|
| | Issue Date | Title | Author(s) |
| 141 | 31-Dec-2023 | A STUDY FOR MALWARE STATIC ANALYSIS CLASSIFICATION ALGORITHMS WITH DIFFERENT FEATURES EXTRACTORS | Shehata, Sara; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 142 | 2016 | Study on Analogical Reasoning Methodologies for Developing Analogical Learning Systems | Gawish, Mohamed ; Abdel-Badeeh Salem |
| 143 | 2018 | A Study on Representation and Reasoning Techniques of Commonsense Episodic Knowledge: Challenges and Applications | Gawish, Mohamed ; Abdel-Badeeh Salem |
| 144 | Sep-2024 | STUDYING THE IMPACT OF DATASET BALANCING ON MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEMS FOR IOT | Abdel-Hamid, Salma; Islam Hegazy ; Aref, M. ; Roushdy M. |
| 145 | 1-Jan-2024 | A survey about deep learning and federated Learning in cyberse-curity | Tareq, Imad; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 146 | 1-Jan-2022 | Survey of Arabic Machine Translation, Methodologies, Progress, and Challenges | Gamal, Donia ; Alfonse, Marco ; Jimenez-Zafra, Salud Maria; Aref, M. |
| 147 | 2022 | A Survey on Artificial Intelligence Techniques for Malware Detection | Faisal, Hend; Hanan Hindy ; Gaber, Samir; Salem A. |
| 168 | Dec-2021 | A Survey on Learning-Based Intrusion Detection Systems for IoT Networks | Abdelhamid, Salma; Aref, M. ; Islam Hegazy ; Roushdy M. |
| 169 | 1-Jan-2021 | A Survey Study and Analysis of Task Scheduling Approaches for the Major Computing Environments | Rizk, Dalia Kamal A.A.; Hosny, Hoda M.; El-Sayed M. El-Horbaty ; Salem A. |
| 170 | 1-Jan-2020 | Swarm Optimization for Solving Load Balancing in Cloud Computing | Farrag A.; Mohamad S.; El-Horbaty, El-Sayed |
| 171 | 1-Jan-1992 | A synchronous algorithm for shortest paths on a tree machine | El-Sayed M. El-Horbaty ; Mohamed, Alaa El Din H. |
| 172 | 1-Jan-2024 | TapToTab: Video-Based Guitar Tabs Generation Using AI and Audio Analysis | Ghaleb, Ali; Elsadawy, Eslam; Essam, Ihab; Zaky, Seif Eldin; Abdelhakim, Mohamed; Fahim, Natalie; Bayoumi, Razan; Hanan Hindy |
| 173 | 28-Nov-2018 | A taxonomy of malicious traffic for intrusion detection systems | Hanan Hindy ; Hodo, Elike; Bayne, Ethan; Seeam, Amar; Atkinson, Robert; Bellekens, Xavier |
| 174 | 1-Jan-2020 | A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems | Hanan Hindy ; Brosset, David; Bayne, Ethan; Seeam, Amar Kumar; Tachtatzis, Christos; Atkinson, Robert; Bellekens, Xavier |
| 175 | 6-Mar-2024 | TL-IDS: A Transfer Learning Technique for Botnet Detection in IoT | Abdelhamid, Salma; Aref, M. ; Islam Hegazy ; Roushdy M. |
| 176 | 1-Jan-2023 | Towards a User-Friendly Web Application Firewall | Omar, Fatima; Ahmed, Dalia; Elnakib, Omar; Ahmed, Mohamed; Farhan, Nada; Hanan Hindy ; Abdel-Hamid, Mahmoud; Badawi, Yehia |
| 177 | 1-Jan-2023 | Towards Developing a Metaverse Authentication Model for Mobile Features | Ibrahim, Ibrahim F.; Morsey, Mohammed M.; Mahmoud, Abeer M.; El-Sayed M. El-Horbaty |
| 178 | Nov-2025 | Towards Explainable Multi-Modal Fusion Strategies for ASD Detection: A Review | El-Askary, Nada ; Gawish, Mohamed ; Mohamed Mabrouk Morsey; M.Mahmoud, Abeer ; Aref, M. ; Taha Ibrahim Elarif |
| 179 | 14-Oct-2024 | Towards Precise Agriculture: Integrating Machine Learning Techniques for Smart Farming Systems | Anwar, Batool; Morsey, Mohamed M.; Islam Hegazy ; Zaki Taha Fayed ; Taha Ibrahim Elarif |
| 180 | Jun-2010 | Towards securing MintRoute in wireless sensor networks | Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson |