عنوان البحث | اسم المجلة | سنة النشر |
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models | International Arab Journal of Information Technology (IAJIT) | 2024 |
Secure Three-Factor Authentication Scheme for Remote Healthcare Systems | Computer Systems Science & Engineering (CSSE) | 2022 |
Fully Authentication Services Scheme for NFC Mobile Payment Systems | Intelligent Automation & Soft Computing (IASC) | 2022 |
Cyber Threat Intelligence using PCA-DNN Model to detect Abnormal Network Behavior | Egyptian Informatics Journal | 2022 |
Network Traffic Classification of VPN and Non-VPN Traffic Using Time-Related Features | Materials and Continua CMC | 2022 |
Analysis of the Desynchronization Attack Impact on the E2EA Scheme | Computer Systems Science & Engineering (CSSE) | 2022 |
Reducing the overhead messages cost of the SAK-AKA authentication Scheme for 4G/5G mobile networks | IEEE Access | 2021 |
An analytic model for reducing authentication signaling traffic in an End-to-End authentication scheme | sensors | 2021 |
An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN | Materials and Continua CMC | 2021 |
AAA-WSN: Anonymous Access Authentication Scheme for Wireless Sensor Networks in Big Data Environment | Egyptian Informatics Journal | 2021 |
Secure Authentication Scheme using Diffie Hellman Key Agreement for Smart IoT Irrigation Systems | Electronics | 2021 |
Avalanche Analysis of Variant Polynomials for AES | Turkish Journal of Computer and Mathematics Education | 2021 |
Design a secure IoT architecture using smart wireless networks | International Journal of Communication Networks and Information Security (IJCNIS) | 2020 |
Recent impediments in deploying IPv6 | Adv. Sci., Technol. Eng. Syst. J. | 2020 |
General model for best feature extraction of EEG using discrete wavelet transform wavelet family and differential evolution | Int. J. Distrib. Sensor Netw | 2020 |
Performance Analysis of SAP-NFC protocol | International Journal of Communication Networks and Information Security (IJCNIS) | 2018 |
SE-H: Secure and Efficient Hash Protocol for RFID System | International Journal of Communication Networks and Information Security (IJCNIS) | 2017 |
OCC-Mix Approach for Concurrent Mixture of Fixed and Mobile Transactions | Journal of Digital Information Management (JDIM) | 2017 |
A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE network | International Arab Journal of Information Technology (IAJIT) | 2017 |
Secure Authentication Protocol for NFC Mobile Payment Systems | International Journal of Computer Science and Network Security (IJCSNS) | 2017 |
Synchronous Authentication Key Management Scheme for Inter-eNB Handover over LTE Networks | International Journal of Advanced Computer Science and Applications, (IJACSA) | 2017 |
An Extended Approach for Enhancing Packet-Loss of inter-SGSN in 3G Mobile Networks | International Journal of Computer Network and Information Security (IJCNIS) | 2017 |