Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Huwida Said is active.

Publication


Featured researches published by Huwida Said.


international conference on pattern recognition | 1998

Personal identification based on handwriting

Huwida Said; Keith D. Baker; Tieniu Tan

Many techniques have been reported for handwriting-based writer identification. Most techniques assume that the written text is fixed (e.g., in signature verification). In this paper we attempt to eliminate this assumption by presenting a novel algorithm for automatic text-independent writer identification. Given that the handwriting of different people can often be visually distinctive, we take a global approach based on texture analysis, where each writers handwriting is regarded as a different texture. In principle this allows us to apply any standard texture recognition algorithm for the task (e.g., the multichannel Gabor filtering technique). Results of 95.0% accuracy on the classification of 300 test documents front 20 writers are very promising. The method is shown to be robust to noise and contents.


british machine vision conference | 1998

Writer Identification from Non-uniformly Skewed Handwriting Images

Huwida Said; G. S. Peake; Tieniu Tan; Keith D. Baker

Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In this paper we attempt to eliminate this assumption by presenting a novel algorithm for automatic text-independent writer identification from non-uniformly skewed handwriting images. Given that the handwriting of different people is often visually distinctive, we take a global approach based on texture analysis, where each writers’ handwriting is regarded as a different texture. In principle this allows us to apply any standard texture recognition algorithm for the task (e.g., the multi-channel Gabor filtering technique). Results of 96.0% accuracy on the classification of 150 test documents from 10 writers are very promising. The method is shown to be robust to noise and contents.


international conference on innovations in information technology | 2011

Forensic analysis of private browsing artifacts

Huwida Said; Noora Al Mutawa; Ibtesam Al Awadhi; Mario Guimaraes

The paper investigates the effectiveness of the privacy mode feature in three widely used Web browsers, and outlines how to investigate when these browsers have been used to perform a criminal or illegal act. It performs an identical test on a privacy mode session for each of the three Web browsers and investigates whether traces are left behind. The analysis is done in three phases. First, common places where history and cache records are usually stored are examined. Then, other locations on the local machine are examined using special forensic tools. Also, the physical memory (RAM) is captured and examined for traces.


Journal of Communications | 2013

Social Networks IM Forensics: Encryption Analysis

Nedaa Al Barghouthy; Huwida Said

Abstract—In most regards, the twenty-first century may not bring revolutionary changes in electronic messaging technology in terms of applications or protocols. Security issues that have long been a concern in messaging application are finally being solved using a variety of products. Web-based messaging systems are rapidly evolving the text-based conversation. The users have the right to protect their privacy from the eavesdropper, or other parties which interferes the privacy of the users for such purpose. The chatters most probably use the instant messages to chat with others for personal issue; in which no one has the right eavesdrop the conversation channel and interfere this privacy. This is considered as a non-ethical manner and the privacy of the users should be protected. The author seeks to identify the security features for most public instant messaging services used over the internet and suggest some solutions in order to encrypt the instant messaging over the conversation channel. The aim of this research is to investigate through forensics and sniffing techniques, the possibilities of hiding communication using encryption to protect the integrity of messages exchanged. Authors used different tools and methods to run the investigations. Such tools include Wireshark packet sniffer, Forensics Tool Kit (FTK) and viaForensic mobile forensic toolkit. Finally, authors will report their findings on the level of security that encryption could provide to instant messaging services.


The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11) | 2011

IPhone forensics techniques and crime investigation

Huwida Said; Alya Yousif; Hessa Humaid

The smart phones are used worldwide due to their enhanced features, computing capabilities, increased storage capacity, attractive touch interface, and the ability to use the Wi-Fi signals. The smart phones have new uploaded features that make them more interesting. These include, sharing video and pictures via social network websites such as, Facebook and Twitter. Due to the large number of people using smart phones, there is a growing concern for electronic crimes. Therefore, the digital forensic of the smart phones has became an essential practice to forensic analyst and security specialists. Investigators found that smart phones are now a significant potential source of digital evidence in criminal investigations. The paper investigates different types of logical backup and encryption techniques used with the smart phones. Different smart phones were examined; examples of these are iPhone 3GS, BlackBerry Bold, and Samsung Omnia II I8000. The paper has also addressed the storage and location of social network data.


information security curriculum development | 2010

Database forensics

Mario Guimaraes; Richard Austin; Huwida Said

At the user or surface level, most Database Management System (DBMS) are similar. Most databases contain multiple tables, a standardized query language, primary key, foreign key, referential integrity, and metadata. With regard to physical file structures, concurrency mechanisms, security mechanisms, query optimization and datawarehouse techniques, databases may be radically different from each other. Most Forensic tools are too time consuming to be applied to large databases. Meanwhile, database tools such as oracle logminer and auditing features can assist in forensics, but were not created for that purpose. Many of these tools alter the database in ways that may complicate the use of their results in a legal proceeding. This paper analyzes the challenges of digital forensics, related literature, topics involved, current options for performing forensics on databases as well as considerations in teaching database forensics.


technical symposium on computer science education | 2009

Database and database application security

Huwida Said; Mario Guimaraes; Zakaria Maamar; Leon Jololian

This paper focuses on the emerging importance of database and application security, textbooks and other supplementary materials to teach these topics and where to place these topics in a curriculum. The paper emphasizes 1) the growing concerns of database technologies and database applications, 2) existing books and supporting materials, and 3) and Zayed Universitys approach to teaching these topics. At Zayed, we incorporate database and database application security in two different courses.


Information and Communication Systems (ICICS), 2016 7th International Conference on | 2016

Evaluation of Linux SMTP server security aspects — A case study

Salam Ismail Rasheed Khanji; Raja Jabir; Liza Ahmad; Omar Alfandi; Huwida Said

Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal purposes but also used on a professional level. With the increase of electronic communication, spams have widely increased targeting individuals, having a doubtful intention such as stealing personal information to be misused or even to paralyze the Email system by injecting viruses. Therefore, to protect email users from spams and viruses, it is crucial to protect our SMTP server. In this paper, a case study is raised by configuring two SMTP servers and 6 different scenarios, for the purpose of evaluating and addressing email security issues. Various anti-spam and filtering techniques were highlighted and analyzed, along with reporting and visualizing functionalities to further assist system administrators to control and monitor SMTP server.


information security curriculum development | 2013

The Study of the Interrelation between Law Programs and Digital Forensics in UAE Academia

Asif Iqbal; Hanan Al Obaidli; Huwida Said; Mario Guimaraes

The field of digital forensics is growing in the Middle East which is shown by the establishment of technical digital forensic programs in various universities. Even though these programs are important for the development and advancement of the field they are overlooking the legal aspect of e-crimes and digital forensics in UAE. This paper discusses available law programs and its relations to e-crimes and digital forensics, analyzing the implications caused by the lack of proper e-crimes and digital forensics educational materials in UAE law programs. Even though there are efforts made to overcome this gap between the legal and the technical aspect of digital forensics by creating individual courses it still lacks a strong educational law program preparing the judicial system to face these crimes in a more effective manner. This paper also discusses the possible improvement on the curricula of law programs.


Procedia Computer Science | 2016

Mining the Web and Literature to Discover New Knowledge about Diabetes

Farhi Marir; Huwida Said; Feras Al-Obeidat

Abstract Social Networks are powerful social media for sharing information about various issues and can be used to raise awareness and collect pointers about associated risk factors and preventive measures in chronical disease like diabetes. Since the olden times, knowledge in medicine was established through recording and analysing human experiences. This paper presents the results of text mining techniques of more than five hundred thousands of texts retrieved from social networks, blogs, forums, and also research papers from MEDLINE database to discovering new knowledge related to diabetes disease covering symptoms and treatments. The text mining approach consists of two tasks, descriptive and predictive. The descriptive task was to identify explicit references to the diabetes diseases diagnosis and treatments, whereas the predictive task focused on the prediction of the diabetes disease status when the evidence was not explicitly asserted. The findings are then compared to the standard diabetes diagnosis and treatments and only those which are not listed in the standards are retained as hypothesis for further validation by clinicians and medical researchers in the domain of diabetic disease.

Collaboration


Dive into the Huwida Said's collaboration.

Top Co-Authors

Avatar

Mario Guimaraes

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Tieniu Tan

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard Austin

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Keith D. Baker

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge