Marianne Azer
Orcid: 0000-0002-8068-5120
  According to our database1,
  Marianne Azer
  authored at least 52 papers
  between 2006 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on nileu.edu.eg
On csauthors.net:
Bibliography
  2025
Enhancing Cryptocurrency Security: Leveraging Embeddings and Large Language Models for Creating Cryptocurrency Security Expert Systems.
    
  
    Symmetry, 2025
    
  
Unearthing the hidden path of MANET's nodes with signal strength measurements: Forensics challenges, survey and a novel approach for data collection, preservation and examination.
    
  
    Forensic Sci. Int. Digit. Investig., 2025
    
  
  2024
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs.
    
  
    Cryptogr., September, 2024
    
  
Empowering Pedestrian Safety: Unveiling a Lightweight Scheme for Improved Vehicle-Pedestrian Safety.
    
  
    Inf., March, 2024
    
  
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
    
  
    Cryptogr., March, 2024
    
  
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization.
    
  
    Inf., 2024
    
  
    Comput. Electr. Eng., 2024
    
  
    Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
    
  
  2023
    Comput. Electr. Eng., September, 2023
    
  
    Future Internet, July, 2023
    
  
    Algorithms, February, 2023
    
  
NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack.
    
  
    IEEE Access, 2023
    
  
  2022
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs.
    
  
    IEEE Trans. Cogn. Commun. Netw., 2022
    
  
    Ad Hoc Networks, 2022
    
  
    IEEE Access, 2022
    
  
Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks.
    
  
    IEEE Access, 2022
    
  
    Proceedings of the 4th Novel Intelligent and Leading Emerging Sciences Conference, 2022
    
  
  2021
    Proceedings of the International Conference on Communications, 2021
    
  
  2020
    Proceedings of the ICSIE 2020: 2020 9th International Conference on Software and Information Engineering, 2020
    
  
    Proceedings of the Ad Hoc Networks - 12th EAI International Conference, 2020
    
  
  2019
    Proceedings of the International Conference on Smart Applications, 2019
    
  
  2018
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks.
    
  
    Proceedings of the 2018 Wireless Days, 2018
    
  
    Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
    
  
Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments.
    
  
    Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
    
  
    Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
    
  
    Proceedings of the 3rd International Conference on System Reliability and Safety, 2018
    
  
    Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
    
  
  2017
    Int. J. Comput. Appl. Technol., 2017
    
  
  2016
    Proceedings of the 10th International Conference on Informatics and Systems, 2016
    
  
  2015
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks.
    
  
    Secur. Commun. Networks, 2015
    
  
  2014
    Proceedings of the 10th International Conference on Information Assurance and Security, 2014
    
  
  2013
    Proceedings of the Advances in Security of Information and Communication Networks, 2013
    
  
    Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
    
  
    Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
    
  
    Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
    
  
  2012
    Proceedings of the Seventh International Conference on Availability, 2012
    
  
    Proceedings of the Seventh International Conference on Availability, 2012
    
  
  2011
    Int. J. Emerg. Technol. Learn., 2011
    
  
    Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011
    
  
    Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
    
  
    Proceedings of the Sixth International Conference on Availability, 2011
    
  
  2010
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks.
    
  
    Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010
    
  
  2009
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
    
  
    CoRR, 2009
    
  
    Proceedings of the Third International Conference on Emerging Security Information, 2009
    
  
Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes.
  
    Proceedings of the SECRYPT 2009, 2009
    
  
  2008
    Proceedings of the The Third International Conference on Availability, 2008
    
  
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
    
  
    Proceedings of the The Third International Conference on Availability, 2008
    
  
  2007
    Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
    
  
    Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
    
  
  2006
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
  
    Proceedings of the SECRYPT 2006, 2006