {NLP} information extraction}, booktitle = {2014 {IEEE} Symposium on Computational Intelligence and Data Mining, {CIDM} 2014, Orlando, FL, USA, December 9-12, 2014}, pages = {78--85}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CIDM.2014.7008151}, doi = {10.1109/CIDM.2014.7008151}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/cidm/TahaZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SalahCZAA13, author = {Khaled Salah and Jose M. Alcaraz Calero and Sherali Zeadally and Sameera Al{-}Mulla and Mohammed Alzaabi}, title = {Using Cloud Computing to Implement a Security Overlay Network}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {1}, pages = {44--53}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.88}, doi = {10.1109/MSP.2012.88}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SalahCZAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/Alzaabi13, author = {Mohammed Alzaabi}, title = {Ontology-based forensic analysis of mobile devices}, booktitle = {20th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2013, Abu Dhabi, UAE, December 8-11, 2013}, pages = {64--65}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICECS.2013.6815346}, doi = {10.1109/ICECS.2013.6815346}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/Alzaabi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/AlzaabiYM11, author = {Mohammed Alzaabi and Chan Yeob Yeun and Thomas Anthony Martin}, title = {Ensuring Anonymity for LBSs in Smartphone Environment}, journal = {J. Inf. Process. Syst.}, volume = {7}, number = {1}, pages = {121--136}, year = {2011}, url = {https://doi.org/10.3745/JIPS.2011.7.1.121}, doi = {10.3745/JIPS.2011.7.1.121}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/AlzaabiYM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlzaabiBZ09, author = {Mohammed Alzaabi and Jawad Berri and Mohamed Jamal Zemerly}, title = {On the fly generation of mobile learning structured multimedia content from the web}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402636}, doi = {10.1109/ICITST.2009.5402636}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlzaabiBZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.