A novel deep learning framework for copy-moveforgery detection in images MA Elaskily, HA Elnemr, A Sedik, MM Dessouky, GM El Banby, ... Multimedia Tools and Applications 79, 19167-19192, 2020 | 62 | 2020 |
WiMax security M Nasreldin, H Aslan, M El-Hennawy, A El-Hennawy 22nd International Conference on Advanced Information Networking and …, 2008 | 57 | 2008 |
A survey of IoT security threats and defenses HI Ahmed, AA Nasr, S Abdel-Mageid, HK Aslan International Journal of Advanced Computer Research 9 (45), 325-350, 2019 | 34 | 2019 |
New real time multicast authentication protocol R Abdellatif, HK Aslan, SH Elramly 2008 International Conference on Computer Engineering & Systems, 245-250, 2008 | 24 | 2008 |
DADEM: Distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT) HI Ahmed, AA Nasr, SM Abdel-Mageid, HK Aslan International Journal of Ambient Computing and Intelligence (IJACI) 12 (1 …, 2021 | 23 | 2021 |
Comparative study of copy-move forgery detection techniques MA Elaskily, HK Aslan, OA Elshakankiry, OS Faragallah, FE Abd El-Samie, ... 2017 Intl Conf on advanced control circuits systems (ACCS) Systems & 2017 …, 2017 | 22 | 2017 |
A scalable and distributed multicast security protocol using a subgroup-key hierarchy HK Aslan Computers & Security 23 (4), 320-329, 2004 | 21 | 2004 |
A hybrid scheme for multicast authentication over lossy networks HK Aslan Computers & Security 23 (8), 705-713, 2004 | 20 | 2004 |
Digital forensics evidence acquisition and chain of custody in cloud computing MM Nasreldin, M El-Hennawy, HK Aslan, A El-Hennawy IJCSI International Journal of Computer Science Issues 12 (1), 153-160, 2015 | 17 | 2015 |
Implementation of a hybrid encryption scheme for Ethernet MT El-Hadidi, NH Hegazi, HK Aslan Proceedings IEEE Symposium on Computers and Communications, 150-156, 1995 | 16 | 1995 |
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach. MMN Rasslan, YH Dakroury, HK Aslan Int. J. Netw. Secur. 8 (1), 75-89, 2009 | 14 | 2009 |
A design of a fast parallel-pipelined implementation of AES: Advanced Encryption Standard GF Elkabbany, HK Aslan, MN Rasslan arXiv preprint arXiv:1501.01427, 2015 | 12 | 2015 |
Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution HK Aslan Computers & Security 23 (4), 290-299, 2004 | 12 | 2004 |
Security in the information society: visions and perspectives MA Ghonaimy, MT El-Hadidi, HK Aslan Springer, 2012 | 11 | 2012 |
Logic-based analysis of a new hybrid encryption protocol for authentication and key distribution MT El-Hadidi, NH Hegazi, HK Aslan Global IT security (Vienna, Budapest, 31 August-2 September 1998), 173-183, 1998 | 9 | 1998 |
Performance evaluation of a new hybrid encryption protocol for authentication and key distribution MT El-Hadidi, NH Hegazi, HK Aslan Proceedings IEEE International Symposium on Computers and Communications …, 1999 | 8 | 1999 |
Performance analysis of the Kerberos protocol in a distributed environment MT El-Hadidi, NH Hegazi, HK Aslan Proceedings Second IEEE Symposium on Computer and Communications, 235-239, 1997 | 8 | 1997 |
On the security of two improved authenticated encryption schemes M Rasslan, HK Aslan International Journal of Security and Networks 8 (4), 194-199, 2013 | 7 | 2013 |
Enhanced Fiilltterr-based SIFT Apprroach fforr Copy-Move Forrgerry Dettecttiion M Elaskily, H Aslan, M Dessouky, A El-Samie, O Faragallah, ... Menoufia Journal of Electronic Engineering Research 28 (1), 159-182, 2019 | 5 | 2019 |
Two-level controllers hierarchy for a scalable and distributed multicast security protocol HK Aslan Computers & Security 24 (5), 399-408, 2005 | 5 | 2005 |