Ayman M. Bahaa Eldin

Orcid: 0000-0002-6305-3965

Affiliations:
  • Ain Shams University, Faculty of Engineering, Cairo, Egypt


According to our database1, Ayman M. Bahaa Eldin authored at least 23 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
VoIP Network Forensics of Instant Messaging Calls.
IEEE Access, 2024

2022
HSAS-MD Analyzer: A Hybrid Security Analysis System Using Model-Checking Technique and Deep Learning for Malware Detection in IoT Apps.
Sensors, 2022

2019
Mobility prediction-based efficient clustering scheme for connected and automated vehicles in VANETs.
Comput. Networks, 2019

Robust Hybrid-Security Protocol for HealthCare Systems.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

2018
Efficient Architecture for Controlled Accurate Computation using AVX.
Proceedings of the 7th International Conference on Software and Information Engineering, 2018

2017
BUE International Conference on Sustainable Vital Technologies in Engineering and Informatics.
Int. J. Interact. Mob. Technol., 2017

A Cloud-based Malware Detection Framework.
Int. J. Interact. Mob. Technol., 2017

Improving model predictive controller by using non-uniform sampled model.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2015
Agent-based trusted on-demand routing protocol for mobile ad-hoc networks.
Wirel. Networks, 2015

2014
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

Classification of IDS Alerts with Data Mining Techniques.
CoRR, 2014

Genetic Algorithms and its use with back-propagation network.
CoRR, 2014

Edge detection of binary images using the method of masks.
CoRR, 2014

Increasing Server Availability for Overall System Security: A Preventive Maintenance Approach Based on Failure Prediction.
CoRR, 2014

Intelligent Systems for Information Security.
CoRR, 2014

RCA: Efficient connected dominated clustering algorithm for mobile ad hoc networks.
Comput. Networks, 2014

High Performance Java Card Operating System.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

2013
Hard-Detours: A new technique for dynamic code analysis.
Proceedings of Eurocon 2013, 2013

2012
Data Mining Based Technique for IDS Alerts Classification
CoRR, 2012

2010
Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Agent based correlation model for intrusion detection alerts.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

2009
Quantum Secure Direct Communication using Entanglement and Super Dense Coding.
Proceedings of the SECRYPT 2009, 2009


  Loading...