|
| | Issue Date | Title | Author(s) |
| 61 | 1-Jan-2024 | Editorial: Cyber security in the wake of fourth industrial revolution: opportunities and challenges | Ukwandu, Elochukwu; Hewage, Chaminda; Hanan Hindy |
| 62 | Dec-2021 | Efficient Bio-Inspired Routing Algorithm for IoT | Saad, Aya; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 63 | Dec-2023 | Energy efficient clustering-based routing algorithm for internet of things | Saad, Aya ; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 64 | 30-Jun-2024 | ENHANCED POLSAR IMAGE CLASSIFICATION USING DEEP CONVOLUTIONAL AND TEMPORAL CONVOLUTIONAL NETWORKS | Anwar, Batool; Morsey, Mohamed M.; Islam Hegazy ; Zaki Taha Fayed ; Taha Ibrahim Elarif |
| 65 | 2022 | Enhancing Customer Churn Prediction in Digital Banking using Ensemble Modeling | Galal, Mohamed ; Rady, Sherine ; Aref, M. |
| 66 | 2024 | Enhancing Customer Churn Prediction in Digital Banking Using Hybrid Meta-Learners and Stacking Ensemble Modeling | Galal, Mohamed ; Rady, Sherine ; Aref, M. |
| 67 | 2024 | Enhancing Machine Learning Engineering For Predicting Youth Loyalty In Digital Banking Using A Hybrid Meta-Learners | Galal, Mohamed ; Rady, Sherine ; Aref, M. |
| 108 | 28-Nov-2005 | Evaluating how well agent-based IDS perform | I.M. Hegazy ; H.M. Faheem ; Taha Alarif ; T. Ahmed |
| 109 | 2022 | An evaluation of lightweight deep learning techniques in medical imaging for high precision COVID-19 diagnostics | Ukwandu, Ogechukwu; Hanan Hindy ; Ukwandu, Elochukwu |
| 110 | 1-Jan-2017 | Exploiting existed medical ontologies to build domain ontology for hepatobiliary system diseases | Al-Marzoqi G. ; Alfonse, Marco ; Moawad I. ; Roushdy M. |
| 111 | Aug-2011 | Exploiting routing tree construction in CTP | Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson |
| 112 | 2023 | Factors Influencing Investment Decisions in Financial Investment Companies | Abdul kareem, Ahmed Amer; Zaki Taha Fayed ; Rady, Sherine ; Amin El-Regaily, Salsabil; Nema, Bashar M. |
| 113 | 1-Dec-2024 | Federated inception-multi-head attention models for cyber-attacks detection | Al-Halboosi, Imad Tareq; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 114 | 2024 | Forecasting Financial Investment Firms’ Insolvencies Empowered with Enhanced Predictive Modeling | Abdul-Kareem, Ahmed Amer; Zaki Taha Fayed ; Rady, Sherine ; El-Regaily, Salsabil Amin; Nema, Bashar M. |
| 115 | Aug-2003 | A Framework for Multiagent-Based System for Intrusion Detection | Islam Hegazy ; Taha Ibrahim Alarif ; Zaki Taha Fayed ; Hossam M. Faheem |
| 116 | 1-Jan-2019 | From Cyber-Security Deception to Manipulation and Gratification Through Gamification | Bellekens, Xavier; Jayasekara, Gayan; Hanan Hindy ; Bures, Miroslav; Brosset, David; Tachtatzis, Christos; Atkinson, Robert |
| 117 | 1-Dec-2025 | Genetic algorithm for path-based testing of component outage situations in IoT system processes | Klima, Matej; Bures, Miroslav; Ahmed, Bestoun S.; Hanan Hindy ; Bellekens, Xavier; Gargantini, Angelo |
| 118 | 1-Jan-2023 | Grab and Go: Leveraging Computer Vision for Intelligent Shopping | Awad, George; Fawzy, Joseph; Yacoub, Sandra; Abdelgalil, Mahmoud; Khaled, Nada; Bernaba, Jan; Mohamed, Omar; Hanan Hindy |
| 119 | Jul-2013 | hiCLUMP: A hybrid Implementation of the CLUMP Algorithm for Clustering Microarrays Data | khalifa, mohamed essam ; Dina Elsayad; Amal Khalifa; El-Sayed M. El-Horbaty |
| 120 | 1-Jan-2015 | Hybrid Algorithm for Resource Provisioning of Multi-tier Cloud Computing | Eawna, Marwah Hashim; Mohammed, Salma Hamdy; El-Sayed M. El-Horbaty |