BibTeX records: Mohammed Alzaabi

download as .bib file

@article{DBLP:journals/jdfsl/MartinJA16,
  author       = {Thomas Anthony Martin and
                  Andy Jones and
                  Mohammed Alzaabi},
  title        = {The 2016 Analysis of Information Remaining on Computer Hard Disks
                  Offered for Sale on the Second Hand Market in the {UAE}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {23--36},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1428},
  doi          = {10.15394/JDFSL.2016.1428},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MartinJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Alzaabi15,
  author       = {Mohammed Alzaabi},
  title        = {The Use of Ontologies in Forensic Analysis of Smartphone Content},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {105--114},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1215},
  doi          = {10.15394/JDFSL.2015.1215},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Alzaabi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/TahaYZ15,
  author       = {Kamal Taha and
                  Paul D. Yoo and
                  Mohammed Al Zaabi},
  title        = {iPFPi: {A} System for Improving Protein Function Prediction through
                  Cumulative Iterations},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {12},
  number       = {4},
  pages        = {825--836},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCBB.2014.2344681},
  doi          = {10.1109/TCBB.2014.2344681},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/TahaYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlzaabiTM15,
  author       = {Mohammed Alzaabi and
                  Kamal Taha and
                  Thomas Anthony Martin},
  title        = {{CISRI:} {A} Crime Investigation System Using the Relative Importance
                  of Information Spreaders in Networks Depicting Criminals Communications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {10},
  pages        = {2196--2211},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2451073},
  doi          = {10.1109/TIFS.2015.2451073},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlzaabiTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cidm/TahaZ14,
  author       = {Kamal Taha and
                  Mohammed Al Zaabi},
  title        = {BioHCDP: {A} Hybrid Constituency-Dependency Parser for Biological
                  {NLP} information extraction},
  booktitle    = {2014 {IEEE} Symposium on Computational Intelligence and Data Mining,
                  {CIDM} 2014, Orlando, FL, USA, December 9-12, 2014},
  pages        = {78--85},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIDM.2014.7008151},
  doi          = {10.1109/CIDM.2014.7008151},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cidm/TahaZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SalahCZAA13,
  author       = {Khaled Salah and
                  Jose M. Alcaraz Calero and
                  Sherali Zeadally and
                  Sameera Al{-}Mulla and
                  Mohammed Alzaabi},
  title        = {Using Cloud Computing to Implement a Security Overlay Network},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {1},
  pages        = {44--53},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.88},
  doi          = {10.1109/MSP.2012.88},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SalahCZAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/Alzaabi13,
  author       = {Mohammed Alzaabi},
  title        = {Ontology-based forensic analysis of mobile devices},
  booktitle    = {20th {IEEE} International Conference on Electronics, Circuits, and
                  Systems, {ICECS} 2013, Abu Dhabi, UAE, December 8-11, 2013},
  pages        = {64--65},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICECS.2013.6815346},
  doi          = {10.1109/ICECS.2013.6815346},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/Alzaabi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/AlzaabiYM11,
  author       = {Mohammed Alzaabi and
                  Chan Yeob Yeun and
                  Thomas Anthony Martin},
  title        = {Ensuring Anonymity for LBSs in Smartphone Environment},
  journal      = {J. Inf. Process. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {121--136},
  year         = {2011},
  url          = {https://doi.org/10.3745/JIPS.2011.7.1.121},
  doi          = {10.3745/JIPS.2011.7.1.121},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jips/AlzaabiYM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlzaabiBZ09,
  author       = {Mohammed Alzaabi and
                  Jawad Berri and
                  Mohamed Jamal Zemerly},
  title        = {On the fly generation of mobile learning structured multimedia content
                  from the web},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402636},
  doi          = {10.1109/ICITST.2009.5402636},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlzaabiBZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics