Research Areas

Interdisciplinary Research Areas

● Network Security

● Software Security

● Mobile Security

● Data Mining/Data Analytics

● Computational Intelligence

Specialized Research Areas

● Wireless Sensor Networks (WSN) Security and Routing

● Android Security

● Intrusion Detection Systems

● Secure Multimedia protocols in Mobile Ad hoc NETwork (MANET)

Current Projects

Latest Products Image

Android Ontology

We provide a comprehensive analysis of the Android system including its permission systems to fully analyze it from vulnerability and security perspectives.

Latest Products Image

Secure V2X Communications

We propose secure V2X communications that aim to prevent, detect and even contain different cybersecurity attacks to ensure safe transportation systems in the future, resilience smart cities.

Latest Products Image

Secure/Lightweight Routing in WSN

We introduce lightweight security solutions to protect the routing services in Wireless Sensor Network (WSN) from different types of security attacks.

Latest Products Image

Intrusion Detection Systems in WSN

We conduct research to find the best match of data mining techniques to detect intrusion is Wirelss Sensor Network (WSN).

Latest Products Image

Broadcast Authentication in IoT Systems

We propose efficient authentication techniques/protocols to secure the broadcast communications in Internet of Things (IoT) – based systems.

Latest Products Image

Malware/Ransomware Detection Systems for Android Devices

We propose smart detection systems and risk scoring systems for Android malwares in general and ransomwares in specific.

Latest Products Image

Cybersecurity Maturity Models

We develop models that help organizations assess their cybersecurity maturity by measuring the compliance level for each security requirement.

Latest Products Image

Cryptography and Steganography Algorithms

We propose efficient cryptography algorithms to secure multimedia transmission over the Internet networks and communication systems. Also, we design cost-effective hiding algorithms to conceal malware and ransomware Apps within multimedia data for offensive cybersecurity applications.

Latest Products Image

AI/Data Mining Cybersecurity Applications

We develop smart AI tools and data mining techniques for malware and ransomware classification and recognition to minimize the risks and threats of cyber-attacks on personal data and organizations' resources.

Publications

Journals:

2023

Recurrent neural networks for enhanced joint channel estimation and interference cancellation in FBMC and OFDM systems: unveiling the potential for 5G networks

Rasha M. Al-Makhlasawy, Mayada Khairy, Walid El-Shafai

EURASIP Journal on Advances in Signal Processing volume 2023, Article number: 120 (2023), DOI:https://doi.org/10.1186/s13634-023-01077-0

ISI: Q3, Scopus: Q2


Machine Learning-Based Rainfall Prediction: Unveiling Insights and Forecasting for Improved Preparedness

Md. Mehedi Hassan, Mohammad Abu Taraq Rony, Md. Asif Rakib Khan, Md. Mahedi Hassan, Farhana Yasmin, Anindya Nag, Tazria Helal Zarin, Anupam Kumar Bairagi, Samah Alshathri, Walid El-Shafai

IEEE Access, DOI:https://doi.org/10.1109/ACCESS.2023.3333876

ISI: Q2, Scopus: Q1


Efficient implementation of image fusion and interpolation for brain tumor diagnosis

Randa Aly, Noha A. El-Hag, Walid El-Shafai, Taha E. Taha, Fathi E. Abd El-Samie, Fatma G. Hashad

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01159-0

ISI: Q3, Scopus: Q3


Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment

Firas Abedi, Hayder M. A. Ghanimi, Abeer D. Algarni, Naglaa F. Soliman, Walid El-Shafai, Ali Hashim Abbas, Zahraa H. Kareem, Hussein Muhi Hariz, Ahmed Alkhayyat

Computer Systems Science and Engineering 2023, 47(3), 3127-3144, DOI:https://doi.org/10.32604/csse.2023.038959

ISI: Q3, Scopus: Q3


Chimp Optimization Algorithm Based Feature Selection with Machine Learning for Medical Data Classification

Firas Abedi, Hayder M. A. Ghanimi, Abeer D. Algarni, Naglaa F. Soliman, Walid El-Shafai, Ali Hashim Abbas, Zahraa H. Kareem, Hussein Muhi Hariz, Ahmed Alkhayyat

Computer Systems Science and Engineering 2023, 47(3), 2791-2814, DOI:https://doi.org/10.32604/csse.2023.038762

ISI: Q3, Scopus: Q3


Traditional and deep-learning-based denoising methods for medical images

Walid El-Shafai, Samy Abd El-Nabi, Anas M. Ali, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

Multimed Tools Appl (2023), DOI:https://doi.org/10.1007/s11042-023-14328-x

ISI: Q2, Scopus: Q1


Quad-port MIMO antenna with high isolation characteristics for sub 6-GHz 5G NR communication

Trushit Upadhyaya, Vishal Sorathiya, Samah Al-shathri, Walid El-Shafai, Upesh Patel, Killol Vishnuprasad Pandya, Ammar Armghan

Scientific Reports volume 13, Article number: 19088 (2023), DOI:https://doi.org/10.1038/s41598-023-46413-4

ISI: Q2, Scopus: Q1


Developing and optimizing a new cogeneration cycle to produce hydrogen from seawater

Tao Hai, Vishal Goyal, Saman Aminian, Hamad Almujibah, Ta Van Thuong, Naglaa F. Soliman, Walid El-Shafai

Process Safety and Environmental Protection, 2023, ISSN 0957-5820, DOI:https://doi.org/10.1016/j.psep.2023.11.005

ISI: Q1, Scopus: Q1


Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection

Mostafa Nassar, Anas M. Ali, Walid El-Shafai, Adel Saleeb, Fathi E. Abd El-Samie, Naglaa F. Soliman, Hussah Nasser AlEisa, Hossam Eldin H. Ahmed

Computer Systems Science and Engineering, vol. 45, no.2, pp. 2235–2247, 2023, DOI:https://doi.org/10.32604/csse.2023.032156

ISI: Q1, Scopus: Q3


Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

Iman Almomani, Walid El-Shafai, Aala AlKhayer, Albandari Alsumayt, Sumayh S. Aljameel, Khalid Alissa

Computers, Materials & Continua, vol. 74, no.2, pp. 3515–3537, 2023., DOI:https://doi.org/10.32604/cmc.2023.033765

ISI: Q2, Scopus: Q2


An Efficient Medical Image Deep Fusion Model Based on Convolutional Neural Networks

Walid El-Shafai, Noha A. El-Hag, Ahmed Sedik, Ghada Elbanby, Fathi E. Abd El-Samie, Naglaa F. Soliman, Hussah Nasser AlEisa, Mohammed E. Abdel Samea

Computers, Materials & Continua, vol. 74, no.2, pp. 2905–2925, 2023., DOI:https://doi.org/10.32604/cmc.2023.031936

ISI: Q2, Scopus: Q2


An efficient watermarking algorithm for digital audio data in security applications

Mohamed Yamni, Achraf Daoui, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Saad motahhir, Ouazzani Jamil, Walid El-Shafai, Abeer D. Algarni, Naglaa F. Soliman, Moustafa H. Aly

Scientific Reports volume 13, Article number: 18432 (2023), DOI:https://doi.org/10.1038/s41598-023-45619-w

ISI: Q2, Scopus: Q1


Object Detection from Enhanced IR Images Based on Preprocessing and Cumulative Histogram Estimation for Tracking and Gait Recognition Applications

Aya M. Gamal, Huda I. Ashiba, Ghada M. El-Banby, Walid El-Shafai, Naglaa F. Soliman, Abeer D. Algarni, Mohamad R. Abdel-Rahman, Saeed A. Aldosari, Adel S. El-Fishawy, Nabil A. Ismail, Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01234-6

ISI: Q3, Scopus: Q3


Designing g-C3N4/ZnCo2O4 nanocoposite as a promising photocatalyst for photodegradation of MB under visible-light excitation: Response surface methodology (RSM) optimization and modeling

Tao Hai, Rishabh Chaturvedi, Loghman Mostafa, Teeba Ismail Kh, Naglaa F. Soliman, Walid El-Shafai

Journal of Physics and Chemistry of Solids, 2023, 111747, ISSN 0022-3697, DOI:https://doi.org/10.1016/j.jpcs.2023.111747

ISI: Q2, Scopus: Q2


Efficient implementation of double random phase encoding and empirical mode decomposition for cancelable biometrics

Gerges M. Salama, Walid El-Shafai, Safaa El-Gazar, Basma Omar, A. A. Hassan, Aziza I. Hussein, Fathi E. Abd El-Samie

Optical and Quantum Electronics volume 55, Article number: 1210 (2023, DOI:https://doi.org/10.1007/s11082-023-05005-2

ISI: Q2, Scopus: Q2


Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem

Lamiaa A. Abou Elazm, Walid El-Shafai, Sameh Ibrahim, Mohamed G. Egila, H. Shawkey, Mohamed K. H. Elsaid, Naglaa F. Soliman, Hussah Nasser AlEisa, Fathi E. Abd El-Samie

Intelligent Automation & Soft Computing 2023, 36(1), 929-955, DOI:https://doi.org/10.32604/iasc.2023.031386

ISI: Q2, Scopus: Q3


Proposed Privacy Preservation Technique for Color Medical Images

Walid El-Shafai, Hayam A. Abd El-Hameed, Noha A. El-Hag, Ashraf A. M. Khalaf, Naglaa F. Soliman, Hussah Nasser AlEisa, Fathi E. Abd El-Samie

Intelligent Automation & Soft Computing 2023, 36(1), 719-732, DOI:https://doi.org/10.32604/iasc.2023.031079

ISI: Q2, Scopus: Q3


Improved efficiency in an integrated geothermal power system including fresh water unit: Exergoeconomic analysis and dual-objective optimization

Tao Hai, Amit Kumar, Saman Aminian, Basim Al-Qargholi, Naglaa F. Soliman, Walid El-Shafai

Process Safety and Environmental Protection Journal, DOI:https://doi.org/10.1016/j.psep.2023.09.060

ISI: Q1, Scopus: Q1


MTD-DHJS: Makespan-Optimized Task Scheduling Algorithm for Cloud Computing with Dynamic Computational Time Prediction

Pallab Banerjee, Sharmistha Roy, Anurag Sinha, Md. Mehedi Hassan, Shrikant Burje, Anupam Agrawal, Anupam Kumar Bairagi, Samah Alshathri, Walid El-Shafai

IEEE Access, DOI:https://doi.org/10.1109/ACCESS.2023.3318553

ISI: Q2, Scopus: Q1


A Hybrid Compressive Sensing and Classification Approach for Dynamic Storage Management of Vital Biomedical Signals

Heba M. Emara, Walid El-Shafai, Abeer D. Algarni, Naglaa F. Soliman, Fathi E. Abd El-Samie

IEEE Access, DOI:10.1109/ACCESS.2023.3317241

ISI: Q2, Scopus: Q1


Green Certificate-Driven Photovoltaic Promotion in Distribution Networks Hosting Hydrogen Fueling Stations for Future Sustainable Transportation: A Risk-Adjusted Dominance Analysis

Xiaoqiang GUO, Xiao LI, F. Adil Hussein Mohammed, Farhan A. Alenizi, Kasim Kadhim Alasedi, Karrar Shareef Mohsen, Ali Alsaalamy, Walid El-Shafai, et al.

Sustainable Cities and Society, Volume 99, 2023, 104911, ISSN 2210-6707, DOI:https://doi.org/10.1016/j.scs.2023.104911

ISI: Q1, Scopus: Q1


Single image super-resolution approaches in medical images based-deep learning: a survey

Walid El-Shafai, Anas M. Ali, Samy Abd El-Nabi, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-16197-w

ISI: Q2, Scopus: Q1


Automated diagnosis of EEG abnormalities with different classification techniques

Essam Abdellatef, Heba M. Emara, Mohamed R. Shoaib, Fatma E. Ibrahim, Mohamed Elwekeil, Walid El-Shafai, et al.

Medical & Biological Engineering & Computing (2023), DOI:https://doi.org/10.1007/s11517-023-02843-w

ISI: Q2, Scopus: Q2


A robust cancellable face and palmprint recognition system based on 3D optical chaos-DNA cryptosystem

Haidy A. Ali Eldawy, Walid El-Shafai, Ezz El-Din Hemdan, Ghada M. El-Banby, Fathi E. Abd El-Samie

Optical and Quantum Electronics volume 55, Article number: 970 (2023) , DOI:https://doi.org/10.1007/s11082-023-04840-7

ISI: Q2, Scopus: Q2


Deep learning-based hair removal for improved diagnostics of skin diseases

Walid El-Shafai, Ibrahim Abd El-Fattah, Taha E. Taha

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-16646-6

ISI: Q2, Scopus: Q1


Video quality enhancement using different enhancement and dehazing techniques

Abeer Ayoub, Ensherah A. Naeem, Walid El-Shafai, Fathi E. Abd El-Samie, Ehab K. I. Hamad, El-Sayed M. El-Rabaie

Journal of Ambient Intelligence and Humanized Computing (2023), DOI:https://doi.org/10.1007/s12652-023-04642-5

ISI: Q2, Scopus: Q1


Enhancing security and capacity in FSO transmission for next-generation networks using OFDM/OCDMA-based ICSM codes

Somia A. Abd El-Mottaleb, Mehtab Singh, Samah Alshathri, Walid El-Shafai, Moustafa H. Aly

Sec. Optics and Photonics Volume 11 - 2023, DOI:https://doi.org/10.3389/fphy.2023.1231025

ISI: Q2, Scopus: Q2


Efficient color image enhancement using piecewise linear transformation and gamma correction

Hagar Ibrahim, Abd El-Naser A. Mohamed, Reda Ammar, Noha A. El-Hag, Atef Abou-Elazm, Fathi E. Abd El-Samie, Walid El-Shafai, Amir Elsafrawey

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01171-4

ISI: Q3, Scopus: Q3


Optical Ciphering Scheme for Cancellable Speaker Identification System

Walid El-Shafai, Marwa A. Elsayed, Mohsen A. Rashwan, Moawad I. Dessouky, Adel S. El-Fishawy, Naglaa F. Soliman, Amel A. Alhussan, Fathi E. Abd El-Samie

Computer Systems Science and Engineering, vol. 45, no.1, pp. 563–578, 2023, DOI:10.32604/csse.2023.024375

ISI: Q1, Scopus: Q3


Comprehensive performance analysis of different medical image fusion techniques for accurate healthcare diagnosis applications

C. Ghandour, Walid El-Shafai, S. El-Rabaie, Nariman Abdelsalam

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-16334-5

ISI: Q2, Scopus: Q1


Video quality enhancement using dual-transmission-map dehazing

Abeer Ayoub, Ensherah A. Naeem, Walid El-Shafai, Fathi E. Abd El-Samie, Ehab K. I. Hamad & El-Sayed M. EL-Rabaie

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-15937-2

ISI: Q2, Scopus: Q1


Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

Musheer Ahmad, Reem Ibrahim Alkanhel, Naglaa F. Soliman, Abeer D. Algarni, Fathi E. Abd El-Samie, Walid El-Shafai

Computer Systems Science and Engineering 2023, 47(2), 2361-2380, DOI:https://doi.org/10.32604/csse.2023.038439

ISI: Q1, Scopus: Q3


A Proposed Deep-Learning-Based Framework for Medical Image Communication, Storage and Diagnosis

Mostafa Ebied, F. A. Elmisery, Noha A. El-Hag, Ahmed Sedik, Walid El-Shafai, et al.

Wireless Personal Communications (2023), DOI:https://doi.org/10.1007/s11277-022-09931-4

ISI: Q3, Scopus: Q2


CNN framework for optical image super-resolution and fusion

Walid El-Shafai, Randa Aly, Taha E. Taha, Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01122-z

ISI: Q3, Scopus: Q3


Efficient implementation of cancelable face recognition based on elliptic curve cryptography

Rania A. Eltaieb, Ghada M. El-Banby, Walid El-Shafai, Fathi E. Abd El-Samie, Alaa M. Abbas

Optical and Quantum Electronics volume 55, Article number: 841 (2023), DOI:https://doi.org/10.1007/s11082-023-04641-y

ISI: Q2, Scopus: Q2


An improved hybrid framework for brain tumor detection

Fatma M. Ghamry, Walid El-Shafai, Noha A. El-Hag, Ghada M. El-Banby, Adel S. El-Fishawy, Ashraf A. M. Khalaf, Fathi E. Abd El-Samie, Naglaa F. Soliman, Moawad I. Dessouky

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01114-z

ISI: Q3, Scopus: Q3


Cancelable template generation based on quantization concepts

Rana M. Nassar, Ashraf A. M. Khalaf, Ghada M. El-Banby, Fathi E. Abd El-Samie, Aziza I. Hussein, Walid El-Shafai

Opto-Electronics Review, DOI:10.24425/opelre.2023.145940

ISI: Q3, Scopus: Q3


Machine learning and deep learning techniques for driver fatigue and drowsiness detection: a review

Samy Abd El-Nabi, Walid El-Shafai, El-Sayed M. El-Rabaie, Khalil F. Ramadan, Fathi E. Abd El-Samie, Saeed Mohsen

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-15054-0

ISI: Q2, Scopus: Q1


A hybrid medical image cryptosystem based on 4D-hyperchaotic S-boxes and logistic maps

Sara M. Ahmed, Hassan M.A.Elkamchouchi, Adel Elfahar, Walid El-Shafai & Amira G. Mohamed

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-15925-6

ISI: Q2, Scopus: Q1


Integrating Digital Twins with IoT-Based Blockchain: Concept, Architecture, Challenges, and Future Scope

Ezz El-Din Hemdan, Walid El-Shafai, Amged Sayed

Wireless Personal Communications (2023), DOI:https://doi.org/10.1007/s11277-023-10538-6

ISI: Q3, Scopus: Q2


Statistical Time Series Forecasting Models for Pandemic Prediction

Ahmed ElShafee, Walid El-Shafai, Abeer D. Algarni, Naglaa F. Soliman, Moustafa H. Aly

Computer Systems Science and Engineering 2023, 47(1), 349-374, DOI:https://doi.org/10.32604/csse.2023.037408

ISI: Q1, Scopus: Q3


Applying medical image fusion based on a simple deep learning principal component analysis network

C. Ghandour, Walid El-Shafai, El-Sayed M. El-Rabaie, E. A. Elshazly

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-15856-2

ISI: Q2, Scopus: Q1


A comprehensive taxonomy on multimedia video forgery detection techniques: challenges and novel trends

Walid El-Shafai, Mona A. Fouda, El-Sayed M. El-Rabaie, Nariman Abd El-Salam

Multimedia Tools and Applications (2023), DOI:https://doi.org/10.1007/s11042-023-15609-1

ISI: Q2, Scopus: Q1


Efficient Multiclass Classification Using Feature Selection in High-Dimensional Datasets

Ankur Kumar, Avinash Kaur, Parminder Singh, Maha Driss, Wadii Boulila

Electronics 2023, 12(10), 2290, DOI:https://doi.org/10.3390/electronics12102290

ISI: Q2, Scopus: Q2


Risk-Based Cybersecurity Compliance Assessment System (RC2AS)

Afnan Alfaadhel, Iman Almomani, Mohanned Ahmed

Applied Sciences 2023, 13(10), 6145, DOI:https://doi.org/10.3390/app13106145

ISI: Q2, Scopus: Q2


An Evidence Theory Based Embedding Model for the Management of Smart Water Environments

Maha Driss, Wadii Boulila, Haithem Mezni, Mokhtar Sellami, Safa Ben Atitallah, Nouf Alharbi

Sensors 2023, 23(10), 4672, DOI:https://doi.org/10.3390/s23104672

ISI: Q2, Scopus: Q1


Efficient frameworks for statistical seizure detection and prediction

Ali Ahmed Khalil, Mostafa I. El Sayeid, Fatma E. Ibrahim, Ashraf A. M. Khalaf, Entessar Gemeay, Hossam Kasem, Salah Eldeen A. Khamis, Ghada M. El-Banby, Walid El-Shafai, et al.

The Journal of Supercomputing (2023), DOI:https://doi.org/10.1007/s11227-022-05030-0

ISI: Q2, Scopus: Q2


E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches

Iman Almomani, Aala Alkhayer, Walid El-Shafai

Sensors 2023, 23(9), 4467, DOI:https://doi.org/10.3390/s23094467

ISI: Q2, Scopus: Q1


TESR: Two-Stage Approach for Enhancement and Super-Resolution of Remote Sensing Images

Anas M. Ali, Bilel Benjdira, Anis Koubaa, Wadii Boulila, Walid El-Shafai

Remote Sens. 2023, 15(9), 2346, DOI: https://doi.org/10.3390/rs15092346

ISI: Q1, Scopus: Q1


Impact of Fireworks Industry Safety Measures and Prevention Management System on Human Error Mitigation Using a Machine Learning Approach

Indumathi Nallathambi, Padmaja Savaram, Sudhakar Sengan, Meshal Alharbi, Samah Alshathri, Mohit Bajaj, Moustafa H. Aly, Walid El-Shafai

Sensors 2023, 23(9), 4365, DOI:https://doi.org/10.3390/s23094365

ISI: Q2, Scopus: Q1


Efficient iterative implementation of regularized solutions for image and signal reconstruction problems

Marwa A. Elsayed, Walid El-Shafai, Mohsen A. Rashwan, Moawad I. Dessouky, Adel S. El-Fishawy, Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01179-w

ISI: Q3 , Scopus: Q3


Simultaneous compressed sensing and single-image super resolution for SAR image reconstruction

Alaa M. El-Ashkar, Taha El Sayed Taha, Adel S. El-Fishawy, Mohammed Abd-Elnaby, Fathi E. Abd El-Samie, Walid El-Shafai

Optical and Quantum Electronics volume 55, Article number: 544 (2023), DOI:https://doi.org/10.1007/s11082-022-04407-y

ISI: Q2, Scopus: Q2


Efficient information hiding in medical optical images based on piecewise linear chaotic maps

Marwa A. Nasr, Walid El-Shafai, Nariman Abdel-Salam, El-Sayed M. El-Rabaie, Adel S. El-Fishawy, Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01128-7

ISI: Q3, Scopus: Q3


A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

Walid El-Shafai, Fatma Khallaf, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Iman Almomani

Computer Systems Science and Engineering 2023, 46(3), 3599-3618, DOI:https://doi.org/10.32604/csse.2023.037655

ISI: Q1, Scopus: Q3


Simultaneous Super-Resolution and Classification of Lung Disease Scans

Heba M. Emara, Mohamed R. Shoaib, Walid El-Shafai, Mohamed Elwekeil, Ezz El-Din Hemdan, Mostafa M. Fouda,Taha E. Taha, Adel S. El-Fishawy, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

Diagnostics 2023, 13(7), 1319, DOI:https://doi.org/10.3390/diagnostics13071319

ISI: Q2, Scopus: Q2


Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking

Amjad Hussain Zahid, Muhammad Junaid Arshad, Musheer Ahmad, Naglaa F. Soliman, Walid El-Shafai

Computers, Materials & Continua 2023, 75(2), 3011-3026, DOI:https://doi.org/10.32604/cmc.2023.037516

ISI: Q2, Scopus: Q2


COVID-19 Classification from X-Ray Images: An Approach to Implement Federated Learning on Decentralized Dataset

Ali Akbar Siddique, S. M. Umar Talha, M. Aamir, Abeer D. Algarni, Naglaa F. Soliman, Walid El-Shafai

Computers, Materials & Continua 2023, 75(2), 3883-3901, DOI:https://doi.org/10.32604/cmc.2023.037413

ISI: Q2, Scopus: Q2


Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset

Youssef F. Sallam, Samy Abd El-Nabi, Walid El-Shafai, Hossam El-din H. Ahmed, Adel Saleeb, Nirmeen A. El-Bahnasawy, Fathi E. Abd El-Samie

Security and Privacy. 2023; 6(5):e300, DOI:https://doi.org/10.1002/spy2.300

ISI: Q3, Scopus: Q3


Efficient algorithms for compression and classification of brain tumor images

Fatma M. Ghamry, Heba M. Emara, Ahmed Hagag, Walid El-Shafai, Ghada M. El-Banby, Moawad I. Dessouky, Adel S. El-Fishawy, Noha A. El-Hag, Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-022-01040-6

ISI: Q3, Scopus: Q3


Deep-learning-based super-resolution and classification framework for skin disease detection applications

Ibrahim Abd El-Fattah, Anas M. Ali, Walid El-Shafai, Taha E. Taha, Fathi E. Abd El-Samie

Optical and Quantum Electronics volume 55, Article number: 427 (2023), DOI:https://doi.org/10.1007/s11082-022-04432-x

ISI: Q2, Scopus: Q2


Soft Computing in Smart Grid with Decentralized Generation and Renewable Energy Storage System Planning

Rasheed Abdulkader, Hayder M. A. Ghanimi, Pankaj Dadheech, Meshal Alharbi, Walid El-Shafai, Mostafa M. Fouda, Moustafa H. Aly, Dhivya Swaminathan, Sudhakar Sengan

Energies 2023, 16(6), 2655, DOI:https://doi.org/10.3390/en16062655

ISI: Q2, Scopus: Q1


PoxNet22: A Fine-Tuned Model for the Classification of Monkeypox Disease Using Transfer Learning

Farhana Yasmin, Mehedi Hassan, Mahade Hasan, Sadika Zaman, Chetna Kaushal, Walid El-Shafai, Naglaa F. Soliman

IEEE Access, vol. 11, pp. 24053-24076, 2023, DOI:https://doi.org/10.1109/ACCESS.2023.3253868

ISI: Q2, Scopus: Q1


Improving traditional method used for medical image fusion by deep learning approach-based convolution neural network

Walid El-Shafai, C. Ghandour, S. El-Rabaie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01123-y

ISI: Q3, Scopus: Q3


A Novel Design of Spike-Shaped Miniaturized 4 × 4 MIMO Antenna for Wireless UWB Network Applications Using Characteristic Mode Analysis

Ankireddy Chandra Suresh, Thatiparthi Sreenivasulu Reddy, Boddapati Taraka Phani Madhav, Samah Alshathri, Walid El-Shafai, Sudipta Das, Vishal Sorathiya

Micromachines 2023, 14(3), 612, DOI:https://doi.org/10.3390/mi14030612

ISI: Q2, Scopus: Q2


CNN: a tool to fuse multi-modality medical images

Walid El-Shafai, Randa Aly, Taha El-Sayed Taha, Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01092-2

ISI: Q3, Scopus: Q3


Hybrid Multilevel Thresholding Image Segmentation Approach for Brain MRI

Suvita Rani Sharma, Samah Alshathri, Birmohan Singh, Manpreet Kaur, Reham R. Mostafa, Walid El-Shafai

Diagnostics 2023, 13(5), 925, DOI:https://doi.org/10.3390/diagnostics13050925

ISI: Q2, Scopus: Q2


Efficient Framework for Video Communication in IoT Applications

Walid El-Shafai, Amany Daosh, Nehad Haggag, et al.

Wireless Personal Communications volume 129, pages1–35 (2023), DOI:https://doi.org/10.1007/s11277-022-09491-7

ISI: Q3, Scopus: Q2


Vision Transformers in Image Restoration: A Survey

Anas M. Ali, Bilel Benjdira, Anis Koubaa, Walid El-Shafai, Zahid Khan, Wadii Boulila

Sensors 2023, 23(5), 2385, DOI:https://doi.org/10.3390/s23052385

ISI: Q2, Scopus: Q1


Digitization of healthcare sector: A study on privacy and security concerns

Metty Paul, Leandros Maglaras, Mohamed Amine Ferrag, Iman AlMomani

ICT Express, 2023, ISSN 2405-9595, DOI:https://doi.org/10.1016/j.icte.2023.02.007

ISI: Q2, Scopus: Q1


Modulation format recognition using CNN-based transfer learning models

Safie El-Din Nasr Mohamed, Bidaa Mortada, Anas M. Ali, Walid El-Shafai, Ashraf A. M. Khalaf, O. Zahran, Moawad I. Dessouky, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

Optical and Quantum Electronics volume 55, Article number: 343 (2023), DOI:https://doi.org/10.1007/s11082-022-04454-5

ISI: Q2, Scopus: Q2


Studies of Performance of Cs2TiI6−XBrX (Where x = 0 to 6)-Based Mixed Halide Perovskite Solar Cell with CdS Electron Transport Layer

Kunal Chakraborty, Nageswara Rao Medikondu, Kumutha Duraisamy, Naglaa F. Soliman, Walid El-Shafai, Sunil Lavadiya, Samrat Paul, Sudipta Das

Micromachines 2023, 14(2), 447, DOI:https://doi.org/10.3390/mi14020447

ISI: Q2, Scopus: Q2


Fan-beam projection based modulation classification for optical systems with phase noise effect

Bidaa Mortada, Walid El-Shafai, O. Zahran, El-Sayed M. El-Rabaie & Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-023-01112-1

ISI: Q3, Scopus: Q3


Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications

Samah Alshathri, Ezz El-Din Hemdan, Walid El-Shafai, Amged Sayed

Computers, Materials & Continua, vol. 75, no.1, pp. 183–196, 2023, DOI:https://doi.org/10.32604/cmc.2023.034048

ISI: Q2, Scopus: Q2


A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services

Fatma Khallaf, Walid El Shafai, El Sayed M. El Rabaie, Naglaa F. Soliman, Fathi E. Abd El Samie

Frontiers of Information Technology & Electronic Engineering Journal, DOI:10.1631/FITEE.2200372

ISI: Q2, Scopus: Q2


Image Retrieval using Convolutional Autoencoder, InfoGAN, and Vision Transformer Unsupervised Models

Eman S. Sabry, Salah Elagooz, Fathi E. Abd El-Samie, Walid El-Shafai, Nirmeen A. El-Bahnasawy, Ghada El Banby, Abeer D. Algarni, Naglaa F. Soliman, Rabie A. Ramadan

IEEE Access, DOI:https://doi.org/10.1109/ACCESS.2023.3241858

ISI: Q2, Scopus: Q1


Secure biometric systems based on bio-signals and DNA encryption of optical spectrograms

Gerges M. Salama, Basma Omar, Walid El-Shafai, Ghada M. El-Banby, Hesham F. A. Hamed, Safaa El-Gazar, Naglaa F. Soliman, Fathi E. Abd El-Samie

Optics Express 31, 3927-3944 (2023), DOI:https://doi.org/10.1364/OE.478215

ISI: Q2, Scopus: Q1


Medical image enhancement algorithms using deep learning-based convolutional neural network

C. Ghandour, Walid El-Shafai, S. El-Rabaie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-022-01078-6

ISI: Q3, Scopus: Q3


Base Station MIMO Antenna in 1 × 6 Array Configurations with Reflector Design for Sub-6 GHz 5G Applications

Mohd. Wasim, Shelej Khera, Praveen Kumar Malik, Samudrala Vara Kumari, Sudipta Das, Walid El-Shafai, Moustafa H. Aly

Electronics 2023, 12(3), 669, DOI:https://doi.org/10.3390/electronics12030669

ISI: Q3, Scopus: Q2


Hyperspectral Images-Based Crop Classification Scheme for Agricultural Remote Sensing

Imran Ali, Zohaib Mushtaq, Saad Arif, Abeer D. Algarni, Naglaa F. Soliman, Walid El-Shafai

Computer Systems Science and Engineering, vol. 46, no.1, pp. 303–319, 2023, DOI:https://doi.org/10.32604/csse.2023.034374

ISI: Q1, Scopus: Q3


An Immutable Framework for Smart Healthcare Using Blockchain Technology

Faneela, Muazzam A. Khan, Suliman A. Alsuhibany, Walid El-Shafai, Mujeeb Ur Rehman, Jawad Ahmad

Computer Systems Science and Engineering, vol. 46, no.1, pp. 165–179, 2023, DOI:https://doi.org/10.32604/csse.2023.035066

ISI: Q1, Scopus: Q3


An Efficient Intrusion Detection Framework for Industrial Internet of Things Security

Samah Alshathri, Ayman El-Sayed, Walid El-Shafai, Ezz El-Din Hemdan

Computer Systems Science and Engineering, vol. 46, no.1, pp. 819–834, 2023, DOI:https://doi.org/10.32604/csse.2023.034095

ISI: Q1, Scopus: Q3


A Metamodeling Approach for IoT Forensic Investigation

Muhammed Saleh, Siti Hajar Othman, Maha Driss, Arafat Al-dhaqm, Abdulalem Ali, Wael MS Yafooz, Abdel-Hamid M Emara

Electronics 2023, 12(3), 524, DOI:https://doi.org/10.3390/electronics12030524

ISI: Q2, Scopus: Q2


Efficient classification of different medical image multimodalities based on simple CNN architecture and augmentation algorithms

Walid El-Shafai, Amira A. Mahmoud, Anas M. Ali, El-Sayed M. El-Rabaie, Taha E. Taha, Adel S. El-Fishawy, Osama Zahran & Fathi E. Abd El-Samie

Journal of Optics (2023), DOI:https://doi.org/10.1007/s12596-022-01089-3

ISI: Q3, Scopus: Q3


A Novel Integrated UWB Sensing and 8-Element MIMO Communication Cognitive Radio Antenna System

D Srikar, Anveshkumar Nella, Ranjith Mamidi, Ashok Babu, Sudipta Das, Sunil Lavadiya, Abeer D. Algarni, Walid El-Shafai

Electronics 2023, 12(2), 330, DOI:https://doi.org/10.3390/electronics12020330

ISI: Q3, Scopus: Q2


Efficient secure optical DWT-based watermarked 3D video transmission over MC-CDMA wireless channel

E. M. El-Bakary, Walid El-Shafai, S. El-Rabaie, O. Zahran, M. El-Halawany, F. E. Abd El-Samie

J Opt (2023), DOI:https://doi.org/10.1007/s12596-022-01067-9

ISI: Q3, Scopus: Q3


Performance evaluation of an encrypted color image transmission over wireless network with different chaotic-based techniques

Ahmed Naguib, Walid El‑Shafai, Mona Shokair

J Opt (2023), DOI:https://doi.org/10.1007/s12596-023-01093-1

ISI: Q3, Scopus: Q3


Deep Transfer Learning Based Parkinson’s Disease Detection Using Optimized Feature Selection

Sura Mahmood Abdullah, Thekra Abbas, Munzir Hubiba Bashir, Ishfaq Ahmad Khaja, Musheer Ahmad, Naglaa F. Soliman, Walid El-Shafai

IEEE Access, DOI:10.1109/ACCESS.2023.3233969

ISI: Q2, Scopus: Q1


2022

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

Iman Almomani, Mohanned Ahmed, Dimitrios Kosmanos, Aala Alkhayer, Leandros Maglaras

IEEE Access, vol. 10, pp. 131640-131655, 2022, DOI:10.1109/ACCESS.2022.3229623

ISI: Q2, Scopus: Q1


Privacy-Preserving Mobility Model and Optimization-Based Advanced Cluster Head Selection (P2O-ACH) for Vehicular Ad Hoc Networks

Nejood Faisal Abdulsattar, Dheyaa Abdulameer Mohammed, Ahmed Alkhayyat, Shemaha Z. Hamed, Hussein Muhi Hariz, Ali S. Abosinnee, Ali Hashim Abbas, Mustafa Hamid Hassan, Mohammed Ahmed Jubair, Fatima Hashim Abbas, Abeer D. Algarni, Naglaa F. Soliman, and Walid El-Shafai

Electronics 2022, 11(24), 4163, DOI:https://doi.org/10.3390/electronics11244163

ISI: Q3, Scopus: Q2


Application of relative total variation optical decomposition fusion method on medical images

C. Ghandour, Walid El-Shafai & S. El-Rabaie

Journal of Optics (2022), DOI:https://doi.org/10.1007/s12596-022-01032-6

ISI: Q3, Scopus: Q3


A Novel Dynamic Bit Rate Analysis Technique for Adaptive Video Streaming over HTTP Support

Ponnai Manogaran Ashok Kumar, Lakshmi Narayanan Arun Raj, B. Jyothi, Naglaa F. Soliman, Mohit Bajaj and Walid El-Shafai

Sensors 2022, 22(23), 9307, DOI:https://doi.org/10.3390/s22239307

ISI: Q2, Scopus: Q1


Investigations on Stub-Based UWB-MIMO Antennas to Enhance Isolation Using Characteristic Mode Analysis

Ankireddy Chandra Suresh, Thatiparthi Sreenivasulu Reddy, Boddapati Taraka Phani Madhav, Sudipta Das, Sunil Lavadiya, Abeer D. Algarni and Walid El-Shafai

Micromachines 2022, 13(12), 2088, DOI:https://doi.org/10.3390/mi13122088

ISI: Q2, Scopus: Q2


Modernized Planning of Smart Grid Based on Distributed Power Generations and Energy Storage Systems Using Soft Computing Methods

Arul Rajagopalan, Dhivya Swaminathan, Meshal Alharbi, Sudhakar Sengan, Oscar Danilo Montoya, Walid El-Shafai, Mostafa M. Fouda and Moustafa H. Aly

Energies 2022, 15(23), 8889, DOI:https://doi.org/10.3390/en15238889

ISI: Q2, Scopus: Q1


Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) Applications

Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa,Saad Motahhir, Ouazzani Jamil, Walid El-Shafai, Abeer D. Algarni, Naglaa F. Soliman and Moustafa H. Aly

Electronics 11, no. 23: 3867, DOI:https://doi.org/10.3390/electronics11233867

ISI: Q3, Scopus: Q2


Sketch-Based Retrieval Approach Using Artificial Intelligence Algorithms for Deep Vision Feature Extraction

Eman S. Sabry, Salah Elagooz, Fathi E. Abd El-Samie, Walid El-Shafai, Nirmeen A. El-Bahnasawy, Ghada El-Banby, Naglaa F. Soliman, Sudhakar Sengan and Rabie A. Ramadan

Axioms. 2022; 11(12):663, DOI:https://doi.org/10.3390/axioms11120663

ISI: Q2, Scopus: Q3


An optical-based encryption and authentication algorithm for color and grayscale medical images

Walid El-Shafai, Iman Almomani, Anees Ara and Aala Alkhayer

Multimed Tools Appl (2022), DOI:https://doi.org/10.1007/s11042-022-14093-3

ISI: Q2, Scopus: Q1


Intrusion Detection Systems for the Internet of Thing: A Survey Study

Heba A. Hassan, Ezz E. Hemdan, Walid El-Shafai, Mona Shokair, Fathi E. Abd El-Samie

Wireless Pers Commun (2022), DOI:https://doi.org/10.1007/s11277-022-10069-6

ISI: Q3, Scopus: Q2


Bio-Inspired Dynamic Trust and Congestion-Aware Zone-Based Secured Internet of Drone Things (SIoDT)

Yousif Sufyan Jghef, Mohammed Jasim Mohammed Jasim, Hayder M. A. Ghanimi, Abeer D. Algarni, Naglaa F. Soliman,Walid El-Shafai, Subhi R. M. Zeebaree, Ahmed Alkhayyat, Ali S. Abosinnee, Nejood Faisal Abdulsattar, Ali Hashim Abbas, Hussein Muhi Hariz, and Fatima Hashim Abbas

Drones 2022, 6(11), 337, DOI:https://doi.org/10.3390/drones6110337

ISI: Q2, Scopus: Q1


Cancelable biometric system for IoT applications based on optical double random phase encoding

Gerges M. Salama, Safaa El-Gazar, Basma Omar, Rana M. Nassar, Ashraf A. M. Khalaf, Ghada M. El-banby, Hesham F. A. Hamed, Walid El-shafai, and Fathi E. Abd el-samie

Opt. Express, Vol. 30, Issue 21, pp. 37816-37832 (2022) , DOI:https://doi.org/10.1364/OE.466101

ISI: Q2, Scopus: Q1


Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine

Musheer Ahmad, Reem Alkanhel, Walid El-Shafai, Abeer D. Algarni, Fathi E. Abd El-Samie, And Naglaa F. Soliman

IEEE Access, vol. 10, pp. 112757-112775, 2022, DOI:https://doi.org/10.1109/ACCESS.2022.3209202

ISI: Q2, Scopus: Q1


Climate-smart agriculture using intelligent techniques, blockchain and Internet of Things: Concepts, challenges, and opportunities

Rania A. Ahmed, Ezz El-Din Hemdan, Walid El-Shafai, Zeinab A. Ahmed, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

Trans Emerging Tel Tech. 2022;e4607, DOI:10.1002/ett.4607

ISI: Q2, Scopus: Q2


Automatic modulation classification with 2D transforms and convolutional neural network

Hanan S. Ghanem, Mohamed R. Shoaib, Safaa El-Gazar, Heba Emara, Walid El-Shafai, Samia A. El-Moneim, Adel S. El-Fishawy, Taha E. Taha, Hesham F.A. Hamed, Ghada M. El-Banby, Maha Elsabrouty, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Gerges M. Salama

Trans Emerging Tel Tech. 2022;e4623, DOI:10.1002/ett.4623

ISI: Q2, Scopus: Q2


A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis

Mujeeb Ur Rehman, Arslan Shafique, Yazeed Yasin Ghadi, Wadii Boulila, Sana Ullah Jan, Thippa Reddy Gadekallu, Maha Driss, Jawad Ahmad.

IEEE Transactions on Network Science and Engineering, 9(6), 4322-4337, DOI:https://doi.org/10.1109/TNSE.2022.3199235

ISI: Q1, Scopus: Q1


Reconfigurable intelligent surface-aided millimetre wave communications utilizing two-phase minimax optimal stochastic strategy bandit

Ehab Mahmoud Mohamed, Sherief Hashima, Nasreen Anjum, Kohei Hatano, Walid El Shafai, Basem M. Elhlawany

IET Commun. 00, 1– 8 (2022), DOI:https://doi.org/10.1049/cmu2.12474

ISI: Q3, Scopus: Q2


Emotion Recognition from Occluded Facial Images Using Deep Ensemble Model

Zia Ullah, Muhammad Ismail Mohmand, Muhammad Zubair, Maha Driss, Wadii Boulila, Rayan Sheikh, Ibrahim Alwawi

Computers, materials and continua 73.3 (2022), DOI: https://doi.org/10.32604/cmc.2022.029101

ISI: Q2, Scopus: Q2


Android malware analysis in a nutshell

Iman Almomani ,Mohanned Ahmed,Walid El-Shafai

PloS one 17, no. 7 (2022): e0270647, DOI:https://doi.org/10.1371/journal.pone.0270647

ISI: Q2, Scopus: Q1


Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services

Walid El-Shafai, Fatma Khallaf, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

J Ambient Intell Human Comput (2022), DOI:https://doi.org/10.1007/s12652-022-03832-x

ISI: Q1, Scopus: Q1


A Hybrid Security Framework for Medical Image Communication

Walid El-Shafai, Hayam A. Abd El-Hameed, Ashraf A. M. Khalaf, Naglaa F. Soliman, Amel A. Alhussan, Fathi E. Abd El-Samie

Computers, Materials & Continua, vol. 73, no.2, pp. 2713–2730, 2022, DOI:10.32604/cmc.2022.028739

ISI: Q2, Scopus: Q1


Efficient Segmentation Approach for Different Medical Image Modalities

Walid El-Shafai, Amira A. Mahmoud, El-Sayed M. El-Rabaie, Taha E. Taha, Osama F. Zahran, Adel S. El-Fishawy, Naglaa F. Soliman, Amel A. Alhussan, Fathi E. Abd El-Samie

Computers, Materials & Continua, vol. 73, no.2, pp. 3119–3135, 2022, DOI:10.32604/cmc.2022.028935

ISI: Q2, Scopus: Q1


Deep CNN Model for Multimodal Medical Image Denoising

Walid El-Shafai, Amira A. Mahmoud, Anas M. Ali, El-Sayed M. El-Rabaie, Taha E. Taha, Osama F. Zahran, Adel S. El-Fishawy, Naglaa F. Soliman, Amel A. Alhussan, Fathi E. Abd El-Samie

Computers, Materials & Continua, vol. 73, no.2, pp. 3795–3814, 2022, DOI:10.32604/cmc.2022.029134

ISI: Q2, Scopus: Q1


Hybrid Segmentation Approach for Different Medical Image Modalities

Walid El-Shafai, Amira A. Mahmoud, El-Sayed M. El-Rabaie, Taha E. Taha, Osama F. Zahran, Adel S. El-Fishawy, Naglaa F. Soliman, Amel A. Alhussan, Fathi E. Abd El-Samie

Computers, Materials & Continua, vol. 73, no.2, pp. 3455–3472, 2022, DOI:10.32604/cmc.2022.028722

ISI: Q2, Scopus: Q1


A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks

Safa Ben Atitallah, Maha Driss, Iman Almomani

Sensors 2022, 22(11), 4302, DOI:https://doi.org/10.3390/s22114302

ISI: Q1, Scopus: Q1


Video quality enhancement using recursive deep residual learning network

Abeer Ayoub, Ensherah A. Naeem, Walid El-Shafai, Eman A. Sultan, O. Zahran, Fathi E. Abd El-Samie, El-Sayed M. EL-Rabaie

Signal, Image and Video Processing (2022), DOI:https://doi.org/10.1007/s11760-022-02228-w

ISI: Q3, Scopus: Q2


A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations

Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad, Sadaqat Ur Rehman, Sana Ullah Jan, Abdullah Qayyum, William J Buchanan.

Wireless Personal Communications, 127(2), 1405-1432 (2022), DOI:https://doi.org/10.1007/s11277-021-08584-z

ISI: Q3, Scopus: Q2


Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications

Walid El-Shafai, Fatma Khallaf, El-Sayed M. El-Rabaie & Fathi E. Abd El-Samie

Neural Computing and Applications (2022), DOI:https://doi.org/10.1007/s00521-022-06994-z

ISI: Q1, Scopus: Q1


Wireless modulation classification based on Radon transform and convolutional neural networks

Hanan S. Ghanem, Rasha M. Al-Makhlasawy, Walid El-Shafai, Maha Elsabrouty, Hesham F. A. Hamed, Gerges M. Salama, Fathi E. Abd El-Samie

Journal of Ambient Intelligence and Humanized Computing (2022), DOI:https://doi.org/10.1007/s12652-021-03650-7

ISI: Q1, Scopus: Q1


Hybrid Single Image Super-Resolution Algorithm for Medical Images

Walid El-Shafai, Ehab Mahmoud Mohamed, Medien Zeghid, Anas M. Ali, Moustafa H. Aly

Computers, Materials & Continua, vol. 72, no.3, pp. 4879–4896, 2022, DOI:10.32604/cmc.2022.028364

ISI: Q2, Scopus: Q1


Non-Invasive Early Diagnosis of Obstructive Lung Diseases Leveraging Machine Learning Algorithms

Mujeeb Ur Rehman, Maha Driss, Abdukodir Khakimov, Sohail Khalid

Computers, Materials & Continua, vol. 72, no.3, pp. 5681–5697, DOI:10.32604/cmc.2022.025840

ISI: Q2, Scopus: Q1


Design and analysis of data link impersonation attack for wired LAN application layer services

Ahmed ElShafee, Walid El-Shafai

J Ambient Intell Human Comput (2022), DOI:https://doi.org/10.1007/s12652-022-03800-5

ISI: Q1, Scopus: Q1


CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services

Reem Al Saleh; Maha Driss; Iman Almomani

IEEE Access, vol. 10, pp. 35321-35335, 2022, DOI:10.1109/ACCESS.2022.3163246

ISI: Q2, Scopus: Q1


An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

Ghalib H. Alshammri, Amani K. Samha, Ezz El-Din Hemdan, Mohammed Amoon, Walid El-Shafai

Computers, Materials & Continua, vol. 72, no.2, pp. 3529–3548, DOI:10.32604/cmc.2022.025262

ISI: Q2, Scopus: Q1


Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing

Ahmed M. Ayoup, Ashraf A. M. Khalaf, Walid El-Shafai, Fathi E. Abd El-Samie, Fahad Alraddady, Salwa M. Serag Eldin

Computers, Materials & Continua, vol. 72, no.2, pp. 3687–3703, DOI:10.32604/cmc.2022.025902

ISI: Q2, Scopus: Q1


A federated learning framework for cyberattack detection in vehicular sensor networks

Maha Driss, Iman Almomani, Zil e Huma & Jawad Ahmad

Complex & Intelligent Systems (2022), DOI:https://doi.org/10.1007/s40747-022-00705-w

ISI: Q2, Scopus: Q2


Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms

Safaa El-Gazar, Walid El-Shafai, Ghada El-Banby, Hesham F. A. Hamed, Gerges M. Salama, Mohammed Abd-Elnaby, Fathi E. Abd El-Samie

Computer Systems Science and Engineering, 43(1), 87–102, DOI:10.32604/csse.2022.022722

ISI: Q3, Scopus: Q3


A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

Iman Almomani, Aala Alkhayer, Walid El-Shafai

Sensors. 2022; 22(6):2281, DOI:https://doi.org/10.3390/s22062281

ISI: Q1, Scopus: Q2


Hybrid classification structures for automatic COVID-19 detection

Mohamed R. Shoaib, Heba M. Emara, Mohamed Elwekeil, Walid El-Shafai, Taha E. Taha, Adel S. El-Fishawy, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

J Ambient Intell Human Comput (2022), DOI:https://doi.org/10.1007/s12652-021-03686-9

ISI: Q1, Scopus: Q1


An efficient modulation classification method using signal constellation diagrams with convolutional neural networks, Gabor filtering, and thresholding

Mohamed A. Abdel-Moneim, Rasha M. Al-Makhlasawy, Nariman Abdel-Salam Bauomy, El-Sayed M. El-Rabaie, Walid El-Shafai, Ahmed E. A. Farghal, Fathi E. Abd El-Samie

Trans Emerging Tel Tech. 2022;e4459, DOI:https://doi.org/10.1002/ett.4459

ISI: Q3, Scopus: Q2


A Hybrid Encryption Framework Based on Rubik’s Cube for Cancelable Biometric Cyber Security Applications

Mai Helmy, Walid El-Shafai, El-Sayed M.El-Rabaie, Ibrahim M.El-Dokany, Fathi E. Abd El-Samie

Optik, 168773, DOI:https://doi.org/10.1016/j.ijleo.2022.168773

ISI: Q2, Scopus: Q2


Three-Dimensional Video Super-Resolution Reconstruction Scheme Based on Histogram Matching and Recursive Bayesian Algorithms

Ghalib H. Alshammri, Amani K. Samha, Walid El-Shafai, Emad A. Elsheikh, E. A. Ramadan, Mohamed I. Abdo, Mohammed Amoon, Fathi E. Abd El-Samie

IEEE Access, DOI:10.1109/ACCESS.2022.3153409

ISI: Q2, Scopus: Q1


Information Fusion in Autonomous Vehicle Using Artificial Neural Group Key Synchronization

Mohammad Zubair Khan, Arindam Sarkar, Hamza Ghandorh, Maha Driss, Wadii Boulila

Sensors, 22(4), 1652, DOI:https://doi.org/10.3390/s22041652

ISI: Q1, Scopus: Q1


SmartWater: A Service-Oriented and Sensor Cloud-Based Framework for Smart Monitoring of Water Environments

Haithem Mezni, Maha Driss, Wadii Boulila,Safa Ben Atitallah, Mokhtar Sellami, Nouf Alharbi

Remote Sensing, 14(4), 922, DOI:https://doi.org/10.3390/rs14040922

ISI: Q1, Scopus: Q1


Cancelable Multi-biometric Template Generation Based on Dual-Tree Complex Wavelet Transform

Ahmed M. Ayoup, Ashraf A. M. Khalaf, Fahad Alraddady, Fathi E. Abd El-Samie, Walid El-Shafai, Salwa M. Serag Eldin

Intelligent Automation & Soft Computing, 33(2), 1289–1304, DOI:10.32604/iasc.2022.024381

ISI: Q3, Scopus: Q3


Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services

Samer Eldesouky, Walid El-Shafai, Hossam El din H. Ahmed, Fathi E. Abd El-Samie

Security and Privacy. 2022; 5(2):e198, DOI:https://doi.org/10.1002/spy2.198

ISI: Q3, Scopus: Q3


An efficient multimedia compression-encryption scheme using latin squares for securing internet of things networks

Walid El-Shafai, Ahmed K. Mesrega, Hossam Eldin Ahmed, Nermin Abdelwahab, Fathi E. Abd El-Samie

Journal of Information Security and Applications, 64, 103039, DOI:https://doi.org/10.1016/j.jisa.2021.103039

ISI: Q2, Scopus: Q2


CR19: a framework for preliminary detection of COVID-19 in cough audio signals using machine learning algorithms for automated medical diagnosis applications

Ezz El-Din Hemdan, Walid El-Shafai, Amged Sayed

J Ambient Intell Human Comput (2022), DOI:https://doi.org/10.1007/s12652-022-03732-0

ISI: Q1, Scopus: Q1


Fan-beam projection for modulation classification in optical wireless communication systems

Bidaa Mortada, Walid El-Shafai, Safie El-Din Nasr Mohamed, O. Zahran, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

Appl. Opt. 61, 1041-1048 (2022), DOI:https://doi.org/10.1364/AO.438717

ISI: Q3, Scopus: Q1


Deep Learning-based Seizure Detection and Prediction from EEG Signals

Fatma E. Ibrahim, Heba M. Emara, Walid El-Shafai, Mohamed Elwekeil, Mohamed Rihan, Ibrahim M. Eldokany, Taha E. Taha, Adel S. El-Fishawy, El-Sayed M. El-Rabaie, Essam Abdellatef, Fathi E. Abd El-Samie

Int J Numer Meth Biomed Engng. Accepted Author Manuscript e3573, DOI:https://doi.org/10.1002/cnm.3573

ISI: Q2, Scopus: Q1


Convolutional neural network model for spectrum sensing in cognitive radio systems

Walid El-Shafai, Ahmed Fawzi, Ahmed Sedik, Abdelhalim Zekry, Ghada M. El-Banby, Ashraf A. M. Khalaf, Fathi E. Abd El-Samie, Mohammed Abd-Elnaby

Int J Commun Syst. 2022;e5072, DOI: https://doi.org/10.1002/dac.5072

ISI: Q3, Scopus: Q2


Selective Cancellable Multi-Biometric Template Generation Scheme Based on Multi-Exposure Feature Fusion

Ahmed M. Ayoup, Ashraf A. M. Khalaf, Fahad Alraddady, Fathi E. Abd El-Samie, Walid El-Shafai, Salwa M. Serag Eldin

Intelligent Automation & Soft Computing, 33(1), 549–565, DOI:10.32604/iasc.2022.024379

ISI: Q3, Scopus: Q3


An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks

Walid El-Shafai, Iman Almomani, Aala Alkhayer

IEEE Access, vol. 10, pp. 2700-2720, 2022, DOI:10.1109/ACCESS.2022.3140341

ISI: Q2, Scopus: Q1


Novel Ransomware Hiding Model Using HEVC Steganography Approach

Iman Almomani, Aala AlKhayer, Walid El-Shafai

CMC-Computers, Materials & Continua, 70(1), 1209–1228, DOI:10.32604/cmc.2022.018631

ISI: Q2, Scopus: Q1


Efficient Deep CNN Model for COVID-19 Classification

Walid El-Shafai, Amira A. Mahmoud, El-Sayed M. El-Rabaie, Taha E. Taha, Osama F. Zahran, Adel S. El-Fishawy, Mohammed Abd-Elnaby, Fathi E. Abd El-Samie

CMC-Computers, Materials & Continua, 70(3), 4373–4391, DOI:10.32604/cmc.2022.019354

ISI: Q2, Scopus: Q1


Efficient Forgery Detection Approaches for Digital Color Images

Amira Baumy, Abeer D. Algarni, Mahmoud Abdalla, Walid El-Shafai, Fathi E. Abd El-Samie, Naglaa F. Soliman

CMC-Computers, Materials & Continua, 71(2), 3257–3276, DOI:10.32604/cmc.2022.021047

ISI: Q2, Scopus: Q1


Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications

Hend Ibrahim, Abeer D. Algarni, Mahmoud Abdalla, Walid El-Shafai, Fathi E. Abd El-Samie, Naglaa F. Soliman

CMC-Computers, Materials & Continua, 71(2), 3293–3318, DOI:10.32604/cmc.2022.022436

ISI: Q2, Scopus: Q1


2021

Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications

Ali I. Siam, Mohammed Amin Almaiah, Ali Al-Zahrani, Atef Abou Elazm, Ghada M. El Banby, Walid El-Shafai, Fathi E. Abd El-Samie, Nirmeen A. El-Bahnasawy

Computational Intelligence and Neuroscience, 2021, DOI:https://doi.org/10.1155/2021/8016525

ISI: Q1, Scopus: Q1


Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems

Rana Almohaini, Iman Almomani, Aala AlKhayer

Appl. Sci. 2021, 11, 10976, DOI:https://doi.org/10.3390/app112210976

ISI: Q2, Scopus: Q2


Proposal of Hybrid NOAM-MPPM Technique for Gamma-Gamma Turbulence Channel with Pointing Error and Different Deep Learning Techniques

Shimaa A. El-Meadawy, Hossam M. H. Shalaby, Nabil A. Ismail, Fathi E. Abd El-Samie, Naglaa F. Soliman, Abeer D. Algarni, Walid El-Shafai, Ahmed E. A. Farghal

IEEE Access, DOI:10.1109/ACCESS.2021.3127139

ISI: Q2, Scopus: Q1


Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions

Shahid Latif, Maha Driss, Wadii Boulila, Zil e Huma, Sajjad Shaukat Jamal, Zeba Idrees, Jawad Ahmad

Sensors. 2021; 21(22):7518, DOI:https://doi.org/10.3390/s21227518

ISI: Q1, Scopus: Q1


Efficient chaotic-Baker-map-based cancelable face recognition

Osama S. Faragallah, Ensherah A. Naeem, Walid El-Shafai, Noha Ramadan, Hossam El-din H. Ahmed, Mustafa M. Abd Elnaby, Ibrahim Elashry, Said E. El-khamy, Fathi E. Abd El-Samie

J Ambient Intell Human Comput (2021), DOI:https://doi.org/10.1007/s12652-021-03398-0

ISI: Q1, Scopus: Q1


Cancelable biometric security system based on advanced chaotic maps

Hayam A. Abd El-Hameed, Noha Ramadan, Walid El-Shafai, Ashraf A. M. Khalaf, Hossam Eldin H. Ahmed, Said E. Elkhamy, Fathi E. Abd El-Samie

Vis Comput (2021), DOI:https://doi.org/10.1007/s00371-021-02276-2

ISI: Q2, Scopus: Q3


Randomly Initialized Convolutional Neural Network for the Recognition of COVID- 19 Using X-ray Images

Safa Ben Atitallah, Maha Driss, Wadii Boulila, Henda Ben Ghézala

International Journal of Imaging Systems and Technology, DOI:https://doi.org/10.1002/ima.22654

ISI: Q3, Scopus: Q2


Robust and efficient multi-level security framework for color medical images in telehealthcare services

Walid El-Shafai, Ezz El-Din Hemdan

J Ambient Intell Human Comput (2021), DOI:https://doi.org/10.1007/s12652-021-03494-1

ISI: Q1, Scopus: Q1


Efficient security framework for reliable wireless 3D video transmission

M. Helmy, Walid El-Shafai, S. El-Rabaie, I. M. El-Dokany, Fathi E. Abd El-Samie

Multidim Syst Sign Process (2021), DOI:https://doi.org/10.1007/s11045-021-00796-7

ISI: Q2, Scopus: Q2


Global outliers detection in wireless sensor networks: A novel approach integrating time‐series analysis, entropy, and random forest‐based classification

Mahmood Safaei, Maha Driss, Wadii Boulila, Elankovan A. Sundararajan, Mitra Safaei

Software: Practice and Experience (2021), DOI:https://doi.org/10.1002/spe.3020

ISI: Q2, Scopus: Q2


Fusion of convolutional neural networks based on Dempster–Shafer theory for automatic pneumonia detection from chest X-ray images

Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa, Henda Ben Ghézala

International Journal of Imaging Systems and Technology, DOI:https://doi.org/10.1002/ima.22654

ISI: Q3, Scopus: Q2


Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia

Iman Almomani​, Mohanned Ahmed, Leandros Maglaras

PeerJ Computer Science 7:e703, DOI:https://doi.org/10.7717/peerj-cs.703

ISI: Q3, Scopus: Q1


An efficient cybersecurity framework for facial video forensics detection based on multimodal deep learning

Ahmed Sedik, Osama S. Faragallah, Hala S. El-sayed, Ghada M. El-Banby, Fathi E. Abd El-Samie, Ashraf A. M. Khalaf, Walid El-Shafai

Neural Comput & Applic (2021), DOI:https://doi.org/10.1007/s00521-021-06416-6

ISI: Q1, Scopus: Q1


IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model

Ruba Abu Khurma, Iman Almomani, Ibrahim Aljarah

Symmetry 2021, 13, 1377, DOI:https://doi.org/10.3390/sym13081377

ISI: Q2, Scopus: Q2


Efficient opto MVC/HEVC cybersecurity framework based on arnold map and discrete cosine transform

Osama S. Faragallah, Hala S. El-Sayed, Walid El-Shafai

J Ambient Intell Human Comput (2021), DOI:https://doi.org/10.1007/s12652-021-03382-8

ISI: Q1, Scopus: Q1


Visualized Malware Multi-Classification Framework Using Fine-Tuned CNN-Based Transfer Learning Models

Walid El-Shafai, Iman Almomani, Aala AlKhayer

Appl. Sci. 2021, 11, 6446, DOI:https://doi.org/10.3390/app11146446

ISI: Q2, Scopus: Q2


Hybrid swarm optimization algorithm based on task scheduling in a cloud environment

Heba M. Eldesokey, Saied M. Abd El-atty, Walid El-Shafai, Mohammed Amoon, Fathi E. Abd El-Samie

Int J Commun Syst. 2021;e4694, DOI:https://doi.org/10.1002/dac.4694

ISI: Q3, Scopus: Q2


Deep convolutional neural networks for COVID-19 automatic diagnosis

Heba M. Emara, Mohamed R. Shoaib, Mohamed Elwekeil, Walid El-Shafai, Taha E. Taha, Adel S. El-Fishawy, El-Sayed M. El-Rabaie, Saleh A. Alshebeili, Moawad I. Dessouky, Fathi E. Abd El-Samie

Microsc Res Tech. 2021; 1– 13, DOI:https://doi.org/10.1002/jemt.23713

ISI: Q1, Scopus: Q2


Efficient Frameworks for EEG Epileptic Seizure Detection and Prediction

Heba M. Emara, Mohamed Elwekeil, Taha E. Taha, Adel S. El-Fishawy, El-Sayed M. El-Rabaie, Walid El-Shafai, Ghada M. El Banby, Turky Alotaiby, Saleh A. Alshebeili, Fathi E. Abd El-Samie

Ann. Data. Sci. (2021), DOI:https://doi.org/10.1007/s40745-020-00308-7

Scopus: Q4


Optimized two-level scheduler for video traffic in LTE downlink framework

Mohamad I. Elhadad, Walid El-Shafai, El-Sayed M. El-Rabaie, Mohammed Abd-Elnaby, Fathi E. Abd El-Samie

Int J Commun Syst. 2021;e4704, DOI:https://doi.org/10.1002/dac.4704

ISI: Q3, Scopus: Q2


Cancellable face recognition based on fractional-order Lorenz chaotic system and Haar wavelet fusion

Iman S.Badr, Ahmed G. Radwan, El-Sayed EL-Rabaie, Lobna A. Said, Ghada M. El Banby, Walid El-Shafai, Fathi E. Abd El-Samie

Digital Signal Processing, 2021, 103103, ISSN 1051-2004, DOI:https://doi.org/10.1016/j.dsp.2021.103103

ISI: Q2, Scopus: Q1


Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm

Walid El-Shafai, Fatma A. Hossam Eldein Mohamed, Hassan M. A. Elkamchouchi, Mohammed Abd-Elnaby, Ahmed ElShafee

IEEE Access, DOI:10.1109/ACCESS.2021.3082940

ISI: Q1, Scopus: Q1


Performance Analysis of 3D Video Transmission Over Deep-Learning-Based Multi-Coded N-ary Orbital Angular Momentum FSO System

Shimaa A. El-Meadawy, Hossam M. H. Shalaby, Nabil A. Ismail, Ahmed E. A. Farghal, Fathi E. Abd El-Samie, Mohammed Abd-Elnaby, Walid El-Shafai

IEEE Access, DOI:10.1109/ACCESS.2021.3083524

ISI: Q1, Scopus: Q1


A survey of traditional and advanced automatic modulation classification techniques, challenges, and some novel trends

Mohamed A. Abdel‐Moneim, Walid El‐Shafai, Nariman Abdel‐Salam, El‐Sayed M. El‐Rabaie, Fathi E. Abd El‐Samie

Int J Commun Syst. 2021;e4762, DOI:https://doi.org/10.1002/dac.4762

ISI: Q3, Scopus: Q2


Spectrum measurement and utilization in an outdoor 5‐GHz Wi‐Fi network using cooperative cognitive radio system

Walid El‐Shafai, Ahmed Fawzi, Abdelhalim Zekry, Fathi E. Abd El‐Samie, Mohammed Abd‐Elnaby

Int J Commun Syst. 2021;e4774, DOI:https://doi.org/10.1002/dac.4774

ISI: Q3, Scopus: Q2


A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning

Raneem Qaddoura, Ala’ M. Al-Zoubi, Hossam Faris, Iman Almomani

Sensors 2021, 21, 2987, DOI:https://doi.org/10.3390/s21092987

ISI: Q1, Scopus: Q1


Efficient implementation of optical scanning holography in cancelable biometrics

Fathi E. Abd El-Samie, Rana M. Nassar, Mohamed Safan, ..., Walid El-Shafai

Appl. Opt. 60, 3659-3667 (2021), DOI:https://doi.org/10.1364/AO.415523

ISI: Q3, Scopus: Q1


Optical wireless communication performance enhancement using Hamming coding and an efficient adaptive equalizer with a deep-learning-based quality assessment

Bidaa Mortada, Hanan S. Ghanem, Randa S. Hammad, ..., Walid El-Shafai, et al.

Appl. Opt. 60, 3677-3688 (2021), DOI:https://doi.org/10.1364/AO.418438

ISI: Q3, Scopus: Q1


Efficient and Secure Bit-level Chaos Security Algorithm for Orbital Angular Momentum Modulation in Free-Space Optical Communications

Shimaa A. El-Meadawy, Ahmed E. A. Farghal, Hossam M. H. Shalaby, Nabil A. Ismail, Fathi E. Abd El-Samie, Mohammed Abd-Elnaby, Walid El-Shafai

IEEE Access, DOI:10.1109/ACCESS.2021.3074894

ISI: Q1, Scopus: Q1


Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data

Iman Almomani, Raneeem Qaddoura, Maria Habib, Samah Alsoghyer, Alaa Al Khayer, Ibrahim Aljarah, Hossam Faris

IEEE Access, DOI:10.1109/ACCESS.2021.3071450

ISI: Q1, Scopus: Q1


A Multi-Stage Classification Approach for IoT Intrusion Detection Based on Clustering with Oversampling

Raneem Qaddoura, Ala’ M. Al-Zoubi, Iman Almomani, Hossam Faris

Appl. Sci. 2021, 11, 3022, DOI:https://doi.org/10.3390/app11073022

ISI: Q2, Scopus: Q1


Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications

Walid El-Shafai, Fatma Khallaf, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

J Ambient Intell Human Comput (2021), DOI:https://doi.org/10.1007/s12652-020-02597-5

ISI: Q1, Scopus: Q1


Optical Bit-Plane-based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

Walid El-Shafai, Iman Almomani, Aala Alkhayer

IEEE Access, DOI:10.1109/ACCESS.2021.3062403

ISI: Q1, Scopus: Q1


Utilization of image interpolation and fusion in brain tumor segmentation

Noha A. El-Hag, Ahmed Sedik, Ghada M. El-Banby, Walid El-Shafai, Ashraf A. M. Khalaf, Waleed Al-Nuaimy, Fathi E. Abd El-Samie, Heba M. El-Hoseny

Int J Numer Meth Biomed Engng. 2021;e3449, DOI:https://doi.org/10.1002/cnm.3449

ISI: Q1, Scopus: Q1


2020

Ontology-Based Context-sensitive Software Security Knowledge Management Modeling.

Mamdouh Alenezi

International Journal of Electrical and Computer Engineering (IJECE), Vol. 10, No. 6, December 2020, pp. 6507-652, DOI:10.11591/ijece.v10i6.pp6507-6520

Scopus: Q2


Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment

Md Tarique Jamal Ansari, Bineet Kumar Gupta, Alka Agrawal, and Raees Ahmad Khan

International Journal of Intelligent Engineering and Systems, Vol. 13, No. 6, December 2020, pp. 94-109, DOI:10.22266/ijies2020.1231.09

Scopus: Q2


A Comprehensive Analysis of the Android Permissions System

Iman Almomani, Aala Al Khayer

IEEE Access. 2020 Nov 30., DOI:10.1109/ACCESS.2020.3041432

ISI: Q1, Scopus: Q1


Fuzzy Multi Criteria Decision Analysis Method for Assessing Security Design Tactics for Web Applications

Mamdouh Alenezi, Mohammad Nadeem, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan

International Journal of Intelligent Engineering and Systems, Vol. 13, No. 5, October 2020, pp. 181-196, DOI:10.22266/ijies2020.1031.17

Scopus: Q2


Security controls in infrastructure as code

Sadiq Almuairfi and Mamdouh Alenezi

Computer Fraud & Security, Volume 2020, Issue 10, pp. 13 - 19 October 2020., DOI:10.1016/S1361-3723(20)30109-3

Scopus: Q2


Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records

Mohammad Zarour, Md Tarique Jamal Ansari, Mamdouh Alenezi, Amal Krishna Sarkar, Mohd Faizan, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan

IEEE Access, vol. 8, pp. 157959-157973, August 2020, DOI:10.1109/ACCESS.2020.3019829

ISI: Q1, Scopus: Q1


An automated approach to fix buffer overflows

Aamir Shahab, Mamdouh Alenezi, Muhammad Nadeem, and Raja Asif

International Journal of Electrical and Computer Engineering (IJECE), Volume 10, Issue 4, pp. 3778-3788 August 2020, DOI:10.11591/ijece.v10i4.pp3777-3787

Scopus: Q2


A New Approach to Locate Software Vulnerabilities Using Code Metrics

Mohammed Zagane, Mustapha Kamel Abdi and Mamdouh Alenezi

International Journal of Software Innovation (IJSI) 8(3), July 2020, Pages: 14, DOI:10.4018/IJSI.2020070106

Scopus: Q4


Exploring the Connection between Design Smells and Security Vulnerabilities

Mamdouh Alenezi and Mohammed Akour

International Journal of Innovative Technology and Exploring Engineering (IJITEE) Volume-9 Issue-8, June 2020 8, Pages:449-452, DOI:10.35940/ijitee.H6508.069820

Scopus: Q4


Healthcare Data Breaches: Insights and Implications

Adil Hussain Seh, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan

Healthcare, May 2020, 8(2), 133, DOI:10.3390/healthcare8020133

ISI: Q3


The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems

Celestine Iwendi, Suleman Khan, Joseph H. Anajemba, Mohit Mittal, Mamdouh Alenezi, Mamoun Alazab

Sensors, April 2020, 20(9), 2559, DOI:10.3390/s20092559

ISI: Q1, Scopus: Q1


Deep Learning for Software Vulnerabilities Detection Using Code Metrics

Mohammed Zagane, Mustapha Kamel Abdi, and Mamdouh Alenezi

IEEE Access, Volume 8, pp. 74562 - 74570, April 2020, DOI:10.1109/ACCESS.2020.2988557

ISI: Q1, Scopus: Q1


Evaluating Performance of Software Durability through an Integrated Fuzzy-Based Symmetrical Method of ANP and TOPSIS

Suhel Ahmad Khan, Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan

Symmetry 2020, 12(4), 493., DOI:10.3390/sym12040493

ISI: Q2, Scopus: Q2


A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications

Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan

Symmetry, March 2020, 12(3), 448, DOI:10.3390/sym12030448

ISI: Q2, Scopus: Q2


Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks

Iman Almomani, Afnan Alromi

Sensors 2020, 20(5), 3 March 2020. 1375, DOI:10.3390/s20051375

ISI: Q1, Scopus: Q1


Essential Activities for Secure Software Development

Mamdouh Alenezi and Sadiq Almuairfi

International Journal of Software Engineering & Applications (IJSEA), Volume 11, Number 2, March 2020, DOI:10.5121/ijsea.2020.11201

Scopus: Q4


The Impact of Mobility on the Performance of Authentication Services in Wireless Sensor Networks

Iman Almomani, Katrina Sundus

Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 06, No. 01, pp.77-95, March 2020, DOI:10.5455/jjcit.71-1563658722

Scopus: Q4


Evaluating Performance of Web Application Security through a Fuzzy based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective

Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan

IEEE ACCESS, Volume 8, 31 January 2020, DOI:10.1109/ACCESS.2020.2970784

ISI: Q1, Scopus: Q1


Collaborative Mobile-Learning Architecture Based on Mobile Agents

Samer Atawneh, Mousa Al-Akhras, Iman Almomani, Anas Liswi and Mohammed Alawairdhi

Vol. 9, Issue. 1, pp.1-36. , January 2020, DOI:10.3390/electronics9010162

ISI: Q3, Scopus: Q1


A Framework for Producing Effective and Efficient Secure Code through Malware Analysis

Abhishek Kumar Pandey, Ashutosh Tripathi, Mamdouh Alenezi, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan

International Journal of Advanced Computer Science and Applications(IJACSA), Volume 11, Issue 2, pp. 497-503 January 2020, DOI:10.14569/IJACSA.2020.0110263

Scopus: Q4


On the Relationship between Software Complexity and Security

Mamdouh Alenezi and Mohammad Zarour

International Journal of Software Engineering & Applications (IJSEA), Volume 11, Issue 1, pp. 51 - 60 January 2020, DOI:10.5121/ijsea.2020.11104

Scopus: Q4


Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud

Sadiq Almuairfi and Mamdouh Alenezi

Handbook of Research on Multimedia Cyber Security, pp. 48-72. IGI Global, 2020., DOI:10.4018/978-1-7998-2701-6.ch003


2019

Securing Web Applications through a Framework of Source Code Analysis

Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar and Raees Ahmad Khan

Journal of Computer Science, Volume 15, Issue 12, pp. 1780 - 1794 December 2019, DOI:10.3844/jcssp.2019.1780.1794

Scopus: Q4


Security assessment framework for educational ERP systems

Ashraf, Hafsa, Mamdouh Alenezi, Muhammad Nadeem, and Yasir Javid

International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5570-5585 December 2019, DOI:10.11591/ijece.v9i6.pp5570-5585

Scopus: Q2


Security assessment of four open source software systems

Faraz Idris Khan, Yasir Javed, and Mamdouh Alenezi

Indonesian Journal of Electrical Engineering and Computer Science, Volume 16, Number 2, pp. 860 - 881 November 2019, DOI:10.11591/ijeecs.v16.i2.pp860-881

Scopus: Q3


A source code perspective framework to produce secure web applications

Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan

Computer Fraud & Security, Volume 2019, Issue 10, pp. 11 - 18 October 2019, DOI:10.1016/S1361-3723(19)30107-1

Scopus: Q2


Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS

Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan

IEEE Access, Volume 7, pp. 153936 - 153951 October 2019, DOI:10.1109/ACCESS.2019.2946776

ISI: Q1, Scopus: Q1


Open Source Web-Based Software: Security Challenges and Assessment Methodologies

Faraz Idris Khan, and Mamdouh Alenezi

i-manager's Journal on Software Engineering (JSE), Volume 14, Issue 1, pp. 34 - 40 October 2019, DOI:10.26634/jse.14.1.16467


Security durability assessment through fuzzy analytic hierarchy process

Alka Agrawal, Mohammad Zarour, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan

PeerJ Computer Science, 5:e215 September 2019, DOI:10.7717/peerj-cs.215

ISI: Q1, Scopus: Q1


Security Risks in the Software Development Lifecycle

Mamdouh Alenezi and Sadiq Almuairfi

International Journal of Recent Technology and Engineering (IJRTE), Volume 8, Issue 3, pp. 7048 - 7055 September 2019, DOI:10.35940/ijrte.C5374.098319

Scopus: Q4


Ransomware Detection System for Android Applications

Samah Alsoghyer, Iman Almomani

Electronics, Vol. 8, No. 8, pp.1-36, August 2019, DOI:10.3390/electronics8080868

ISI: Q2, Scopus: Q2


Control Plane Packet-In Arrival Rate Analysis for Denial-of-Service Saturation Attacks Detection and Mitigation in Software-Defined Networks

Fakhry Khellah

Arabian Journal for Science and Engineering, Springer Berlin Heidelberg, pp. 1-14, July, 2019, DOI:10.1007/s13369-019-04059-3

ISI: Q3, Scopus: Q2


Usable-Security Assessment Through A Decision Making Procedure

Alka Agrawal, Mamdouh Alenezi, Dhirendra Pandey, Rajeev Kumar, and Raees Ahmad Khan

ICIC Express Letters, Part B: Applications, Volume 10, Number 8, pp. 665 - 672 July 2019, DOI:10.24507/icicelb.10.08.665

Scopus: Q3


Using Public Vulnerabilities Data to Self-Heal Security Issues in Software Systems

Attiq ur Rehman Jaffar, Muhammad Nadeem, Mamdouh Alenezi, and Yasir Javed

ICIC Express Letters, Volume 13, Number 7, pp. 557 - 567 July 2019, DOI:10.24507/icicel.13.07.557

Scopus: Q3


Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process

Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, and Raees Ahmad Khan

International Journal of Computational Intelligence Systems, Volume 12, Number 2, pp. 627 - 642 June 2019, DOI:10.2991/ijcis.d.190513.001

ISI: Q3, Scopus: Q1


Usable-Security Attribute Evaluation Using Fuzzy Analytic Hierarchy Process

Mamdouh Alenezi, Rajeev Kumar, Alka Agrawal, and Raees Ahmad Khan

ICIC Express Letters, Volume 13, Number 6, pp. 453 - 460 June 2019, DOI:10.24507/icicel.13.06.453

Scopus: Q3


Multi-level Fuzzy System for Usable-Security Assessment

Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan

Journal of King Saud University-Computer and Information Sciences, April 2019, DOI:10.1016/j.jksuci.2019.04.007

Scopus: Q1


An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments

Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan

International Journal of Information Security and Privacy (IJISP), 2-5 Volume 13, Issue 2, pp. 14 – 31, April 2019, DOI:10.4018/IJISP.2019040102

Scopus: Q4


2018

Predicting the Popularity of Saudi Multinational Enterprises Using a Data Mining Technique

Park Youngeun and Mamdouh Alenezi

Journal of Management Information and Decision Sciences, Volume 21, Issue 1, (December 2018)


STORE: Security Threat Oriented Requirements Engineering Methodology

Md Tarique Jamal Ansari, Dhirendra Pandey, and Mamdouh Alenezi

Journal of King Saud University - Computer and Information Sciences (December 2018), DOI:10.1016/j.jksuci.2018.12.005

Scopus: Q1


Are Open Source Web Applications Secure? Static Analysis Findings

Mamdouh Alenezi, Mohammad Zarour, and Khawlah Alomar

International Journal of System and Software Engineering, Vol. 6, No. 2, pp. 1 - 9 (September 2018), DOI:10.1109/ICEMIS.2016.7745369


An Empirical Study of Bad Smells during Software Evolution Using Designite Tool

Mamdouh Alenezi, and Mohammad Zarour

Journal of Theoretical and Applied Informtion Technology, Vol. 96, No. 14, pp. 4690 - 4699 (September 2018), DOI:10.26634/jse.12.4.14958

Scopus: Q3


Application Centric Virtual Machine Placements to Minimize Bandwidth Utilization in Datacenter

Muhammad Abdullah, Saad Khan, Mamdouh Alenezi, Khaled Almustafa, and Waheed Iqbal

Intelligent Automation and Soft Computing, 1–14 August 2018, DOI:10.31209/2018.100000047

ISI: Q3, Scopus: Q3


Discovering the Relationship Between Software Complexity and Software Vulnerabilities

Yasir Javed, Mamdouh Alenezi, Mohammed Akour and Ahmad Alzyod

i-manager's Journal on Software Engineering, 12(4), 12-27 (July 2018)


Efficient Denial of Service Attacks Detection in Wireless Sensor Networks

Iman Almomani and Mamdouh Alenezi

Journal of Information Science and Engineering Vol. 34, No. 4 (July 2018), pp. 977 - 1000, DOI:10.6688/JISE.201807_34(4).0011

ISI: Q4, Scopus: Q3


Security Testing Framework for Web Applications." International Journal of Software Innovation

Layla Alrawais, Mamdouh Alenezi, and Mohammad Akour

International Journal of Software Innovation (IJSI) Vol. 6, No. 3 (2018), pp. 93 - 117, DOI:10.4018/IJSI.2018070107

Scopus: Q4


Security Testing Framework for Web Applications

Layla Alrawais, Mamdouh Alenezi, and Mohammad Akour

International Journal of Software Innovation (IJSI) Vol. 6, No. 3 (June 2018), pp. 93 - 117 , DOI:10.4018/IJSI.2018070107

Scopus: Q4


ERP Implementation Failures in Saudi Arabia: Key Findings

Mohannad Alsayat and Mamdouh Alenezi

International Business Management Vol. 12, No. 1 (April 2018), pp. 10 - 2, DOI:10.3923/ibm.2018.10.22

Scopus: Q4


S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

Iman Almomani, Maha Saadeh

KSII Transactions on Internet and Information Systems, vol. 12, no. 4, April 30, 2018 [ISI], DOI:10.3837/tiis.2018.04.003

ISI: Q4, Scopus: Q3


Using Categorical Features in Mining Bug Tracking Systems to Assign Bug Reports

Mamdouh Alenezi, Shadi Banitaan and Mohammad Zarour

International Journal of Software Engineering & Applications (IJSEA) Vol. 9, No. 2 (March 2018), pp. 29 - 39, DOI:10.5121/ijsea.2018.9203

Scopus: Q4


On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks

Mamdouh Alenezi, Khaled Almustafa and Mohamed Hussein

Journal of Engineering Science and Technology Review Vol. 11, No. 1 (February 2018), pp. 199 - 207, DOI:10.25103/jestr.111.24

Scopus: Q2


CLUBA: A Clustering-Based Approach for Bug Assignment

Mamdouh Alenezi, Shadi Banitaan, and Mohammad Zarour

International Journal of System and Software Engineering, Vol. 6, Issue 1, pp. 1 - 9 (2018)


Software Architecture Understandability in Object-Oriented Systems

Turki Alshammary and Mamdouh Alenezi

i-manager’s Journal on Software Engineering Vol. 12, No. 2 (January 2018), pp. 1 - 14, DOI:10.26634/jse.12.2.14062


Cloud based SDN and NFV architectures for IoT infrastructure

Mamdouh Alenezi, Khaled Almustafa and Khalim Amjad Meerja

Egyptian Informatics Journal (2018), DOI:10.1016/j.eij.2018.03.004

ISI: Q2, Scopus: Q2


A Cloud-Based Cross - Enterprise Imaging Framework

Abdulrahman Asiri, Qasem Obiedat and Mamdouh Alenezi

i-manager’s Journal on Software Engineering Vol. 12, No. 1 (January 2018), pp. 6 - 25, DOI:10.26634/jse.12.1.13919


Software vulnerabilities detection based on security metrics at the design and code levels: empirical findings

Mamdouh Alenezi and Mohammad Zarour

Journal of Engineering Technology Vol. 6, No. 1 (2018), pp. 570-583

ISI: Q1, Scopus: Q2


2017

A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems

A. Ara, M. Al-Rodhaan, Y. Tian and A. Al-Dhelaan

in IEEE Access, vol. 5, no. , pp. 12601-12617, June 2017. (ISI Indexed), DOI:10.1109/ACCESS.2017.2716439

ISI: Q1, Scopus: Q1


Measuring Software Architecture Stability Evolution in Object-Oriented Open Source Systems

Hassan Almousa and Mamdouh Alenezi

Journal of Engineering and Applied Sciences Vol. 12, No. 2 (January 2017), pp. 353-362, DOI:10.3923/jeasci.2017.171.175

Scopus: Q3


2016

Enhancing outpatient clinics management software by reducing patients’ waiting time

Iman Almomani, Ahlam Alsarheed

Journal of Infection and Public Health, Volume 9, Issue 6, November–December 2016 [ISI], DOI:10.1016/j.jiph.2016.09.005

ISI: Q2, Scopus: Q1


WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

Iman Almomani, Bassam Kassasbeh

Journal of Sensors, Vol. 2016, Article ID 4731953, 16 pages, 2016 [ISI], DOI:10.1155/2016/4731953

ISI: Q3, Scopus: Q2


Investigating the Use of Encryption Techniques and Different Speech Coders with Multimedia Streaming

Iman Almomani

IJCSIS, Volume 14, No. 9, September 2016 [WoS]


Developer Companion: A Framework to Produce Secure Web Applications

Mamdouh Alenezi and Yasir Javed

International Journal of Computer Science and Information Security Vol.14, No.7 (2016), pp.12-16.


An Empirical Investigation of Security Vulnerabilities within Web Applications

Ibrahim Abunadi and Mamdouh Alenezi

Journal of Universal Computer Science, 2016 [ISI], DOI:10.3217/jucs-022-04-0537

ISI: Q4, Scopus: Q2


Conferences:

2023

An Enhanced Deep Super-Resolution Generative Adversarial Network Approach for Skin Disease Image Regeneration and Assessment

Ibrahim Abd El-Fattah, Taha E. Taha, Walid El-Shafai

2023 3rd International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 2023, pp. 1-6, DOI:https://doi.org/10.1109/ICEEM58740.2023.10319531


A Novel Hyper Chaotic-Cellular Automata Based Medical Image Encryption Technique

Walid El-Shafai, Ahmed Naguib, Mona Shokair

2023 3rd International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 2023, pp. 1-8, DOI:https://doi.org/10.1109/ICEEM58740.2023.10319523


An Efficient Attack Detection Framework in Software-Defined Networking using Intelligent Techniques

Heba A. Hassan, Ezz El-Din Hemdan, Mona Shokair, Fathi E. Abd El-Samie, Walid El-Shafai

2023 3rd International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 2023, pp. 1-6, DOI:https://doi.org/10.1109/ICEEM58740.2023.10319575


A Robust Technique for Steganography of Enhanced Audio Signals

Marwa A. Nasr, Walid El-Shafai, El-Sayed M. El-Rabaie, Adel S. El-Fishawy, Moawad I. Dessouky, Nariman Abdel-Salam, Fathi E. Abd El-Samie

2023 3rd International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 2023, pp. 1-6, DOI:https://doi.org/10.1109/ICEEM58740.2023.10319573


Reinforcement of Medical Image Security Through Steganography and Encryption Techniques

Fatma Khallaf, Walid El-Shafai, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie

2023 3rd International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 2023, pp. 1-4, DOI:https://doi.org/10.1109/ICEEM58740.2023.10319514


Improving DeepFake Video Detection Performance with a Noval Deep Learning Approach

Mona A. Fouda, Walid El-Shafai, El-Sayed M. El-Rabaie

2023 3rd International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 2023, pp. 1-8, DOI:https://doi.org/10.1109/ICEEM58740.2023.10319524


2022

Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers.

Ayyub Alzahem, Wadii Boulila, Maha Driss, Anis Koubaa, Iman Almomani

Conference on Computational Collective Intelligence Technologies and Applications (pp. 598-610). Springer, Cham, DOI:https://doi.org/10.1007/978-3-031-16014-1_47


An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting

Safa Ben Atitallah, Maha Driss, Wadii Boulila, Iman Almomani

Conference on Computational Collective Intelligence Technologies and Applications (pp. 180-192). Springer, Cham., DOI:https://doi.org/10.1007/978-3-031-16210-7_14


Microservices for Data Analytics in IoT Applications: Current Solutions, Open Challenges, and Future Research Directions

Safa Ben Atitallah, Maha Driss, Henda Ben Ghezela

Procedia Computer Science, 207, 3938-3947, DOI:https://doi.org/10.1016/j.procs.2022.09.456


DefOff: Defensive/Offensive System based on Hiding Technologies

Iman Almomani, Mohanned Ahmed, Walid El-Shafai

2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), 2022, DOI:10.1109/SMARTTECH54121.2022.00054


COVIBOT: A Smart Chatbot for Assistance and E-Awareness during COVID-19 Pandemic

Maha Driss, Iman Almomani, Leen Alahmadi, Linah Alhajjam, Raghad Alharbi, Shahad Alanazi

2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), 2022, DOI:https://doi.org/10.48550/arXiv.2204.07851


Automatic Saudi Arabian License Plate Detection and Recognition using Deep Convolutional Neural Networks [Accepted]

Maha Driss, Iman Almomani, Rahaf Al-Suhaimi, and Hanan Al-Harbi

The 6th International Conference of Reliable Information and Communication Technology 2021 (IRICT 2021)


Medical Image Fusion Based on Weighted Least Square Optimization and Deep Learning Algorithm

C. Ghandour, Walid El-Shafai, S. El-Rabaie

2021 9th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC), 2021, pp. 159-163, DOI:10.1109/JAC-ECC54461.2021.9691453


Comparative Study between Different Image Fusion Techniques Applied on Biomedical Images

C. Ghandour, Walid El-Shafai, S. El-Rabaie

2021 9th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC), 2021, pp. 164-169, DOI:10.1109/JAC-ECC54461.2021.9691439


2021

Automatic Saudi Arabian License Plate Detection and Recognition using Deep Convolutional Neural Networks [Accepted]

Maha Driss, Iman Almomani, Rahaf Al-Suhaimi, and Hanan Al-Harbi

The 6th International Conference of Reliable Information and Communication Technology 2021 (IRICT 2021)


SUBLμME: Secure Blockchain as a Service and Microservices-based Framework for IoT Environments

Daniah Hasan, Maha Driss

2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), 2021, pp. 1-9, DOI:10.1109/AICCSA53542.2021.9686757


Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach

Raneem Qaddoura, Ala' M. Al-Zoubi, Iman Almomani, Hossam Faris

The 10th International Conference on Information Technology (ICIT 2021), DOI:10.1109/ICIT52682.2021.9491634


An Efficient Machine Learning-based Approach For Android V.11 Ransomware Detection

Iman Almomani, Aala Alkhayer, Mohanned Ahmed

First International Conference on Artificial Intelligence & Data Analytics (CAIDA 2021), DOI:10.1109/CAIDA51941.2021.9425059


2020

ASAF: Android Static Analysis Framework

Aala AlKhayer, Iman Almomani, Khaled Elkawlak

Proceedings of theInternational Conference of Smart Systems and Emerging Technologies (SMARTTECH 2020), November 3-5, 2020, Riyadh, KSA., DOI:10.1109/SMART-TECH49988.2020.00053


LDA Categorization of Security Bug Reports in Chromium Projects

Wajdi Aljedaani, Yasir Javed, and Mamdouh Alenezi

ESSE 2020: European Symposium on Software Engineering, November 2020, Pages 154–161, Roma, Italy., DOI:https://doi.org/10.1145/3393822.3432335


DUST-MASK: A Framework for Preventing Bitcoin’s Dust Attacks

Fadyah A. AlShlawi, Nourah K. AlSa’awi, Waad Y. Bin Saleem, Anees Ara

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2020, DOI:10.1109/ICCAIS48893.2020.9096763


Toward Effective Cybersecurity Education in Saudi Arabia

Mohammad Zarour, Mamdouh Alenezi, Maurice Dawson, and Izzat Alsmadi

17th International Conference on Information Technology–New Generations (ITNG 2020), April 2020 Pages 79-85., DOI:10.1007/978-3-030-43020-7_12


A Comparison Study of Available Sofware Security Ontologies

Mamdouh Alenezi Hamid Abdul Basit, Faraz Idris Khan, Maham Anwar Beg

EASE '20: Proceedings of the Evaluation and Assessment in Software Engineering, April 2020 Pages 499–504., DOI:https://doi.org/10.1145/3383219.3383292


On the Effectiveness of Application Permissions for Android Ransomware Detection

Samah Alsoghyer, Iman Almomani

Proceedings of the 6th International Conference on Data Science and Machine Learning Applications (CDMA 2020), March 4-5, 2020, Riyadh, KSA., DOI:10.1109/CDMA47397.2020.00022


2019

Context-Sensitive Case-Based Software Security Management System

Mamdouh Alenezi, Faraz Idris Khan

Proceedings of the Computational Methods in Systems and Software, Intelligent Systems Applications in Software Engineering, pp 135-141 September 2019, DOI:10.1007/978-3-030-30329-7_13


Mobility Effect on the Authenticity of Wireless Sensor Networks [Best Paper Award]

Katrina Sundus, Iman Almomani

IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 9-11 April, 2019, Amman, Jordan., DOI:10.1109/JEEIT.2019.8717497


Android Applications Scanning: The Guide

Iman Almomani, Aala Khayer

IEEE International Conference on Computer and Information Sciences, 3-4 April, 2019, Aljouf, Saudi Arabia., DOI:10.1109/ICCISci.2019.8716380


2018

Empirical Analysis of Static Code Metrics for Predicting Risk Scores in Android Applications

Iman Almomani, Mamdouh Alenezi

Journal of Information Science and Engineering, Vol. 34, No.4, July, 2018 [ISI]., DOI:10.1007/978-3-319-78753-4_8


2017

Abusing Android Permissions: Security Perspective

Mamdouh Alenezi, Iman Almomani

IEEE Jordan Conference on Applied Electrical Engineering and Computer Technologies, 11-13 October, 2017, Amman, Jordan., DOI:10.1109/AEECT.2017.8257772


2016

Defectiveness Evolution in Open Source Software Systems

Yasir Javed and Mamdouh Alenezi

4th Symposium on Data Mining Applications (SDMA 2016), Riyadh, Saudi Arabia, December 2016., DOI:10.1016/j.procs.2016.04.015


Open Source Web Application Security: A Static Analysis Approach

Mamdouh Alenezi and Yasir Javed

International Conference on Engineering & MIS (ICEMIS’16), Agadir, Morocco, September 2016., DOI:10.1109/ICEMIS.2016.7745369


Thesis:

2019

The Impact of dynamic Analysis on the Accuracy of Ransomware Detection Systems in Android Systems

Rana Almohaini and Iman Almomani

Department of Computer Science, Prince Sultan University, 2019.


2018

Comparative Analysis of Android Ransomware Detection Techniques

Samah Alsoghyer and Iman Almomani

Department of Computer Science, Prince Sultan University, 2018.


2017

Data Flow Security Analysis for Android Applications

Shahd Abdulrahman Attar and Iman Almomani

Department of Computer Science, Prince Sultan University, 2017


2015

An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Network

Afnan Al-Romi and Iman Almomani

Department of Computer Science, Prince Sultan University, 2015


2014

Performance Comparison of Linear Regression and Artificial Neural Networks in Developing Credit Risk Models

Haneeh F. Al-Anize and Iman Almomani

Department of Computer Science, Prince Sultan University, 2014.


A Mechanism for Detecting and Classifying Denial of Service Attacks in Wireless Sensor Networks Sensor Networks using Artificial Neural Networks

Bassam Kasasbeh and Iman Almomani

Department of Computer Science, The University of Jordan, 2014.


Internet of Things - Architecture of Multiple Sources Data Acquisition Sensors

Hussain Alshehri and Mamdouh Alenezi


Framework for Security Testing of Web Applications

Laila Al-Rowais and Mamdouh Alenezi


Static Analysis of Open-Source Web Applications

Khawlah AlOmar and Mamdouh Alenezi


Books:

2023

Cyber Malware Offensive and Defensive Systems

Iman Almomani, Leandros A. Maglaras, Mohamed Amine Ferrag, Nick Ayres

Security Informatics and Law Enforcement, Springer Cham, 978-3-031-34968-3, Published: 09 November 2023, DOI:https://doi.org/10.1007/978-3-031-34969-0


ASParseV3: Auto-Static Parser and Customizable Visualizer

Iman Almomani, Rahaf Alkhadra, Mohanned Ahmed

Cyber Malware. Security Informatics and Law Enforcement. Springer, Cham., DOI:https://doi.org/10.1007/978-3-031-34969-0_3


A Deep-Vision-Based Multi-class Classification System of Android Malware Apps

Iman Almomani, Walid El-Shafai, Mohanned Ahmed, Sara AlAnsary, Ghada AlMudahi, Lama AlSwayeh

Cyber Malware. Security Informatics and Law Enforcement. Springer, Cham., DOI:https://doi.org/10.1007/978-3-031-34969-0_1


2021

A Classification Approach Based on Evolutionary Clustering and Its Application for Ransomware Detection

Raneem Qaddoura, Ibrahim Aljarah, Hossam Faris, and Iman Almomani

In: Aljarah I., Faris H., Mirjalili S. (eds) Evolutionary Data Clustering: Algorithms and Applications. Algorithms for Intelligent Systems. Springer, Singapore., DOI:https://doi.org/10.1007/978-981-33-4191-3_11


2020

Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud." in "Handbook of Research on Multimedia Cyber Security

Sadiq Almuairfi and Mamdouh Alenezi

9781799827016 (2020)


2019

Android Application Security Scanning Process

Iman Almomani and Mamdouh Alenezi

[Online First], IntechOpen. Available from: https://www.intechopen.com/online-first/android-application-security-scanning-process, 11th June, 2019, DOI:10.5772/intechopen.86661


Datasets:

  • ...
    Maloid-DS

    The dataset is a substantial, well-organized Android Malware dataset that serves as a valuable resource for researchers specializing in the field of Android malware forensics.

  • ...
    WSN-DS

    This is a specialized dataset for intrusion detection in Wireless Sensor Networks (WSNs). It contains 19 features and 374661 records that represent different types of Denial of Service (DoS) attacks including Blackhole, Grayhole, Flooding, and Scheduling attacks.

  • ...
    RansDS-API

    This dataset provides the API-packages calls (belong to Android API 27) occurrences in 500 benign and 500 ransomware apps. It includes 201 features, the app ID, 199 API packages defined in API level 27, and the app category whether benign or ransomware.

  • ...
    RansDS-API-Duplicate

    This dataset provides the API level 27 packages calls in 1785 ransomware apps including the duplicates.

  • ...
    RansDS-Permissions

    This dataset provides the permissions (belong to Android API 27) occurrences in 500 benign and 500 ransomware apps. It includes 117 features including Apps IDs, 115 permissions, and the app category whether benign or ransomware.

  • ...
    RansDS-API & Permissions

    The dataset was built based on 10,000 Android application samples (500 Ransomware and 9500 (Benign). This dataset includes 389 features; 228 API packages belong to Android API level R and 161 permissions belong to different protection levels (normal, signature, dangerous, and SignatureOrSystem). We counted the occurrences of these features on the collected samples.

  • ...
    RansImDS-API& Permissions

    The dataset was built based on 10,000 Android application samples (500 Ransomware and 9500 (Benign). This dataset includes 389 features; 228 API packages belong to Android API level R and 161 permissions belong to different protection levels (normal, signature, dangerous, and SignatureOrSystem). We counted the occurrences of these features on the collected samples.

  • ...
    Android Permissions

    The Android Permissions dataset contains all Android defined permissions including added and deprecated ones. It covers API level 1 (2008) to API level 30 (2020). Furthermore, it provides the protection level of each permission. Additionally, the dataset illustrates each group of the dangerous permissions.

  • ...
    RansApp-DS

    This dataset contains the hashes of 2959 ransomware applications. They are collected from different sources such as from Koodous , RansomProper project and VirusTotal.

  • ...
    BenignApp-DS-1

    This dataset includes samples of more than 672 recent benign applications downloaded from different categories in Google play store.

  • ...
    BenignApp-DS-2

    The APK files of benign samples were downloaded from Google Play Store from different categories.

Tools:

asparse

ASParseV3

2023

Auto Static Parse (ASParse) is a feature extraction tool. ASParse provides users the ability to parse selected features of Android applications which can then be fed to any classifier for further analysis.

Read more
asparse

Secure V2X Communications

2023

SEL designs, develops, and deploys smart software and hardware solutions for securing Vehicle to Anything (V2X) communications. The suggested solutions achieve the necessary security requirements, including authentication, integrity, confidentiality, and availability, to ensure safe communications in transportation systems.

Read more

Funded-Projects:

2023

●Advancing Document Security: AI-Powered Detection of Malware in PDF and Office Files Using Transformers

Status: Approved
PI: Dr. Iman Almomani
Budget: 30,000 SAR
Funding Company: Prince Sultan University
Duration: 12 months


2022

●Testbed-Based Offensive/Defensive Solutions for V2X Communication Systems

Status: Approved
PI: Dr. Iman Almomani
Budget: 30,000 SAR
Funding Company: Prince Sultan University
Duration: 12 months


2021

●Security Maturity Assessment Framework for Saudi Organizations

Status: Approved
PI: Dr. Iman Almomani
Budget: 15,000 SAR
Funding Company: Prince Sultan University
Duration: 12 months


●Efficient Malware Concealing Mechanisms using Multimedia Steganography

Status: Approved
PI: Dr. Iman Almomani
Budget: 15,000 SAR
Funding Company: Prince Sultan University
Duration: 12 months


2020

●Knowledge Management for Software Security with a Semantic Wiki Platform

Status: Approved
PI: Dr. Mamdouh Alenezi
Budget: 22,000 SAR
Funding Company: Prince Sultan University
Duration: 24 months


●Securing Data Integrity of Electronic Medical Records (EMR) through Blockchain: Kingdom of Saudi Arabia Perspectives

Status: Approved
PI: Dr. Mamdouh Alenezi
Budget: 25,000 SAR
Funding Company: Prince Sultan University
Duration: 9 months


●ARO: Android Ransomware Ontology

Status: Approved
PI: Dr. Iman Almomani
Budget: 20,000 SAR
Funding Company: Prince Sultan University
Duration: 12 months


2019

●RDS: Ransomware Detection System for Android Applications

Status: Approved
PI: Dr. Iman Almomani
Budget: 15,000 SAR
Funding Company: Prince Sultan University
Duration: 6 months


●SSHEF: Software Security Self-Healing Framework

Status: Approved
PI: Dr. Mamdouh Alenezi
Budget: 15,000 SAR
Funding Company: Prince Sultan University

●Analysing the Relationship between Software Security and Usability: An Object-Oriented Design Perspective

Status: Approved
PI: Dr. Mamdouh Alenezi
Budget: 15,000 SAR
Funding Company: Prince Sultan University

Statistics

Top