General model for best feature extraction of EEG using discrete wavelet transform wavelet family and differential evolution A Al-Qerem, F Kharbat, S Nashwan, S Ashraf, K Blaou International Journal of Distributed Sensor Networks 16 (3), 1550147720911009, 2020 | 87 | 2020 |
Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior M Al-Fawa'reh, M Al-Fayoumi, S Nashwan, S Fraihat Egyptian Informatics Journal 23 (2), 173-185, 2022 | 56 | 2022 |
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment S Nashwan Egyptian Informatics Journal 22 (1), 15-26, 2021 | 47 | 2021 |
An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN. S Nashwan Computers, Materials & Continua 68 (1), 2021 | 24 | 2021 |
Secure authentication protocol for NFC mobile payment systems S Nashwan International Journal of Computer Science and Network Security 17 (8), 256-263, 2017 | 22 | 2017 |
Design a secure IoT architecture using smart wireless networks N Almrezeq, L Almadhoor, T Alrasheed, AA Abd El-Aziz, S Nashwan International Journal of Communication Networks and Information Security 12 …, 2020 | 21 | 2020 |
SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE network. S Nashwan International Arab Journal of Information Technology (IAJIT) 14 (5), 2017 | 21 | 2017 |
A new hybrid approach of symmetric/asymmetric authentication protocol for future mobile networks M Al-Fayoumi, S Nashwan, S Yousef, AR Alzoubaidi Third IEEE International Conference on Wireless and Mobile Computing …, 2007 | 21 | 2007 |
VPN and Non-VPN Network Traffic Classification Using Time-Related Features. M Al-Fayoumi, M Al-Fawa'reh, S Nashwan Computers, Materials & Continua 72 (2), 2022 | 20 | 2022 |
Machine learning approach for metabolic syndrome diagnosis using explainable data-augmentation-based classification MG Sghaireen, Y Al-Smadi, A Al-Qerem, KC Srivastava, KK Ganji, ... Diagnostics 12 (12), 3117, 2022 | 16 | 2022 |
Performance analysis of SAP-NFC protocol M Al-Fayoumi, S Nashwan International Journal of Communication Networks and Information Security 10 …, 2018 | 14 | 2018 |
Formal analysis of MCAP protocol against replay attack S Nashwan, B Alshammari British Journal of Mathematics & Computer Science 22 (1), 1-14, 2017 | 12 | 2017 |
Reliable prediction of software defects using Shapley interpretable machine learning models Y Al-Smadi, M Eshtay, A Al-Qerem, S Nashwan, O Ouda, AA Abd El-Aziz Egyptian Informatics Journal 24 (3), 100386, 2023 | 11 | 2023 |
SE-H: Secure and efficient hash protocol for RFID system S Nashwan International Journal of Communication Networks and Information Security 9 …, 2017 | 10 | 2017 |
Mutual chain authentication protocol for SPAN transactions in Saudi Arabian banking S Nashwan, B Alshammari International journal of computer and communication engineering 3 (5), 326, 2014 | 9 | 2014 |
Fully Authentication Services Scheme for NFC Mobile Payment Systems. M Alshammari, S Nashwan Intelligent Automation & Soft Computing 32 (1), 2022 | 8 | 2022 |
Recent impediments in deploying IPv6 A Hamarsheh, Y Abdalaziz, S Nashwan Advances in Science Technology and Engineering Systems, 2021 | 8 | 2021 |
Design of highly sensitive biosensors using hollow-core microstructured fibers for plasma sensing in aids with human metabolism MK Alam, K Vadivel, A Natesan, MG Sghaireen, KK Ganji, KC Srivastava, ... Optical and Quantum Electronics 55 (2), 188, 2023 | 6 | 2023 |
Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems. M Alanazi, S Nashwan Computer Systems Science & Engineering 42 (2), 2022 | 6 | 2022 |
Reducing the overhead messages cost of the SAK-AKA authentication scheme for 4G/5G mobile networks S Nashwan, IIH Nashwan IEEE Access 9, 97539-97545, 2021 | 6 | 2021 |