A framework for efficient network anomaly intrusion detection with features selection HM Anwer, M Farouk, A Abdel-Hamid 2018 9th International Conference on Information and Communication Systems …, 2018 | 87 | 2018 |
CBSTM-IoT: Context-based social trust model for the Internet of Things SEA Rafey, A Abdel-Hamid, MA El-Nasr 2016 International Conference on Selected Topics in Mobile & Wireless …, 2016 | 78 | 2016 |
Blockchain oracles: State-of-the-art and research directions SK Ezzat, YNM Saleh, AA Abdel-Hamid IEEE Access 10, 67551-67572, 2022 | 52 | 2022 |
A dynamic key distribution protocol for PKI-based VANETs A Hesham, A Abdel-Hamid, MA El-Nasr 2011 IFIP Wireless Days (WD), 1-3, 2011 | 41 | 2011 |
A Categorized Trust-Based Message Reporting Scheme for VANETs M Monir, A Abdel-Hamid, MA El Aziz Advances in Security of Information and Communication Networks, 65-83, 2013 | 38 | 2013 |
Cloud-based Service for Secure Electronic Medical Record Exchange AS Radwan, AA Abdel-Hamid, Y Hanafy International Conference on Computer Theory and Applications, ICCTA 2012, 2012 | 32 | 2012 |
THE CASE FOR DYNAMIC KEY DISTRIBUTION FOR PKI-BASED VANETS AH Salem, A Abdel-Hamid, MA El-Nasr International Journal of Computer Networks & Communications 6 (1), 61-78, 2014 | 31 | 2014 |
A framework for security enhancement in SDN-based datacenters M Ammar, M Rizk, A Abdel-Hamid, AK Aboul-Seoud 2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016 | 28 | 2016 |
IRI-h, a Java-based distance education system: architecture and performance R Maly, H Abdel-Wahab, C Wild, CM Overstreet, A Gupta, A Abdel-Hamid, ... Journal on Educational Resources in Computing (JERIC) 1 (1es), 8-es, 2001 | 26 | 2001 |
Implementation of an Improved Secure System Detection for E-passport by using EPC RFID Tags AB Mohamed, A Abdel-Hamid, KY Mohamed World Academy of Science, Engineering and Technology (WASET) Journal 60, 2009 | 19 | 2009 |
A performance comparison of mobile ipv6, hierarchical mobile ipv6, and mobile ipv6 regional registrations L Osborne, A Abdel-Hamid, R Ramadugu Wireless Networks, Communications and Mobile Computing, 2005 International …, 2005 | 19 | 2005 |
Prediction-based prefetching for remote rendering streaming in mobile virtual environments S Lazem, M Elteir, A Abdel-Hamid, D Gracanin Signal Processing and Information Technology, 2007 IEEE International …, 2007 | 14 | 2007 |
The software architecture of an interactive remote instruction system for heterogeneous network environments A Abdel-Hamid, S Ghanem, K Maly, H Abdel-Wahab Proceedings. Sixth IEEE Symposium on Computers and Communications, 694-699, 2001 | 12 | 2001 |
Threat-driven modeling framework for secure software using aspect-oriented Stochastic Petri nets NH Sherief, AA Abdel-Hamid, KM Mahar 2010 The 7th International Conference on Informatics and Systems (INFOS), 1-8, 2010 | 11 | 2010 |
Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges YNM Saleh, CC Chibelushi, AA Abdel-Hamid, AH Soliman arXiv preprint arXiv:2012.12958, 2020 | 10 | 2020 |
A Cloud-based Mobile Healthcare Monitoring Framework with Location Privacy Preservation MA Abdo, AA Abdel-Hamid, HA Elzouka 2020 International Conference on Innovation and Intelligence for Informatics …, 2020 | 10 | 2020 |
Local-area mobility support through cooperating hierarchies of mobile IP foreign agents A Abdel-Hamid, H Abdel-Wahab Proceedings. Sixth IEEE Symposium on Computers and Communications, 479-484, 2001 | 10 | 2001 |
The essential elements of interactive multimedia distance learning systems K Maly, H Abdel-Wahab, CM Overstreet, JC Wild, A Abdel-Hamid, ... International Journal of Distance Education Technologies (IJDET) 1 (2), 17-36, 2003 | 8 | 2003 |
Authentication enhancement techniques for BAC in 2G E-passport NM Abdal-Ghafour, AA Abdel-Hamid, ME Nasr, SA Khamis 2016 12th International Conference on Innovations in Information Technology …, 2016 | 6 | 2016 |
PA-SET: Privacy-Aware SET Protocol A Abdel-Hamid, O Badawy, S Bahaa International Conference on Computer Theory and Applications, ICCTA 2012, 2012 | 6 | 2012 |