Performance evaluation of symmetric encryption algorithms DSA Elminaam, HMA Kader, MM Hadhoud IJCSNS International Journal of Computer Science and Network Security 8 (12 …, 2008 | 325* | 2008 |
Evaluating the performance of symmetric encryption algorithms. DS Abd Elminaam, HM Abdual-Kader, MM Hadhoud Int. J. Netw. Secur. 10 (3), 216-222, 2010 | 256 | 2010 |
Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices DSA Elminaam, HMA Kader, MM Hadhoud International Journal of Computer Theory and Engineering 1 (4), 1793-8201, 2009 | 248 | 2009 |
Enhanced particle swarm optimization for task scheduling in cloud computing environments AI Awad, NA El-Hefnawy, HM Abdel_kader Procedia Computer Science 65, 920-929, 2015 | 224 | 2015 |
Enhanced data security model for cloud computing EM Mohamed, HS Abdelkader, S El-Etriby 2012 8th International Conference on Informatics and Systems (INFOS), CC-12 …, 2012 | 174 | 2012 |
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. DSA Minaam, HM Abdual-Kader, MM Hadhoud Int. J. Netw. Secur. 11 (2), 78-87, 2010 | 105 | 2010 |
A hybrid approach for efficient anomaly detection using metaheuristic methods TF Ghanem, WS Elkilani, HM Abdul-Kader Journal of advanced research 6 (4), 609-619, 2015 | 81 | 2015 |
Studying the effects of most common encryption algorithms D Salama, HA Kader, M Hadhoud International Arab Journal of e-technology 2 (1), 1-10, 2011 | 57 | 2011 |
Comparative study between differential evolution and particle swarm optimization algorithms in training of feed-forward neural network for stock price prediction ME Abdual-Salam, HM Abdul-Kader, WF Abdel-Wahed 2010 the 7th international conference on informatics and systems (INFOS), 1-8, 2010 | 56 | 2010 |
E-learning systems in virtual environment HM Abdul-Kader 2008 ITI 6th International Conference on Information & Communications …, 2008 | 53 | 2008 |
Data security model for cloud computing EM Mohamed, HS Abdelkader, S El-Etriby Journal of Communication and Computer 10 (8), 1047-1062, 2013 | 52 | 2013 |
Neural networks training based on differential evolution algorithm compared with other architectures for weather forecasting34 HM Abdul-Kader International Journal of Computer Science and Network Security 9 (3), 92-99, 2009 | 45 | 2009 |
In silico identification of potential key regulatory factors in smoking-induced lung cancer SA El-Aarag, A Mahmoud, MH Hashem, H Abd Elkader, AE Hemeida, ... BMC medical genomics 10, 1-11, 2017 | 41 | 2017 |
Modern encryption techniques for cloud computing S El-etriby, EM Mohamed, HS Abdul-kader Proceedings of International Conference on Communications and Information …, 2012 | 40 | 2012 |
An artificial bee colony algorithm for data replication optimization in cloud environments R Salem, MA Salam, H Abdelkader, AA Mohamed IEEE Access 8, 51841-51852, 2019 | 39 | 2019 |
Image encryption based on new one-dimensional chaotic map NF Elabady, HM Abdalkader, MI Moussa, SF Sabbeh 2014 international conference on engineering and technology (ICET), 1-6, 2014 | 36 | 2014 |
Protecting online social networks profiles by hiding sensitive data attributes H AbdulKader, E ElAbd, W Ead Procedia Computer Science 82, 20-27, 2016 | 35 | 2016 |
Artificial immune clonal selection classification algorithms for classifying malware and benign processes using API call sequences KA Al-Sheshtawi, HM Abdul-Kader, NA Ismail International Journal of Computer Science and Network Security 10 (4), 31-39, 2010 | 33 | 2010 |
Discrete wavelet transform-based freezing of gait detection in Parkinson’s disease A El-Attar, AS Ashour, N Dey, H Abdelkader, MM Abd El-Naby, ... Journal of Experimental & Theoretical Artificial Intelligence 33 (4), 543-559, 2021 | 32 | 2021 |
Randomness testing of modern encryption techniques in cloud environment EM Mohamed, S El-Etriby, HS Abdul-Kader 2012 8th International Conference on Informatics and Systems (INFOS), CC-1-CC-6, 2012 | 32 | 2012 |