|
| | Issue Date | Title | Author(s) |
| 1 | 2026 | Enhancing early detection and accuracy in image-based network intrusion detection systems | Abo-alian, Alshaimaa ; Prince AbdelHalim, Alaa; Alaa Prince AbdelHalim ; Badr, Nagwa |
| 2 | 2026 | A COMPREHENSIVE SURVEY ON AI-ENHANCED CYBER THREAT DETECTION: MODELS, DATASETS, AND METRICS | Bakhit, Ragab S; Abo-alian, Alshaimaa ; Ragab S. Bakhit |
| 3 | 2025 | Efficient Trajectory Prediction Using Check-In Patterns in Location-Based Social Network | Bahgat, Eman M; Abo-alian, Alshaimaa ; Gharib, Tarek F; Rady, Sherine |
| 4 | 2025 | A review on privacy-preserving techniques for spatiotemporal data | AbuElHassan, Shadwa; Abo-alian, Alshaimaa ; AbdelKader, Tamer; Badr, Nagwa |
| 5 | 2025 | Deep learning techniques for network intrusion detection: A comparative survey | AbdelHalim, Alaa Prince; Abo-alian, Alshaimaa ; Alaa Prince AbdelHalim ; Badr, Nagwa |
| 6 | 2025 | A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation | Abo-alian, Alshaimaa ; Youssef, Mahmoud; Badr, Nagwa L |
| 7 | 2025 | An Efficient Hybrid Decision Tree-Black Hole Algorithm for High-Utility K-Anonymity | Abdelhameed, Saad A; Abo-alian, Alshaimaa ; Abdelkader, Tamer; Badr, Nagwa L |
| 8 | 2025 | A Hybrid CNN-LSTM-RFE Approach for Network Intrusion System | AbdelHalim, Alaa Prince; Abo-alian, Alshaimaa ; Badr, Nagwa; Alaa Prince AbdelHalim |
| 9 | 2025 | Similarity-Based Trajectory Prediction in Location-Based Social Network | Bahgat, Eman M; Abo-alian, Alshaimaa ; Rady, Sherine; Gharib, Tarek F |
| 10 | 2025 | Enhancing Behavioral Insider Threat Detection with AI | Bakhit, Ragab S; Abo-alian, Alshaimaa ; Badr, Nagwa L; Ragab S. Bakhit |
| 11 | 2024 | Evaluating Privacy-Level Metrics in Privacy-Preserving Data Mining | Abd Elhameed, Saad; Abo-alian, Alshaimaa ; Abdelkader, Tamer; Badr, Nagwa |
| 12 | 2023 | A Comparitive Study on Point-of-Interest Recommendation Techniques in Location-Based Social Network | Bahgat, Eman M.; Rady, Sherine ; Abo-Alian, Alshaimaa ; Gharib, Tarek F. |
| 13 | 2023 | Backslash map: An Automated Vulnerability Scanner | Sobhy, Bishoy; Nasser, Marina; Hani, Lydia; Abo-alian, Alshaimaa |
| 14 | 2023 | Identifying Fake Products using Blockchain Technology in Supply Chain System | Medhat, Michael; Wagih, Philip; Mamdouh, Mario; Ashraf, Kermina; Farid, Michael; Abo-alian, Alshaimaa |
| 15 | 1-Jan-2021 | Multi-Tenant RDBMS Allocation in the Cloud Environment | Abo-alian, Alshaimaa ; Badr, Nagwa ; Ahmed Ezzat Abdel Raouf |
| 16 | 2017 | Integrity as a service for replicated data on the cloud | Abo-alian, Alshaimaa ; Badr, Nagwa L; Tolba, Mohamed F |
| 17 | 2016 | Keystroke dynamics-based user authentication service for cloud computing | Abo-alian, Alshaimaa ; Badr, Nagwa L; Tolba, Mohamed F |
| 18 | 2016 | Integrity verification for dynamic multi-replica data in cloud storage | Abo-alian, Alshaimaa ; Badr, NL; Tolba, MF |
| 19 | 2016 | Security as a Service Model for Cloud Storage | Abo-alian, Alshaimaa ; Badr, Nagwa L; Tolba, Mohamed F |
| 20 | 2016 | Authentication as a service for cloud computing | Abo-alian, Alshaimaa ; Badr, Nagwa L; Tolba, Mohamed F |