Hisham Alasmary

Orcid: 0000-0002-6482-3968

According to our database1, Hisham Alasmary authored at least 40 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing.
IEEE Trans. Mob. Comput., May, 2024

ScalableDigitalHealth (SDH): An IoT-Based Scalable Framework for Remote Patient Monitoring.
Sensors, February, 2024

SAAF-IoD: Secure and Anonymous Authentication Framework for the Internet of Drones.
IEEE Trans. Veh. Technol., January, 2024

Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization.
IEEE Trans. Computers, January, 2024

2023
Cyberattacks and Security of Cloud Computing: A Complete Guideline.
Symmetry, November, 2023

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things.
Internet Things, October, 2023

Deep convolutional cross-connected kernel mapping support vector machine based on SelectDropout.
Inf. Sci., May, 2023

Enhancing Localization Efficiency and Accuracy in Wireless Sensor Networks.
Sensors, March, 2023

LACP-SG: Lightweight Authentication Protocol for Smart Grids.
Sensors, February, 2023

Defense scheme against advanced persistent threats in mobile fog computing security.
Comput. Networks, February, 2023

Network load prediction and anomaly detection using ensemble learning in 5G cellular networks.
Comput. Commun., 2023

A Provable Secure and Efficient Authentication Framework for Smart Manufacturing Industry.
IEEE Access, 2023

2022
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022

<i>RouteChain</i>: Towards Blockchain-based secure and efficient BGP routing.
Comput. Networks, 2022

Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022

Analysis of Tree-Family Machine Learning Techniques for Risk Prediction in Software Requirements.
IEEE Access, 2022

A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing.
Proceedings of the International Conference on Computer, 2022

Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment.
Proceedings of the International Conference on Computer, 2022

2021
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021

Domain name system security and privacy: A contemporary survey.
Comput. Networks, 2021

2020
Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Domain Name System Security and Privacy: A Contemporary Survey.
CoRR, 2020

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR, 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019

Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

2018
QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018


  Loading...