Magdy S. El-Soudani

Orcid: 0000-0001-8259-7493

According to our database1, Magdy S. El-Soudani authored at least 23 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Adaptive Combined Channel-Network Coding for Cooperative Relay Aided Cognitive Radio Networks.
Inf., 2021

Interference Mitigation in D2D Communications for 5G Mobile Networks.
Proceedings of the 13th International Conference on Electronics, 2021

2020
Implementing a Deep Learning Model for Intrusion Detection on Apache Spark Platform.
IEEE Access, 2020

Hybrid FSO/mmWave based Fronthaul C-RAN Optimization for Future Wireless Communications.
Proceedings of the 29th Wireless and Optical Communications Conference, 2020

2019
Reliable FPGA-Based Network Architecture for Smart Cities.
Proceedings of the 31st International Conference on Microelectronics, 2019

2015
Energy detection of random arrival and departure of primary user signals in Cognitive Radio systems.
Proceedings of the IEEE EUROCON 2015, 2015

2012
Optimized spectrum sensing algorithms for cognitive LTE femtocells.
EURASIP J. Wirel. Commun. Netw., 2012

2010
An incremental redundancy short length LDPC codes based on random construction techniques.
Proceedings of the 17th International Conference on Telecommunications, 2010

Coarse spectrum sensing for LTE systems.
Proceedings of the 17th International Conference on Telecommunications, 2010

An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010

2009
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
CoRR, 2009

Security in Ad Hoc Networks: From Vulnerability to Risk Management.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes.
Proceedings of the SECRYPT 2009, 2009

Energy Balanced Model for Data Gathering in Wireless Sensor Networks with Fixed and Mobile Sinks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Lifetime Optimization in Hierarchical Wireless Sensor Networks.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

2008
A Survey on Trust and Reputation Schemes in Ad Hoc Networks.
Proceedings of the The Third International Conference on Availability, 2008

Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
Proceedings of the The Third International Conference on Availability, 2008

2007
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
Proceedings of the SECRYPT 2006, 2006

2004
Link Adaptation Based on Explicit Channel Estimation for Throughput Maximization Over Rayleigh Fading Channels.
Wirel. Pers. Commun., 2004

2003
Cooperative Defense Firewall Protocol.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Zero Knowledge Broadcasting Identification Scheme.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002


  Loading...