A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns MS El Sayed, NA Le-Khac, MA Azer, AD Jurcut IEEE Transactions on Cognitive Communications and Networking 8 (4), 1862-1880, 2022 | 121 | 2022 |
Cloud computing security: challenges and future trends T Radwan, MA Azer, N Abdelbaki International Journal of Computer Applications in Technology 55 (2), 158-172, 2017 | 76 | 2017 |
IoT ethics challenges and legal issues A AboBakr, MA Azer 2017 12th International Conference on Computer Engineering and Systems …, 2017 | 69 | 2017 |
A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks M Azer, S El-Kassas, M El-Soudani arXiv preprint arXiv:0906.1245, 2009 | 68 | 2009 |
A survey on trust and reputation schemes in ad hoc networks MA Azer, SM El-Kassas, AWF Hassan, MS El-Soudani 2008 Third International Conference on Availability, Reliability and …, 2008 | 54 | 2008 |
Anomaly detection based on CNN and regularization techniques against zero-day attacks in IoT networks BI Hairab, MS Elsayed, AD Jurcut, MA Azer IEEE Access 10, 98427-98440, 2022 | 47 | 2022 |
A machine learning-based intrusion detection system for IoT electric vehicle charging stations (EVCSs) M ElKashlan, MS Elsayed, AD Jurcut, M Azer Electronics 12 (4), 1044, 2023 | 46 | 2023 |
Intrusion and ransomware detection system MA Ahmed El-Kosairy 2018 1st International Conference on Computer Applications & Information …, 2018 | 37 | 2018 |
Vehicle to pedestrian systems: Survey, challenges and recent trends A Kabil, K Rabieh, F Kaleem, MA Azer IEEE Access 10, 123981-123994, 2022 | 33 | 2022 |
A new scheme for ransomware classification and clustering using static features B Yamany, MS Elsayed, AD Jurcut, N Abdelbaki, MA Azer Electronics 11 (20), 3307, 2022 | 31 | 2022 |
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks MA Azer, SM El-Kassas, MS El-Soudani 2010 International Conference on Networking, Sensing and Control (ICNSC …, 2010 | 28 | 2010 |
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks M Khalil, MA Azer 2018 Wireless Days (WD), 184-186, 2018 | 27 | 2018 |
Survey and taxonomy of information-centric vehicular networking security attacks M Safwat, A Elgammal, EG AbdAllah, MA Azer Ad Hoc Networks 124, 102696, 2022 | 26 | 2022 |
Lightweight authentication protocol deployment over FlexRay AR Mousa, P NourElDeen, M Azer, M Allam Proceedings of the 10th International conference on informatics and systems …, 2016 | 25 | 2016 |
Intrusion detection for electric vehicle charging systems (evcs) M ElKashlan, H Aslan, M Said Elsayed, AD Jurcut, MA Azer Algorithms 16 (2), 75, 2023 | 24 | 2023 |
A survey on anomaly detection methods for ad hoc networks MA Azer, SM El-Kassas, MS El-Soudani Ubiquitous Computing and Communication Journal 2 (3), 67-76, 2005 | 23 | 2005 |
A study in WPA2 enterprise recent attacks MA Abo-Soliman, MA Azer 2017 13th International Computer Engineering Conference (ICENCO), Page(s …, 2017 | 22 | 2017 |
A secure and privacy‐preserving event reporting scheme for vehicular Ad Hoc networks K Rabieh, MMEA Mahmoud, M Azer, M Allam Security and Communication Networks 8 (17), 3271-3281, 2015 | 22 | 2015 |
Immuning routing protocols from the wormhole attack in wireless ad hoc networks MA Azer, SM El-Kassas, MS El-Soudani 2009 Fourth International Conference on Systems and Networks Communications …, 2009 | 22 | 2009 |
IoT vulnerabilities and attacks: SILEX malware case study BI Mukhtar, MS Elsayed, AD Jurcut, MA Azer Symmetry 15 (11), 1978, 2023 | 21 | 2023 |