Attacking of stream Cipher Systems Using a Genetic Algorithm AA Abd, HA Younis, WS Awad Journal of the University of Thi Qar 6, 1-6, 2011 | 17* | 2011 |
Computational intelligence in cryptology W Awad, ESM El-Alfy Artificial Intelligence: Concepts, Methodologies, Tools, and Applications …, 2017 | 11 | 2017 |
Information Hiding Using Ant Colony Optimization Algorithm WS Awad International Journal of Technology Diffusion (IJTD) 2 (1), 16-28, 2011 | 10 | 2011 |
Improving information security practices through computational intelligence WS Awad IGI Global, 2015 | 7 | 2015 |
Computational intelligence paradigms: An overview ESM El-Alfy, W Awad Improving Information Security Practices through Computational Intelligence …, 2016 | 6 | 2016 |
Non-Homogeneous Steganography Using Genetic Simulated Annealing WS Awad, HK Al Jobori International Journal of Information Science and Computer Mathematics 2 (1 …, 2010 | 6 | 2010 |
Finding linear equivalence of keystream generators using genetic simulated annealing WS Awad Information Technology Journal 7 (3), 541-544, 2008 | 6 | 2008 |
Text Classification of English News Articles using Graph Mining Techniques. HHHA Abdulla, WS Awad ICAART (3), 926-937, 2022 | 5 | 2022 |
Intelligent community detection: comparative study (COVID19 dataset) J Moosa, W Awad, T Kalganova European, Asian, Middle Eastern, North African Conference on Management …, 2021 | 5 | 2021 |
A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem H Naser, WS Awad, ESM El-Alfy Journal of Intelligent & Fuzzy Systems 36 (3), 2285-2295, 2019 | 4 | 2019 |
E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives WS Awad, AH Zolait International Journal of E-Services and Mobile Applications (IJESMA) 5 (1 …, 2013 | 4 | 2013 |
Designing stream cipher systems using genetic programming WS Awad International Conference on Learning and Intelligent Optimization, 308-320, 2011 | 4 | 2011 |
Fractional order glucose insulin model with generalized Mittag-Leffler kernel A Akgül, M Farman, A Ahmad, A Khan, S Zahran, WS Awad Appl. Math 17 (2), 365-374, 2023 | 3 | 2023 |
On the application of evolutionary computation techniques in designing stream cipher systems W Shaker Awad International Journal of Computational Intelligence Systems 4 (5), 921-928, 2011 | 3 | 2011 |
The Applications of Genetic Algorithms in Cryptology WS Awad Far East journal of experimental and theoretical artificial intelligence 2 …, 2008 | 3 | 2008 |
The Era of Internet of Things: Towards better security using machine learning H Abdulla, H Al-Raweshidy, W Awad 2023 International Conference on IT Innovation and Knowledge Discovery …, 2023 | 2 | 2023 |
COVID-19 contact-tracing networks datasets J Moosa, W Awad, T Kalganova 2023 International Conference on IT Innovation and Knowledge Discovery …, 2023 | 2 | 2023 |
A new multivariate product kernel functions of the beta polynomial family IU Siloko, EA Siloko, SA Ojobor, WS Awad, E Enoyoze, CC Ishiekwene, ... J. Stat. Appl. Pro 12 (3), 1385-1398, 2023 | 2 | 2023 |
Attributed-based Label Propagation Method for Balanced Modularity and Homogeneity Community Detection T Kalganova, J Moosa, W Awad ICAART, 2022 | 2 | 2022 |
Ant colony inspired method for reducing load imbalance in multiprocessor systems K Ahmed, ESM El-Alfy, WS Awad Journal of Intelligent & Fuzzy Systems 34 (3), 1443-1451, 2018 | 2 | 2018 |