Hisham A. Kholidy

Orcid: 0000-0002-7673-5850

According to our database1, Hisham A. Kholidy authored at least 51 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach.
Sensors, July, 2023

Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives.
IEEE Trans. Netw. Serv. Manag., March, 2023

Enhancing Object Detection for VIPs Using YOLOv4_Resnet101 and Text-to-Speech Conversion Model.
Multimodal Technol. Interact., 2023

5G Network Slicing: Analysis of Multiple Machine Learning Classifiers.
CoRR, 2023

An Analysis of Honeypots and their Impact as a Cyber Deception Tactic.
CoRR, 2023

Detecting Forged Kerberos Tickets in an Active Directory Environment.
CoRR, 2023

Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks.
IEEE Access, 2023

Leveraging SDN for Real World Windfarm Process Automation Architectures.
Proceedings of the Tenth International Conference on Software Defined Systems, 2023

SIoTSim: Simulator for Social Internet of Things.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

A Smart Network Slicing Provisioning Framework for 5G-based IoT Networks.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

FAKEY: Fake Hashed Key Attack on Payment Channel Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G Networks.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G Networks.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method.
Sensors, 2022

5G Network Management, Orchestration, and Architecture: A Practical Study of the MonB5G project.
CoRR, 2022

UAV Based 5G Network: A Practical Survey Study.
CoRR, 2022

Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform.
CoRR, 2022

Toward Zero Trust Security IN 5G Open Architecture Network Slices.
Proceedings of the IEEE Military Communications Conference, 2022

Toward An Experimental Federated 6G Testbed: A Federated Leaning Approach.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

An Experimental 5G Testbed for Secure Network Slicing Evaluation.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

An Innovative Hashgraph-based Federated Learning Approach for Multi Domain 5G Network Protection.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach.
Future Gener. Comput. Syst., 2021

Autonomous mitigation of cyber risks in the Cyber-Physical Systems.
Future Gener. Comput. Syst., 2021

State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems.
CoRR, 2021

A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks.
CoRR, 2021

BIoTA: Control-Aware Attack Analytics for Building Internet of Things.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

5G Core Security in Edge Networks: A Vulnerability Assessment Approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
Correlation-based sequence alignment models for detecting masquerades in cloud computing.
IET Inf. Secur., 2020

An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs.
Comput. Commun., 2020

2019
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems.
Secur. Commun. Networks, 2019

2018
ICSD: Integrated Cloud Services Dataset.
Proceedings of the Services - SERVICES 2018, 2018

2017
Towards Realizing a Distributed Event and Intrusion Detection System.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

A Comparison of Graph-Based Synthetic Data Generators for Benchmarking Next-Generation Intrusion Detection Systems.
Proceedings of the 2017 IEEE International Conference on Cluster Computing, 2017

2016
A risk mitigation approach for autonomous cloud intrusion response system.
Computing, 2016

An efficient hybrid prediction approach for predicting cloud consumer resource needs.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks.
IEEE Trans. Dependable Secur. Comput., 2015

A cost-aware model for risk mitigation in Cloud computing systems.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
QoS Optimization for Cloud Service Composition Based on Economic Model.
Proceedings of the Internet of Things. User-Centric IoT, 2014

A Finite Context Intrusion Prediction Model for Cloud Systems with a Probabilistic Suffix Tree.
Proceedings of the 2014 European Modelling Symposium, Pisa, Italy, October 21-23, 2014, 2014

A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013

2012
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

CIDS: A Framework for Intrusion Detection in Cloud Systems.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2010
Towards developing an Arabic word alignment annotation tool with some Arabic alignment guidelines.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

A study for access control flow analysis with a proposed job analyzer component based on stack inspection methodology.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

2009
A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...