| | Issue Date | Title | Author(s) |
| 21 | 15-Sep-2021 | An integrated three-tier trust management framework in mobile edge computing using fuzzy logic | Mansour, Merrihan B.M.; Abdelkader, Tamer ; Hashem, Mohamed; El-Sayed M. El-Horbaty |
| 22 | 1-Jun-2023 | Intelligent Multi-Lingual Cyber-Hate Detection in Online Social Networks: Taxonomy, Approaches, Datasets, and Open Challenges | Gamal, Donia ; Alfonse, Marco ; Jiménez-Zafra, Salud María; Aref, M. |
| 23 | 1-Jan-2022 | Leveraging siamese networks for one-shot intrusion detection model | Hanan Hindy ; Tachtatzis, Christos; Atkinson, Robert; Brosset, David; Bures, Miroslav; Andonovic, Ivan; Michie, Craig; Bellekens, Xavier |
| 24 | Sep-2018 | Live Migration Overhead-Aware Dynamic VM Consolidation Algorithm in Cloud Computing | Salma K. Elbay ; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 25 | 31-Mar-2024 | MELANOMA OF THE SKIN CANCER DIAGNOSIS USING SUPPORT VECTOR MACHINE | Rayan, Zeina ; Islam Hegazy ; Roushdy M. ; Salem A. |
| 26 | 16-Dec-2021 | Non-diacritized Arabic speech recognition based on CNN-LSTM and attention-based models | Alsayadi, Hamzah ; Abdelhamid, Abdelaziz ; Hegazy, Islam ; Fayed, Zaki T |
| 27 | Jan-2002 | On a Design of Compression Code for Image Using Principal Component Analysis Neural Network | M. Roushdy ; K. Nagaty ; Islam Hegazy ; A. Mowafi |
| 28 | 2018 | Opinion mining for Arabic dialects on twitter | Gamal, Donia ; Salem, AB; El-Sayed M; El-Horbaty; Marco Alfonse |
| 29 | 2010 | Proposed Biometric Watermarking Algorithm | M. Ali ; T. El Areef ; M. E. Khalifa ; F. M. Ghaleb ; Marwa Ali Elshahed |
| 30 | 31-Mar-2024 | Proposed Methodology for Battery Aging and Drainage Mitigation | Awad, Yusuf; El-Sayed M. El-Horbaty ; Islam Hegazy |
| 31 | 2-Dec-2020 | A review of cyber-ranges and test-beds: Current and future trends | Ukwandu, Elochukwu; Farah, Mohamed Amine Ben; Hanan Hindy ; Brosset, David; Kavallieros, Dimitris; Atkinson, Robert; Tachtatzis, Christos; Bures, Miroslav; Andonovic, Ivan; Bellekens, Xavier |
| 32 | 31-Dec-2023 | A STUDY FOR MALWARE STATIC ANALYSIS CLASSIFICATION ALGORITHMS WITH DIFFERENT FEATURES EXTRACTORS' | Shehata, Sara; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 33 | Mar-2023 | TUNICATE SWARM BASED CLUSTERING AND ROUTING ALGORITHM FOR INTERNET OF THINGS | Saad Mohammed Mohammed, Aya; Islam Hegazy ; El-Horabty, El-Sayed M. |
| 34 | 1-Jan-2019 | Twitter Benchmark Dataset for Arabic Sentiment Analysis | Gamal, Donia ; Alfonse, Marco ; El-Sayed M. El-Horbaty ; Salem A. |
| 35 | 2016 | Video Steganography using Least Significant Bit In Frequency Domain | Anwar.E.Ibrahim ; Marwa Ali ; Taha Ibrahim Elarif |