AA
Publications
- Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures
- Security Threats of Social Internet of Things in the Higher Education Environment
- QoS Provision for Controlling Energy Consumption in Ad-Hoc Wireless Sensor Networks
- An Empirical Analysis on Load Balancing and Service Broker Techniques using Cloud Analyst Simulator
- Statistical Insights and Fraud Techniques for Telecommunications Sector in Egypt
- The Autonomy Evolution in Unmanned Aerial Vehicle: Theory, Challenges and Techniques
- A Malware Obfuscation AI Technique to Evade Antivirus Detection in Counter Forensic Domain
- An Artificial Intelligence Authentication Framework to Secure Internet of Educational Things
- A Holistic Neural Networks Classification for Wangiri Fraud Detection in Telecommunications Regulatory Authorities
- A Distributed Artificial Intelligence Framework to Evolve Infrastructure Resilience in Telecommunications Sector
- Localization of Facial Images Manipulation in Digital Forensics via Convolutional Neural Networks
- A Linear Programming Methodology to Optimize Decision-Making for Ready-Mixed Cement Products: a Case Study on Egypt’s New Administrative Capital
- A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
- Steganography Adaptation Model for Data Security Enhancement in Ad-Hoc Cloud Based V-BOINC Through Deep Learning
- A COVID-19 Infection Prediction Model in Egypt Based on Deep Learning Using Population Mobility Reports
- A secure authentication technique in internet of medical things through machine learning
- COECG-resnet-GWO-SVM: an optimized COVID-19 electrocardiography classification model based on resnet50, grey wolf optimization and support vector machine
Usage metrics
Co-workers & collaborators
- MT
MOHAMED HAMED N. TAHA
- BT
Benbella S. Tawfik
- AA
Amr Abu-Talleb
- NK
NOUR ELDEEN M. KHALIFA
- ME
Mohamed M. Eltabey
- AI
Ahmed I. El karadawy