Wael Said Tawah
Wael Said Tawah
assistant Prof.
Verified email at
Cited by
Cited by
A big data approach to sentiment analysis using greedy feature selection with cat swarm optimization-based long short-term memory neural networks
A Alarifi, A Tolba, Z Al-Makhadmeh, W Said
The Journal of Supercomputing 76, 4414-4429, 2020
J Ding, J Buchmann, MSE Mohamed, W Mohamed, RP Weinmann
Proceedings of the 1st international conference on Symbolic Computation and …, 2008
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
MSE Mohamed, WSAE Mohamed, J Ding, J Buchmann
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm
F Alqahtani, Z Al-Makhadmeh, A Tolba, W Said
Cluster Computing 23, 1769-1780, 2020
Proof of credibility: A blockchain approach for detecting and blocking fake news in social networks
M Torky, E Nabil, W Said
International Journal of Advanced Computer Science and Applications 10 (12), 2019
IoT security based on iris verification using multi-algorithm feature level fusion scheme
R Gad, AA Abd El-Latif, S Elseuofi, HM Ibrahim, M Elmezain, W Said
2019 2nd international conference on computer applications & information …, 2019
MutantXL: Solving multivariate polynomial equations for cryptanalysis
JA Buchmann, J Ding, MSE Mohamed, WSAE Mohamed
Dagstuhl seminar proceedings, 2009
PWXL: A parallel Wiedemann-XL algorithm for solving polynomial equations over GF (2)
WSA Mohamed, J Ding, T Kleinjung, S Bulygin, J Buchmann
Conference on Symbolic Computation and Cryptography, 89, 2010
Brain tumor segmentation using deep capsule network and latent-dynamic conditional random fields
M Elmezain, A Mahmoud, DT Mosa, W Said
Journal of Imaging 8 (7), 190, 2022
Towards a hybrid immune algorithm based on danger theory for database security
W Said, AM Mostafa
IEEE Access 8, 145332-145362, 2020
Improvements for the XL algorithm with applications to algebraic cryptanalysis
WSA Mohamed
Universitäts-und Landesbibliothek Darmstadt, 2011
Blockchain-driven intelligent scheme for IoT-based public safety system beyond 5G networks
T Rathod, NK Jadav, S Tanwar, R Sharma, A Tolba, MS Raboaca, ...
Sensors 23 (2), 969, 2023
Practical algebraic cryptanalysis for dragon-based cryptosystems
J Buchmann, S Bulygin, J Ding, WSAE Mohamed, F Werner
Cryptology and Network Security: 9th International Conference, CANS 2010 …, 2010
Investigating epidemic growth of COVID-19 in saudi arabia based on time series models
M Torky, MS Torky, A Ahmed, AE Hassanein, W Said
International Journal of Advanced Computer Science and Applications 11 (12), 2020
Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
AM Mostafa, M Ezz, MK Elbashir, M Alruily, E Hamouda, M Alsarhani, ...
Applied Sciences 13 (19), 10871, 2023
A multi-factor authentication-based framework for identity management in cloud applications
W Said, E Mostafa, MM Hassan, AM Mostafa
CMC-Computers Materials & Continua 71 (2), 3193-3209, 2022
Data mining techniques for database prediction: Starting point
W Said, MM Hassan, AM Fawzy
J. Theor. Appl. Inf. Technol 96 (23), 7723-7738, 2018
M4RI (e)—Linear Algebra over F2 (and Fe 2)
T Abbott, M Albrecht, G Bard, M Bodrato, M Brickenstein, A Dreyer, ...
Improving the reconstruction of dental occlusion using a reconstructed-based identical matrix point technique
S Anil, S Vellappally, AA Al Kheraif, DD Divakar, W Said, AS Hassanein
Journal of Ambient Intelligence and Humanized Computing, 1-14, 2021
Wael Said Abd Elmageed Mohamed MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis
J Buchmann, J Ding
Dagstuhl Seminar Proceedings 9031, 2009
The system can't perform the operation now. Try again later.
Articles 1–20