A lightweight android malware classifier using novel feature selection methods A Salah, E Shalabi, W Khedr Symmetry 12 (5), 858, 2020 | 42 | 2020 |
Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage WI Khedr, HM Khater, ER Mohamed IEEE Access 7, 65635-65651, 2019 | 35 | 2019 |
SRFID: A hash-based security scheme for low cost RFID systems WI Khedr Egyptian Informatics Journal 14 (1), 89-98, 2013 | 32 | 2013 |
Robust image hashing using exact Gaussian–Hermite moments KM Hosny, YM Khedr, WI Khedr, ER Mohamed IET Image Processing 12 (12), 2178-2185, 2018 | 26 | 2018 |
Robust color image hashing using quaternion polar complex exponential transform for image authentication KM Hosny, YM Khedr, WI Khedr, ER Mohamed Circuits, Systems, and Signal Processing 37 (12), 5441-5462, 2018 | 26 | 2018 |
FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks WI Khedr, AE Gouda, ER Mohamed IEEE Access 11, 28934-28954, 2023 | 24 | 2023 |
New vertical handover prediction schemes for LTE-WLAN heterogeneous networks KM Hosny, MM Khashaba, WI Khedr, FA Amer PloS one 14 (4), e0215334, 2019 | 21 | 2019 |
Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol WI Khedr Journal of Information Security and Applications 39, 41-57, 2018 | 19 | 2018 |
A new efficient and configurable image encryption structure for secure transmission WI Khedr Multimedia Tools and Applications 79 (23), 16797-16821, 2020 | 18 | 2020 |
A TOPSIS based Method for Gene Selection for Cancer Classification IM Abd-ElFattah, W Khedr, KM Sallam International Journal of Computer Applications 67 (17), 39-44, 2013 | 15 | 2013 |
Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network AAE Walid I. Khedr, Mahmoud I. Abdalla IET Information Security, 2015 | 13 | 2015 |
Recognition of phonetic Arabic figures via wavelet based Mel Frequency Cepstrum using HMMs IM El-Henawy, WI Khedr, OM ELkomy, AZMI Abdalla HBRC Journal 10 (1), 49-54, 2014 | 13 | 2014 |
An efficient neural network-based prediction scheme for heterogeneous networks KM Hosny, MM Khashaba, WI Khedr, FA Amer International Journal of Sociotechnology and Knowledge Development (IJSKD …, 2020 | 11 | 2020 |
Improved Lightweight Authentication Scheme for IEEE 802.11 p Vehicle-to-Infrastructure Communication. WI Khedr Adhoc & Sensor Wireless Networks 31, 2016 | 11 | 2016 |
On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags W Khedr International Journal of Network Security 16, 333-339, 2014 | 9 | 2014 |
Prediction-based secured handover authentication for mobile cloud computing WI Khedr, KM Hosny, MM Khashaba, FA Amer Wireless Networks 26 (6), 4657-4675, 2020 | 7 | 2020 |
Framework to secure the OAuth 2.0 and JSON web token for rest API E Rushdy, W Khedr, N Salah Journal of Theoretical and Applied Information Technology 99 (9), 2144-2161, 2021 | 6 | 2021 |
AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks M Hamad, W Khedr International Conference on Security and Cryptography (SECRYPT 2009), 274 - 284, 2009 | 5 | 2009 |
Managing a secure refresh token implementation with json web token in rest api E Rushdy, W Khedr, N Salah Full Length Article 2 (1), 01-1-20, 2021 | 4 | 2021 |
P4-HLDMC: A novel framework for DDoS and ARP attack detection and mitigation in SD-IoT networks using machine learning, stateful P4, and distributed multi-controller architecture WI Khedr, AE Gouda, ER Mohamed Mathematics 11 (16), 3552, 2023 | 3 | 2023 |