|
| Issue Date | Title | Author(s) |
| 2010 | A New Novel Fidelity Digital Watermarking Adaptively Pixel Based on Medial Pyramid of Embedding Error in Spatial Domain of Robust | Aliwa, M. B; Hashem, Mohamed; El-Toboly, T. E; Fahmy, M. M; Nasr, M. E; M.H AbdelAziz |
| 1-Dec-2009 | An agent-based framework for inhabitants' untraceability in ubiquitous environments | Sherin M. Moussa ; Mohamed Hashem ; Agha, Gul |
| 15-Sep-2021 | An integrated three-tier trust management framework in mobile edge computing using fuzzy logic | Mansour, Merrihan B.M.; Abdelkader, Tamer ; Hashem, Mohamed ; El-Sayed M. El-Horbaty |
| 2014 | Analysis and Verification of a Key Agreement Protocol over Cloud Computing using Scyther tool | Hazem A.Elbaz; Hashem, Mohamed; Taymoor Nazy; Hashem, Mohamed |
| 2012 | Automatic generation of multi-testing types test cases using requirements-based testing | Hashem, Mohamed ; Tolba, M.F.; Badr, N.L; Boghdady, P.N |
| 2005 | Autonomous UAV Fuzzy Logic Navigation and Obstacle Avoidance Controller | Amr Abd El Hamied; Hashem, Mohamed; Serag E.Habib; Mohamed Hashem |
| 2006 | A Bandwidth-constrained QoS Genetic Source Routing Algorithm for Ad-hoc Mobile Networks | M.H AbdelAziz |
| 2015 | Building Trust Management Model for Cloud Computing | Aya Salama A Saleh; Essam M. Ramzy Hamed; Hashem, Mohamed |
| 2013 | A Categorized Trust-Based Message Reporting Scheme for VANETs | Merhan B. Monir; Ayman Adel Adel Ad El-Hamid; Hashem, Mohamed |
| 2006 | Clustering of Gege Expression Profiles Using a Graph-based Technique | M.El Sharkawy; Hashem, Mohamed; M.Siam,; M. Hashem |
| 2005 | Data Mining For Computer Virus Detection | M. Hashem ; M.Siam,; S. Arafat,; M.Mabrouk |
| 2006 | Data Transfer Using Mobile Agents: Security Mechnisms | Abd El-Wahab S,; Hashem, Mohamed; Samira S. Mersal; Mohamed Hashem |
| 2012 | Database Security-Mechanics,T echniques, Breaches,And New Directions | Hashem, M. ; I El-Henaw; y,A.Mostafa |
| 2016 | DCSS: Distributed Channel Selection Strategy Based On Channel Weight In Multi-Hop Cognitive Radio Network | Hashem, Mohamed ; S. I. Barakat; M. A. AttaAlla |
| 2002 | Design and Implementation of Distance Learning Education System | M.Mahran; Hashem, Mohamed; A. Mohamed; M. Hashem |
| 2013 | Design And Implementation Of Extensible Service-Oriented Algorithms For Securing Relational Data Bases | A.Mostafa,; Hashem, Mohamed; I El-Henawy; M. Hashem |
| 2013 | Design And Implementation Of Multi-Layer Polices For Database Security | A.Mostafa; Hashem, Mohamed; I El-Henawy; Hashem, M. |
| Dec-2015 | Design of DNA-based Advanced Encryption Standard (AES) | khalifa, mohamed essam ; Mona Sabry; Hashem, Mohamed ; Taymoor Nazmy |
| 2014 | Distributed channel selection based on channel weight for cognitive radio network | Hashem, Mohamed ; S. I. Barakat; M. A. Attalla |
| 2010 | A DNA and Amino-based Implementation of playfair cipher | Sabry, M; Hashem, Mohamed; Nazmy, T; Mohamed Hashem |