Follow
Prof. Marianne A.  Azer
Prof. Marianne A. Azer
National Telecommunication Institute, Nile University
Verified email at nu.edu.eg
Title
Cited by
Cited by
Year
Cloud computing security: challenges and future trends
T Radwan, MA Azer, N Abdelbaki
International Journal of Computer Applications in Technology 55 (2), 158-172, 2017
702017
A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks
M Azer, S El-Kassas, M El-Soudani
arXiv preprint arXiv:0906.1245, 2009
682009
IoT ethics challenges and legal issues
A AboBakr, MA Azer
2017 12th International Conference on Computer Engineering and Systems …, 2017
662017
A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns
MS El Sayed, NA Le-Khac, MA Azer, AD Jurcut
IEEE Transactions on Cognitive Communications and Networking 8 (4), 1862-1880, 2022
612022
A survey on trust and reputation schemes in ad hoc networks
MA Azer, SM El-Kassas, AWF Hassan, MS El-Soudani
2008 Third International Conference on Availability, Reliability and …, 2008
552008
Intrusion and ransomware detection system
MA Ahmed El-Kosairy
2018 1st International Conference on Computer Applications & Information …, 2018
342018
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
2010 International Conference on Networking, Sensing and Control (ICNSC …, 2010
282010
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
M Khalil, MA Azer
2018 Wireless Days (WD), 184-186, 2018
242018
Lightweight authentication protocol deployment over FlexRay
AR Mousa, P NourElDeen, M Azer, M Allam
Proceedings of the 10th International conference on informatics and systems …, 2016
232016
A secure and privacy‐preserving event reporting scheme for vehicular Ad Hoc networks
K Rabieh, MMEA Mahmoud, M Azer, M Allam
Security and Communication Networks 8 (17), 3271-3281, 2015
222015
Immuning routing protocols from the wormhole attack in wireless ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
2009 Fourth International Conference on Systems and Networks Communications …, 2009
222009
A survey on anomaly detection methods for ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
Ubiquitous Computing and Communication Journal 2 (3), 67-76, 2005
222005
A new scheme for ransomware classification and clustering using static features
B Yamany, MS Elsayed, AD Jurcut, N Abdelbaki, MA Azer
Electronics 11 (20), 3307, 2022
212022
A study in WPA2 enterprise recent attacks
MA Abo-Soliman, MA Azer
2017 13th International Computer Engineering Conference (ICENCO), Page(s …, 2017
212017
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme
M Azer, S El-Kassas, AW Hassan, M El-Soudani
2008 Third International Conference on Availability, Reliability and …, 2008
202008
Anomaly detection based on CNN and regularization techniques against zero-day attacks in IoT networks
BI Hairab, MS Elsayed, AD Jurcut, MA Azer
IEEE Access 10, 98427-98440, 2022
192022
Survey and taxonomy of information-centric vehicular networking security attacks
M Safwat, A Elgammal, EG AbdAllah, MA Azer
Ad Hoc Networks 124, 102696, 2022
192022
Cultural challenges in developing e-learning content
M Azer, A El-Sherbini
International Journal of Emerging Technologies in Learning (iJET) 6 (1), 11-14, 2011
162011
Certification and revocation schemes in ad hoc networks survey and challenges
MA Azer, SM El-Kassas, MS El-Soudani
2007 Second International Conference on Systems and Networks Communications …, 2007
152007
A machine learning-based intrusion detection system for iot electric vehicle charging stations (evcss)
M ElKashlan, MS Elsayed, AD Jurcut, M Azer
Electronics 12 (4), 1044, 2023
142023
The system can't perform the operation now. Try again later.
Articles 1–20