Browse
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 674
| Issue Date | Title | Author(s) |
|---|---|---|
| 1-Jan-2023 | Towards a User-Friendly Web Application Firewall | Omar, Fatima; Ahmed, Dalia; Elnakib, Omar; Ahmed, Mohamed; Farhan, Nada; Hanan Hindy ; Abdel-Hamid, Mahmoud; Badawi, Yehia |
| 1-Jan-2019 | From Cyber-Security Deception to Manipulation and Gratification Through Gamification | Bellekens, Xavier; Jayasekara, Gayan; Hanan Hindy ; Bures, Miroslav; Brosset, David; Tachtatzis, Christos; Atkinson, Robert |
| 1-Jan-2023 | Grab and Go: Leveraging Computer Vision for Intelligent Shopping | Awad, George; Fawzy, Joseph; Yacoub, Sandra; Abdelgalil, Mahmoud; Khaled, Nada; Bernaba, Jan; Mohamed, Omar; Hanan Hindy |
| 1-Jan-2024 | SQLify Me: An Automated Text-To-SQL Query Generator | Mohamed, Ahmed Yasser; Zain-Elabdeen, Mohamed Hisham; Sayed, Salwa Ahmed; Abdelwahab, Samaa Sabry; Mohamed, Ziad Ezzat; Ali, Zyad Mahmoud; Kawashti, Yomna A.; Hanan Hindy |
| 2011 | Enhancing Web Search with Semantic Identification of User Preference | Naglaa Fathy; Nagwa Badr; Mohamed Hashem ; Tarek Gharieb |
| 28-Aug-2012 | Enriching Ontology Concepts Based on Texts from WWW and Corpus | Tarek F. Gharib; Nagwa Badr; Haridy, Shaimaa ; Ajith Abraham |
| 21-May-2023 | An Ontology Development Methodology Based on Ontology-Driven Conceptual Modeling and Natural Language Processing: Tourism Case Study | Haridy, Shaimaa ; Rasha M. Ismail; Nagwa Badr; Mohamed Hashem |
| 2011 | Securing DSR with mobile agents in wireless ad hoc networks | Abosamra, A; Darwish, G.; Hashem, Mohamed |
| 2011 | Simulating large wireless sensor networks using radio-triggered cellular architecture | Al-Sonosy, O.A.,; Hashem, Mohamed |
| 2011 | Secure Service Discovery protocols for AD HOC Networks | Haitham Elwahash,; Mohamed Amin; Hashem, Mohamed |
| 2012 | Three Reversible Data Encoding Algorithms based on DNA Amino Acids structure | Mona Sabry; Taymoor Nazy; Hashem, Mohamed |
| 2012 | Secure Service Discovery protocol for AD HOC Networks using Hash Function | Haitham Elwahash; Mohamed Amin; Hashem, Mohamed |
| 2012 | Automatic generation of multi-testing types test cases using requirements-based testing | Hashem, Mohamed ; Tolba, M.F.; Badr, N.L; Boghdady, P.N |
| 2013 | A Categorized Trust-Based Message Reporting Scheme for VANETs | Merhan B. Monir; Ayman Adel Adel Ad El-Hamid; Hashem, Mohamed |
| 2014 | Trusting Identity based Authentication on Hybrid Cloud Computing | Hazem A.Elbaz; Abd-elaziz, Taymoor Nazy; Hashem, Mohamed |
| 2014 | Analysis and Verification of a Key Agreement Protocol over Cloud Computing using Scyther tool | Hazem A.Elbaz; Hashem, Mohamed; Taymoor Nazy; Hashem, Mohamed |
| 2014 | Distributed channel selection based on channel weight for cognitive radio network | Hashem, Mohamed ; S. I. Barakat; M. A. Attalla |
| 2014 | Hybrid Trust Management Model for Cloud Computing | Aya Salama A Saleh; Essam M. Ramzy Hamed; Hashem, Mohamed |
| 2014 | Hybrid Rough Genetic Algorithm Model for Making Treatment Decisions of Hepatitis C | Mohammed M. Eissa; Mohammed El-mogy; Hashem, Mohamed ; Farid Badria |
| 2015 | Rough-Granular Neural Network Model for Making Treatment Decisions of Hepatitis C | Mohammed M. Eissa; Mohammed El-mogy,; Hashem, Mohamed |
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 674
Discover
By people