|
| | Issue Date | Title | Author(s) |
| 101 | 2018 | Reliable Web Service Consumption Through Mobile Cloud Computing | Abdelfattah, Amr S.; Abdelkader, Tamer ; El-Sayed M. El-Horbaty |
| 102 | 2-Feb-2016 | Reliable web services approaches of Mobile Cloud Computing: A comparative study | Abdelfattah A. ; Abdelkader, Tamer ; El-Horbaty E. |
| 163 | 2-Dec-2020 | A review of cyber-ranges and test-beds: Current and future trends | Ukwandu, Elochukwu; Farah, Mohamed Amine Ben; Hanan Hindy ; Brosset, David; Kavallieros, Dimitris; Atkinson, Robert; Tachtatzis, Christos; Bures, Miroslav; Andonovic, Ivan; Bellekens, Xavier |
| 164 | 22-Dec-2024 | Revolutionizing Rice Disease Diagnosis: An Advanced CNN and Vision Transformer Methodology | Batool Anwar; Mohamed M. Morsey; Islam Hegazy ; Zaki Taha Fayed ; Taha Ibrahim Elarif |
| 165 | 1-Apr-2018 | RSAM: An enhanced architecture for achieving web services reliability in mobile cloud computing | Abdelfattah A. ; Abdelkader, Tamer ; EI-Horbaty E. |
| 166 | 2-Jul-2015 | Securing Cloud Computing Environment using a New Trend of Cryptography | Mohammad, Omer K.Jasim; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. |
| 167 | 1-Jan-2022 | Shallow and Deep Learning in Footstep Recognition: A Survey | Iskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty |
| 168 | 1-Jul-2017 | Stack auto-encoders approach for malignant melanoma diagnosis in dermoscopy images | Arasi, Munya A.; El-Sayed M. El-Horbaty ; Salem A. ; El-Dahshan, El-sayed |
| 169 | 30-Sep-2014 | Statistical analysis for random bits generation on quantum key distribution | Mohammad, Omer K.Jasim; Abbas, Safia; El-Sayed M. El-Horbaty ; Salem A. |
| 170 | 31-Dec-2023 | A STUDY FOR MALWARE STATIC ANALYSIS CLASSIFICATION ALGORITHMS WITH DIFFERENT FEATURES EXTRACTORS | Shehata, Sara; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 171 | Sep-2024 | STUDYING THE IMPACT OF DATASET BALANCING ON MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEMS FOR IOT | Abdel-Hamid, Salma; Islam Hegazy ; Aref, M. ; Roushdy M. |
| 172 | 1-Jan-2024 | A survey about deep learning and federated Learning in cyberse-curity | Tareq, Imad; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 173 | 1-Jan-2022 | Survey of Arabic Machine Translation, Methodologies, Progress, and Challenges | Gamal, Donia ; Alfonse, Marco ; Jimenez-Zafra, Salud Maria; Aref, M. |
| 174 | Dec-2021 | A Survey on Learning-Based Intrusion Detection Systems for IoT Networks | Abdelhamid, Salma; Aref, M. ; Islam Hegazy ; Roushdy M. |
| 175 | 1-Jan-2021 | A Survey Study and Analysis of Task Scheduling Approaches for the Major Computing Environments | Rizk, Dalia Kamal A.A.; Hosny, Hoda M.; El-Sayed M. El-Horbaty ; Salem A. |
| 176 | 1-Jan-2020 | Swarm Optimization for Solving Load Balancing in Cloud Computing | Farrag A.; Mohamad S.; El-Horbaty, El-Sayed |
| 177 | 1-Jan-1992 | A synchronous algorithm for shortest paths on a tree machine | El-Sayed M. El-Horbaty ; Mohamed, Alaa El Din H. |
| 178 | 28-Nov-2018 | A taxonomy of malicious traffic for intrusion detection systems | Hanan Hindy ; Hodo, Elike; Bayne, Ethan; Seeam, Amar; Atkinson, Robert; Bellekens, Xavier |
| 179 | 6-Mar-2024 | TL-IDS: A Transfer Learning Technique for Botnet Detection in IoT | Abdelhamid, Salma; Aref, M. ; Islam Hegazy ; Roushdy M. |
| 180 | 1-Jan-2023 | Towards Developing a Metaverse Authentication Model for Mobile Features | Ibrahim, Ibrahim F.; Morsey, Mohammed M.; Mahmoud, Abeer M.; El-Sayed M. El-Horbaty |