Deducing case IDs for unlabeled event logs D Bayomie, IMA Helal, A Awad, E Ezat, A ElBastawissi International Conference on Business Process Management, 242-254, 2016 | 22 | 2016 |
Runtime deduction of case ID for unlabeled business process execution events IMA Helal, A Awad, A El Bastawissi 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 8 | 2015 |
Cybersecurity Tools for IS Auditing OM Al-Matari, IMA Helal, SA Mazen, S Elhennawy The 6th International Conference on Enterprise Systems, 2018 | 6 | 2018 |
A resource recommendation approach based on co-working history N Abdulhameed, I Helal, A Awad, E Ezat Int. J. Adv. Comput. Sci. Appl 9 (7), 236-245, 2018 | 2 | 2018 |
Integrated framework for cybersecurity auditing OMM Al-Matari, IMA Helal, SA Mazen, S Elhennawy Information Security Journal: A Global Perspective, 1-16, 2020 | | 2020 |
Adopting security maturity model to the organizations’ capability model OMM Al-Matari, IMA Helal, SA Mazen, S Elhennawy Egyptian Informatics Journal, 2020 | | 2020 |
Correlating Unlabeled Events at Runtime I Helal, A Awad arXiv preprint arXiv:2004.09971, 2020 | | 2020 |
Computer-Assisted Audit Tools for IS Auditing S Kamal, IMA Helal, SA Mazen, S Elhennawy Internet of Things—Applications and Future, 139-155, 2020 | | 2020 |
Security Management Techniques and Tools for IS Auditing OM Al-Matari, IMA Helal, SA Mazen, S Elhennawy 2019 First International Conference of Intelligent Computing and Engineering …, 2019 | | 2019 |
ICCPN: Interval-based Conditional Colored Petri Net IMA Helal, A El-Bastawissy, O Hegazy 2010 The 7th International Conference on Informatics and Systems (INFOS), 1-8, 2010 | | 2010 |
A design approach for active rules IMAA Helal Cairo University, 2010 | | 2010 |