default search action
Shereen Ismail
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Shereen Ismail, Salah Dandan, Diana W. Dawoud, Hassan Reza:
A Comparative Study of Lightweight Machine Learning Techniques for Cyber-Attacks Detection in Blockchain-Enabled Industrial Supply Chain. IEEE Access 12: 102481-102491 (2024) - [j11]Shereen Ismail, Muhammad Nouman, Hassan Reza, Fartash Vasefi, Hossein Kashani Zadeh:
A Blockchain-Based Fish Supply Chain Framework for Maintaining Fish Quality and Authenticity. IEEE Trans. Serv. Comput. 17(5): 1877-1886 (2024) - 2023
- [j10]Shereen Ismail, Diana W. Dawoud, Hassan Reza:
Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review. Future Internet 15(6): 200 (2023) - [j9]Shereen Ismail, Hassan Reza, Khouloud Salameh, Hossein Kashani Zadeh, Fartash Vasefi:
Toward an Intelligent Blockchain IoT-Enabled Fish Supply Chain: A Review and Conceptual Framework. Sensors 23(11): 5136 (2023) - [j8]Hossein Kashani Zadeh, Mike Hardy, Mitchell Sueker, Yicong Li, Angelis Tzouchas, Nicholas MacKinnon, Gregory Bearman, Simon A. Haughey, Alireza Akhbardeh, In-Suck Baek, Chansong Hwang, Jianwei Qin, Amanda M. Tabb, Rosalee S. Hellberg, Shereen Ismail, Hassan Reza, Fartash Vasefi, Moon S. Kim, Kouhyar Tavakolian, Christopher T. Elliott:
Rapid Assessment of Fish Freshness for Multiple Supply-Chain Nodes Using Multi-Mode Spectroscopy and Fusion-Based Artificial Intelligence. Sensors 23(11): 5149 (2023) - 2022
- [j7]Shereen Ismail, Diana W. Dawoud, Nadhem Ismail, Ronald Marsh, Ali S. Alshami:
IoT-Based Water Management Systems: Survey and Future Research Direction. IEEE Access 10: 35942-35952 (2022) - [j6]Sahar Idwan, Shereen Ismail, Moh'd Sami Ashhab, Mohammed Awad, Izzeddin Matar:
Artificial neural network tactic to predict interest in majors in computing. Int. J. Comput. Aided Eng. Technol. 17(3): 335-347 (2022) - [j5]Tala Talaei Khoei, Shereen Ismail, Naima Kaabouch:
Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs. Sensors 22(2): 662 (2022) - 2021
- [j4]Shereen Ismail, Kruti Shah, Hassan Reza, Ronald Marsh, Emanuel S. Grant:
Toward Management of Uncertainty in Self-Adaptive Software Systems: IoT Case Study. Comput. 10(3): 27 (2021) - 2017
- [j3]Shereen Ismail, Eman Alkhader, Amal Ahmad:
Prison Perimeter Surveillance System Using WSN. J. Comput. Sci. 13(11): 674-679 (2017) - 2016
- [j2]Shereen Ismail, Eman Alkhader, Said Elnaffar:
Object Tracking in Wireless Sensor Networks: Challenges and Solutions. J. Comput. Sci. 12(4): 201-212 (2016) - 2012
- [j1]Khalid A. Darabkh, Shereen Ismail, Mohammad Al-Shurman, Iyad F. Jafar, Eman Alkhader, Mamoun F. Al-Mistarihi:
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks. J. Netw. Comput. Appl. 35(6): 2068-2080 (2012)
Conference and Workshop Papers
- 2024
- [c14]Diana W. Dawoud, Husameldin Mukhtar, Shereen Ismail, Anshul Pandey, Hossien B. Eldeeb:
Enhancing VLC Security with Time-Domain Interleaving and Optical-OFDM on Realistic Channel Models. MeditCom 2024: 57-61 - 2023
- [c13]Shereen Ismail, Hassan Reza, Hossein Kashani Zadeh, Fartash Vasefi:
A Blockchain-based IoT Security Solution Using Multichain. CCWC 2023: 1105-1111 - [c12]Shereen Ismail, Diana W. Dawoud, Tamara Al-Zyoud, Hassan Reza:
Towards Blockchain-based Adaptive Trust Management in Wireless Sensor Networks. eIT 2023: 163-168 - [c11]Rasha Ghabboun, Diana W. Dawoud, Eman Abu Shabab, Shereen Ismail:
Adaptive Real-Time Speed Limit Broadcasting for Autonomous Driving applications Using Visible Light Communication. eIT 2023: 191-196 - 2022
- [c10]Shereen Ismail, Diana Dawoud, Hassan Reza:
Towards A Lightweight Identity Management and Secure Authentication for IoT Using Blockchain. AIIoT 2022: 77-83 - [c9]Shereen Ismail, Hassan Reza:
Evaluation of Naïve Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks. AIIoT 2022: 283-289 - [c8]Shereen Ismail, Diana Dawoud, Hassan Reza:
A Lightweight Multilayer Machine Learning Detection System for Cyber-attacks in WSN. CCWC 2022: 481-486 - [c7]Shereen Ismail, Diana W. Dawoud:
Software Development Models for IoT. CCWC 2022: 524-530 - [c6]Shereen Ismail, Hassan Reza:
Security Challenges of Blockchain-Based Supply Chain Systems. UEMCON 2022: 1-6 - 2021
- [c5]Shereen Ismail, Eman AlKhader, Aydan Gasimova, Hassan Reza:
A lightweight Distributed Database Management in WSN. ISNCC 2021: 1-5 - [c4]Tala Talaei Khoei, Shereen Ismail, Naima Kaabouch:
Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid. UEMCON 2021: 165-170 - [c3]Shereen Ismail, Tala Talaei Khoei, Ronald Marsh, Naima Kaabouch:
A Comparative Study of Machine Learning Models for Cyber-attacks Detection in Wireless Sensor Networks. UEMCON 2021: 313-318 - 2018
- [c2]Shereen Ismail, Amal Ahmad, Mohammed Awad, Mohammad Abdul Jawad:
Evaluating Cache Power Dissipation Across Different Process Technologies. AICCSA 2018: 1-5 - 2015
- [c1]Eman Al-Khader, Shereen Ismail:
Pre- and Post-coding for Capacity Enhancement in MIMO Systems. ANT/SEIT 2015: 326-333
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint