Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm
El-Hadidi, Mahmoud T., Elsayed, Hany M., Osama, Karim, Bakr, Mohamed, Aslan, Heba K.
Published in Journal of advanced research (01.07.2018)
Published in Journal of advanced research (01.07.2018)
Get full text
Journal Article
Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things
Rasslan, Mohamed, Nasreldin, Mahmoud M., Aslan, Heba K.
Published in Computers & security (01.08.2022)
Published in Computers & security (01.08.2022)
Get full text
Journal Article
Micro Cloud Services Forensics as a Framework
Shehata, Abubakr, Aslan, Heba K, Cho, Young-Im, Abdallah, Mohamed S
Published in International journal of safety and security engineering (26.04.2024)
Published in International journal of safety and security engineering (26.04.2024)
Get full text
Journal Article
A novel deep learning framework for copy-moveforgery detection in images
Elaskily, Mohamed A., Elnemr, Heba A., Sedik, Ahmed, Dessouky, Mohamed M., El Banby, Ghada M., Elshakankiry, Osama A., Khalaf, Ashraf A. M., Aslan, Heba K., Faragallah, Osama S., Abd El-Samie, Fathi E.
Published in Multimedia tools and applications (01.07.2020)
Published in Multimedia tools and applications (01.07.2020)
Get full text
Journal Article
An IoT Privacy-Oriented selective disclosure credential system
Rasslan, Mohamed, Nasreldin, Mahmoud M, Aslan, Heba K
Published in Journal of cybersecurity (Oxford) (22.10.2022)
Published in Journal of cybersecurity (Oxford) (22.10.2022)
Get full text
Journal Article
A Survey on Parameters Affecting MANET Performance
Eltahlawy, Ahmed M., Aslan, Heba K., Abdallah, Eslam G., Elsayed, Mahmoud Said, Jurcut, Anca D., Azer, Marianne A.
Published in Electronics (Basel) (22.04.2023)
Published in Electronics (Basel) (22.04.2023)
Get full text
Journal Article
Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
Ibrahim Hairab, Belal, Aslan, Heba K., Elsayed, Mahmoud Said, Jurcut, Anca D., Azer, Marianne A.
Published in Electronics (Basel) (01.02.2023)
Published in Electronics (Basel) (01.02.2023)
Get full text
Journal Article
Cross-Layer Distributed Attack Detection Model for the IoT
Ahmed, Hassan I, Nasr, Abdurrahman A, Abdel-Mageid, Salah M, Aslan, Heba K
Published in International journal of ambient computing and intelligence (29.06.2022)
Published in International journal of ambient computing and intelligence (29.06.2022)
Get full text
Journal Article
DADEM: Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT)
Ahmed, Hassan I, Nasr, Abdurrahman A, Abdel-Mageid, Salah M, Aslan, Heba K
Published in International journal of ambient computing and intelligence (01.01.2021)
Published in International journal of ambient computing and intelligence (01.01.2021)
Get full text
Journal Article
A survey of IoT security threats and defenses
Ahmed, Hassan I., Nasr, Abdurrahman A., Abdel-Mageid, Salah, Aslan, Heba K.
Published in International journal of advanced computer research (01.11.2019)
Published in International journal of advanced computer research (01.11.2019)
Get full text
Journal Article
Pseudo Random Number Generators Employing Three Numerical Solvers of Chaotic Generators
Yacoub, Mohammed H., Sharobim, Bishoy K., Fetteha, Marwan A., Said, Lobna A., Aslan, Heba K.
Published in 2023 11th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC) (18.12.2023)
Published in 2023 11th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC) (18.12.2023)
Get full text
Conference Proceeding
Detection of sequence number attacks using enhanced AODV protocol in MANETs
Eltahlawy, Ahmed M., Aslan, Heba K., Elsayed, Mahmoud Said, Jurcut, Anca D., Azer, Marianne A.
Published in Computers & electrical engineering (01.09.2024)
Published in Computers & electrical engineering (01.09.2024)
Get full text
Journal Article