BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map AM El-Semary, H Diab IEEE Access 7, 95197-95211, 2019 | 107 | 2019 |
Applying data mining of fuzzy association rules to network intrusion detection Edmonds, Papa 2006 IEEE information assurance workshop, 100-107, 2006 | 79 | 2006 |
A framework for hybrid fuzzy logic intrusion detection systems A El, J Edmonds, J Gonzalez, M Papa The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ'05., 325-330, 2005 | 41 | 2005 |
New trends in secure routing protocols for wireless sensor networks AM El-Semary, MM Abdel-Azim International Journal of Distributed Sensor Networks 9 (5), 802526, 2013 | 34 | 2013 |
Secure image cryptosystem with unique key streams via hyper-chaotic system H Diab, AM El-semary Signal Processing 142, 53-68, 2018 | 32 | 2018 |
Path energy weight: A global energy-aware routing protocol for wireless sensor networks AM El-Semary, MMA Azim 2010 IFIP Wireless Days, 1-6, 2010 | 22 | 2010 |
Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically H Diab, AM El-semary Signal Processing 148, 172-192, 2018 | 17 | 2018 |
Counter chain: a new block cipher mode of operation AM El-Semary, MMA Azim Journal of Information Processing Systems 11 (2), 266-279, 2015 | 9 | 2015 |
Distributed and scalable intrusion detection system based on agents and intelligent techniques AM El-Semary, MGHM Mostafa Journal of Information Processing Systems 6 (4), 481-500, 2010 | 8 | 2010 |
Vulnerability assessment for mission critical networks against region failures: A case study M Azim, A El-Semary Proceedings of the 2nd International Conference on Communications and …, 2012 | 7 | 2012 |
A Dual-Sink Secure Routing Protocol for Wireless Sensor Networks. AM El-Semary, M Azim Journal of Information Assurance & Security 7 (6), 2012 | 4 | 2012 |
A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks AM El-Semary, MMA Azim 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 4 | 2011 |
Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess. A El-Semary, J Edmonds, J González, M Papa ICEIS (2), 390-393, 2005 | 3 | 2005 |
Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and μTesla for Wireless Sensor Networks AM El-Semary The International Journal of Sensor Networks and Data Communications 1, 0 | 3 | |
SPCBC: A secure parallel cipher block chaining mode of operation based on logistic chaotic map AM El-Semary, MMA Azim, H Diab KSII Transactions on Internet and Information Systems (TIIS) 11 (7), 3608-3628, 2017 | 2 | 2017 |
Secure Hybrid Payment System in KSA AM Elsemary, AA AlAnoor, AA Alshammari, AE Aljohani International Journal of Computing and Digital Systems 5 (01), 2016 | 2 | 2016 |
Secure Hybrid Payment System in KSA AEA Aly M. Elsemary, Abdullah A. AlAnoor, Ahmad A. Alshammari International Journal of Computing and Digital Systems 5 (1), 59-71, 2016 | 2* | 2016 |
A framework for network intelligence and security AM El-Semary The University of Tulsa, 2004 | 2 | 2004 |
Assessing the Vulnerabilities of Mission-Critical Wireless Sensor Networks MMA Azim, AM Al-Semary Wireless Sensor Networks-Technology and Protocols, 2012 | 1 | 2012 |
El-Semary, Mostafa Gadal-Haqq M. Mostafa,“Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques,” M Aly Journal of Information Processing Systems 6 (4), 2010 | | 2010 |