A novel deep learning framework for copy-moveforgery detection in images MA Elaskily, HA Elnemr, A Sedik, MM Dessouky, GM El Banby, ... Multimedia Tools and Applications 79, 19167-19192, 2020 | 86 | 2020 |
WiMax security M Nasreldin, H Aslan, M El-Hennawy, A El-Hennawy 22nd International Conference on Advanced Information Networking and …, 2008 | 57 | 2008 |
A survey of IoT security threats and defenses HI Ahmed, AA Nasr, S Abdel-Mageid, HK Aslan International Journal of Advanced Computer Research 9 (45), 325-350, 2019 | 46 | 2019 |
DADEM: Distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT) HI Ahmed, AA Nasr, SM Abdel-Mageid, HK Aslan International Journal of Ambient Computing and Intelligence (IJACI) 12 (1 …, 2021 | 28 | 2021 |
Comparative study of copy-move forgery detection techniques MA Elaskily, HK Aslan, OA Elshakankiry, OS Faragallah, FE Abd El-Samie, ... 2017 Intl Conf on advanced control circuits systems (ACCS) Systems & 2017 …, 2017 | 26 | 2017 |
New real time multicast authentication protocol R Abdellatif, HK Aslan, SH Elramly 2008 International Conference on Computer Engineering & Systems, 245-250, 2008 | 25 | 2008 |
A scalable and distributed multicast security protocol using a subgroup-key hierarchy HK Aslan Computers & Security 23 (4), 320-329, 2004 | 23 | 2004 |
A hybrid scheme for multicast authentication over lossy networks HK Aslan Computers & Security 23 (8), 705-713, 2004 | 20 | 2004 |
Digital forensics evidence acquisition and chain of custody in cloud computing MM Nasreldin, M El-Hennawy, HK Aslan, A El-Hennawy IJCSI International Journal of Computer Science Issues 12 (1), 153-160, 2015 | 19 | 2015 |
Implementation of a hybrid encryption scheme for Ethernet MT El-Hadidi, NH Hegazi, HK Aslan Proceedings IEEE Symposium on Computers and Communications, 150-156, 1995 | 17 | 1995 |
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach. MMN Rasslan, YH Dakroury, HK Aslan Int. J. Netw. Secur. 8 (1), 75-89, 2009 | 14 | 2009 |
Intrusion detection for electric vehicle charging systems (evcs) M ElKashlan, H Aslan, M Said Elsayed, AD Jurcut, MA Azer Algorithms 16 (2), 75, 2023 | 12 | 2023 |
A design of a fast parallel-pipelined implementation of AES: Advanced Encryption Standard GF Elkabbany, HK Aslan, MN Rasslan arXiv preprint arXiv:1501.01427, 2015 | 12 | 2015 |
Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution HK Aslan Computers & Security 23 (4), 290-299, 2004 | 12 | 2004 |
Security in the information society: visions and perspectives MA Ghonaimy, MT El-Hadidi, HK Aslan Springer, 2012 | 11 | 2012 |
A survey on parameters affecting Manet Performance AM Eltahlawy, HK Aslan, EG Abdallah, MS Elsayed, AD Jurcut, MA Azer Electronics 12 (9), 1956, 2023 | 10 | 2023 |
Anomaly detection of zero-day attacks based on CNN and regularization techniques B Ibrahim Hairab, HK Aslan, MS Elsayed, AD Jurcut, MA Azer Electronics 12 (3), 573, 2023 | 9 | 2023 |
Logic-based analysis of a new hybrid encryption protocol for authentication and key distribution MT El-Hadidi, NH Hegazi, HK Aslan Global IT security (Vienna, Budapest, 31 August-2 September 1998), 173-183, 1998 | 9 | 1998 |
Performance evaluation of a new hybrid encryption protocol for authentication and key distribution MT El-Hadidi, NH Hegazi, HK Aslan Proceedings IEEE International Symposium on Computers and Communications …, 1999 | 8 | 1999 |
Performance analysis of the Kerberos protocol in a distributed environment MT El-Hadidi, NH Hegazi, HK Aslan Proceedings Second IEEE Symposium on Computer and Communications, 235-239, 1997 | 8 | 1997 |