default search action
Sherin M. Moussa
Person information
- affiliation: Ain Shams University, Faculty of Computer and Information Sciences, Cairo, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Ahmed A. M. Farghaly, Mahmoud Mounir, Mostafa Aref, Sherin M. Moussa:
Investigating the Challenges and Prospects of Construction Models for Dynamic Knowledge Graphs. IEEE Access 12: 40973-40988 (2024) - [j14]Mona A. Sadik, Ahmed S. ELSayed, Sherin M. Moussa, Zaki Taha Fayed:
2D Spectrogram analysis using vision transformer to detect mispronounced Arabic utterances for children. Appl. Soft Comput. 165: 112052 (2024) - 2023
- [j13]Roaa Elghondakly, Sherin M. Moussa, Nagwa L. Badr:
Service-oriented model-based fault prediction and localization for service compositions testing using deep learning techniques. Appl. Soft Comput. 143: 110430 (2023) - [j12]Christine Lahoud, Sherin M. Moussa, Charbel Obeid, Hicham El Khoury, Pierre-Antoine Champin:
A comparative analysis of different recommender systems for university major and career domain guidance. Educ. Inf. Technol. 28(7): 8733-8759 (2023) - [j11]Dina Fawzy, Sherin M. Moussa, Nagwa L. Badr:
An IoT-based resource utilization framework using data fusion for smart environments. Internet Things 21: 100645 (2023) - [j10]Roaa Elghondakly, Sherin M. Moussa, Nagwa L. Badr:
Mutual Information-Based Modeling for Services Dependency. IEEE Trans. Serv. Comput. 16(3): 2013-2029 (2023) - [c12]Nihad Fottouh, Sherin M. Moussa:
Zero-trust management using AI: Untrusting the trusted accounts in social media. AICCSA 2023: 1-7 - [c11]Mohamad Nossier, Sherin M. Moussa, Nagwa L. Badr:
Single-Cell RNA-Seq Data Clustering: Highlighting Computational Challenges and Considerations. BIBM 2023: 4228-4234 - [c10]Mohamed Abdel Rahman, Ahmed Dahroug, Sherin M. Moussa:
Using Artificial Intelligence for Trust Management Systems in Fog Computing: A Comprehensive Study. EPIA (2) 2023: 453-466 - [d8]Mona Sadik, Sherin M. Moussa:
Children Arabic Utterances for Mispronunciation Detection. IEEE DataPort, 2023 - 2022
- [j9]Dina Fawzy, Sherin M. Moussa, Nagwa L. Badr:
The Internet of Things and Architectures of Big Data Analytics: Challenges of Intersection at Different Domains. IEEE Access 10: 4969-4992 (2022) - [d7]M. Sayed Barkat, Sherin M. Moussa:
Protein-Protein Negative Interaction Dataset. IEEE DataPort, 2022 - [d6]Roaa Elghondakly, Sherin M. Moussa:
Services Dependency Graphs for Web Services Composition Modeling Dataset. IEEE DataPort, 2022 - [d5]Yara Maher, Sherin M. Moussa:
Learning Behavior Analytics Dataset. IEEE DataPort, 2022 - [d4]Noha Medhat, Sherin M. Moussa:
IoT Specifications, Traceability Matrix and Test Cases based on GSM. IEEE DataPort, 2022 - [d3]Abdelrahman Salah, Ghada Adel, Hussien Mohamed, Youssef Baghdady, Sherin M. Moussa:
Arabic Voice Commands for Smart Homes Dataset. IEEE DataPort, 2022 - 2021
- [j8]Dina Fawzy, Sherin M. Moussa, Nagwa L. Badr:
The Spatiotemporal Data Fusion (STDF) Approach: IoT-Based Data Fusion Using Big Data Analytics. Sensors 21(21): 7035 (2021) - [d2]M. R. Barkat, Sherin M. Moussa:
Drug Target Negative Interactions Dataset. IEEE DataPort, 2021 - [d1]Sherin M. Moussa, Rahma Ameen, Mazen Abo Elanin, Radwa Ali, Dina Sameh:
Prioritized Web Crawling Dataset. IEEE DataPort, 2021 - 2020
- [j7]Yara Maher, Sherin M. Moussa, Mohamed Essam Khalifa:
Learners on Focus: Visualizing Analytics Through an Integrated Model for Learning Analytics in Adaptive Gamified E-Learning. IEEE Access 8: 197597-197616 (2020) - [j6]Noha Medhat, Sherin M. Moussa, Nagwa Lotfy Badr, Mohamed F. Tolba:
A Framework for Continuous Regression and Integration Testing in IoT Systems Based on Deep Learning and Search-Based Techniques. IEEE Access 8: 215716-215726 (2020) - [c9]Roaa Elghondakly, Sherin M. Moussa, Nagwa L. Badr:
Handling Faults in Service Oriented Computing: A Comprehensive Study. ICCSA (4) 2020: 947-959
2010 – 2019
- 2019
- [j5]Saad A. Abdelhameed, Sherin M. Moussa, Mohamed E. Khalifa:
Restricted Sensitive Attributes-based Sequential Anonymization (RSA-SA) approach for privacy-preserving data stream publishing. Knowl. Based Syst. 164: 1-20 (2019) - 2018
- [j4]Saad A. Abdelhameed, Sherin M. Moussa, Mohamed E. Khalifa:
Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud. Comput. Secur. 72: 74-95 (2018) - 2017
- [j3]Passant Kandil, Sherin M. Moussa, Nagwa L. Badr:
Cluster-based test cases prioritization and selection technique for agile regression testing. J. Softw. Evol. Process. 29(6) (2017) - [c8]Dina Fawzy, Sherin M. Moussa, Nagwa L. Badr:
An Approach for Erosion and Power Loss Prediction of Wind Turbines Using Big Data Analytics. DARE@PKDD/ECML 2017: 33-46 - 2016
- [j2]Basma H. Albanna, Mahmoud Attia Sakr, Sherin M. Moussa, Ibrahim F. Moawad:
Interest Aware Location-Based Recommender System Using Geo-Tagged Social Media. ISPRS Int. J. Geo Inf. 5(12): 245 (2016) - [c7]Sherin M. Moussa:
An Approach for Opinion-Demographic-Topology Based Microblog Friend Recommendation. AISI 2016: 815-824 - [c6]Roaa Elghondakly, Sherin M. Moussa, Nagwa L. Badr:
A Comprehensive Study for Software Testing and Test Cases Generation Paradigms. ICC 2016 2016: 50:1-50:7 - 2015
- [c5]Passant Kandil, Sherin M. Moussa, Nagwa L. Badr:
A methodology for regression testing reduction and prioritization of agile releases. ICTA 2015: 1-6 - [c4]Basma H. Albanna, Ibrahim F. Moawad, Sherin M. Moussa, Mahmoud Attia Sakr:
Semantic Trajectories: A Survey from Modeling to Application. IF&GIS 2015: 59-76 - 2014
- [c3]Passant Kandil, Sherin M. Moussa, Nagwa L. Badr:
Regression Testing Approach for Large-Scale Systems. ISSRE Workshops 2014: 132-133 - 2010
- [j1]Sherin M. Moussa, Gul A. Agha:
Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management. J. Softw. 5(6): 630-636 (2010)
2000 – 2009
- 2009
- [c2]Sherin M. Moussa, Mohamed Hashem, Gul Agha:
An agent-based framework for inhabitants' untraceability in ubiquitous environments. MoMM 2009: 386-390 - [c1]Sherin M. Moussa, Mohamed H. Abdelaziz, Gul A. Agha:
Integrating Encrypted Mobile Agents with Smart Homes. NTMS 2009: 1-5
Coauthor Index
aka: Nagwa Lotfy Badr
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint