| | Issue Date | Title | Author(s) |
| 1 | 1-Dec-2024 | Federated inception-multi-head attention models for cyber-attacks detection | Al-Halboosi, Imad Tareq; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 2 | 20-Aug-2024 | Power-saving actionable recommendation system to minimize battery drainage in smartphones | Awad, Yusuf; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 3 | 2-Aug-2024 | A Hybrid-Transformer-Based Cyber-Attack Detection in IoT Networks | Al-Halboosi, Imad Tareq; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty |
| 4 | 31-Mar-2024 | Proposed Methodology for Battery Aging and Drainage Mitigation | Awad, Yusuf; El-Sayed M. El-Horbaty ; Islam Hegazy |
| 5 | 1-Mar-2024 | Biometric systems for identification and verification scenarios using spatial footsteps components | Iskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty |
| 6 | 1-Jan-2024 | ConvNeXt network with transfer learning for cumulative foot pressure images recognition | Iskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty |
| 7 | 1-Jan-2024 | Deep Reinforcement Learning Approach for Cyberattack Detection | Tareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty |
| 8 | 1-Jan-2024 | A survey about deep learning and federated Learning in cyberse-curity | Tareq, Imad; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 9 | 31-Dec-2023 | A STUDY FOR MALWARE STATIC ANALYSIS CLASSIFICATION ALGORITHMS WITH DIFFERENT FEATURES EXTRACTORS | Shehata, Sara; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 10 | Dec-2023 | Energy efficient clustering-based routing algorithm for internet of things | Saad, Aya ; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 11 | 21-Nov-2023 | Android Cloud Antivirus Based on Static Analysis | Shehata, Sara Mahmoud; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 12 | 15-Jul-2023 | COMPARATIVE STUDY FOR ANDRIOD MOBILE STATIC ANALYSIS ALGORITHMS | Shehata, Sara Mahmoud; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 13 | Mar-2023 | TUNICATE SWARM BASED CLUSTERING AND ROUTING ALGORITHM FOR INTERNET OF THINGS | Saad Mohammed Mohammed, Aya; Islam Hegazy ; El-Horabty, El-Sayed M. |
| 14 | 1-Jan-2023 | Towards Developing a Metaverse Authentication Model for Mobile Features | Ibrahim, Ibrahim F.; Morsey, Mohammed M.; Mahmoud, Abeer M.; El-Sayed M. El-Horbaty |
| 15 | 23-Sep-2022 | Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT Datasets Using DL in Cybersecurity for IoT | El-Regaily, Salsabil ; Tareq, Imad; Elbagoury, Bassant ; El-Sayed M. El-Horbaty |
| 16 | 1-Jan-2022 | Shallow and Deep Learning in Footstep Recognition: A Survey | Iskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty |
| 17 | Dec-2021 | Efficient Bio-Inspired Routing Algorithm for IoT | Saad, Aya; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 18 | 15-Sep-2021 | An integrated three-tier trust management framework in mobile edge computing using fuzzy logic | Mansour, Merrihan B.M.; Abdelkader, Tamer ; Hashem, Mohamed; El-Sayed M. El-Horbaty |
| 19 | Feb-2021 | Applications of Computational Intelligence in Computer Music Composition | El-Sayed M. El-Horbaty ; NNJ Siphocly; ABM Salem |
| 20 | 1-Jan-2021 | An integrated three-tier trust management framework in mobile edge computing using fuzzy logic | Mansour, Merrihan B.M.; Abdelkader, Tamer ; Mohamed Hashem ; El-Sayed M. El-Horbaty |