Urmăriți
Aly M El-semary
Aly M El-semary
Professor of Systems and Computer Engineering
Adresă de e-mail confirmată pe azhar.edu.eg
Titlu
Citat de
Citat de
Anul
BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map
AM El-Semary, H Diab
IEEE Access 7, 95197-95211, 2019
1072019
Applying data mining of fuzzy association rules to network intrusion detection
Edmonds, Papa
2006 IEEE information assurance workshop, 100-107, 2006
792006
A framework for hybrid fuzzy logic intrusion detection systems
A El, J Edmonds, J Gonzalez, M Papa
The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ'05., 325-330, 2005
412005
New trends in secure routing protocols for wireless sensor networks
AM El-Semary, MM Abdel-Azim
International Journal of Distributed Sensor Networks 9 (5), 802526, 2013
342013
Secure image cryptosystem with unique key streams via hyper-chaotic system
H Diab, AM El-semary
Signal Processing 142, 53-68, 2018
322018
Path energy weight: A global energy-aware routing protocol for wireless sensor networks
AM El-Semary, MMA Azim
2010 IFIP Wireless Days, 1-6, 2010
222010
Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically
H Diab, AM El-semary
Signal Processing 148, 172-192, 2018
172018
Counter chain: a new block cipher mode of operation
AM El-Semary, MMA Azim
Journal of Information Processing Systems 11 (2), 266-279, 2015
92015
Distributed and scalable intrusion detection system based on agents and intelligent techniques
AM El-Semary, MGHM Mostafa
Journal of Information Processing Systems 6 (4), 481-500, 2010
82010
Vulnerability assessment for mission critical networks against region failures: A case study
M Azim, A El-Semary
Proceedings of the 2nd International Conference on Communications and …, 2012
72012
A Dual-Sink Secure Routing Protocol for Wireless Sensor Networks.
AM El-Semary, M Azim
Journal of Information Assurance & Security 7 (6), 2012
42012
A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks
AM El-Semary, MMA Azim
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
42011
Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess.
A El-Semary, J Edmonds, J González, M Papa
ICEIS (2), 390-393, 2005
32005
Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and μTesla for Wireless Sensor Networks
AM El-Semary
The International Journal of Sensor Networks and Data Communications 1, 0
3
SPCBC: A secure parallel cipher block chaining mode of operation based on logistic chaotic map
AM El-Semary, MMA Azim, H Diab
KSII Transactions on Internet and Information Systems (TIIS) 11 (7), 3608-3628, 2017
22017
Secure Hybrid Payment System in KSA
AM Elsemary, AA AlAnoor, AA Alshammari, AE Aljohani
International Journal of Computing and Digital Systems 5 (01), 2016
22016
Secure Hybrid Payment System in KSA
AEA Aly M. Elsemary, Abdullah A. AlAnoor, Ahmad A. Alshammari
International Journal of Computing and Digital Systems 5 (1), 59-71, 2016
2*2016
A framework for network intelligence and security
AM El-Semary
The University of Tulsa, 2004
22004
Assessing the Vulnerabilities of Mission-Critical Wireless Sensor Networks
MMA Azim, AM Al-Semary
Wireless Sensor Networks-Technology and Protocols, 2012
12012
El-Semary, Mostafa Gadal-Haqq M. Mostafa,“Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques,”
M Aly
Journal of Information Processing Systems 6 (4), 2010
2010
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20