关注
Walid Khedr
Walid Khedr
Professor of Cyber Security, College of Computers and Informatics, Zagazig University, Egypt
在 zu.edu.eg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A lightweight android malware classifier using novel feature selection methods
A Salah, E Shalabi, W Khedr
Symmetry 12 (5), 858, 2020
422020
Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage
WI Khedr, HM Khater, ER Mohamed
IEEE Access 7, 65635-65651, 2019
352019
SRFID: A hash-based security scheme for low cost RFID systems
WI Khedr
Egyptian Informatics Journal 14 (1), 89-98, 2013
322013
Robust image hashing using exact Gaussian–Hermite moments
KM Hosny, YM Khedr, WI Khedr, ER Mohamed
IET Image Processing 12 (12), 2178-2185, 2018
262018
Robust color image hashing using quaternion polar complex exponential transform for image authentication
KM Hosny, YM Khedr, WI Khedr, ER Mohamed
Circuits, Systems, and Signal Processing 37 (12), 5441-5462, 2018
262018
FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks
WI Khedr, AE Gouda, ER Mohamed
IEEE Access 11, 28934-28954, 2023
242023
New vertical handover prediction schemes for LTE-WLAN heterogeneous networks
KM Hosny, MM Khashaba, WI Khedr, FA Amer
PloS one 14 (4), e0215334, 2019
212019
Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol
WI Khedr
Journal of Information Security and Applications 39, 41-57, 2018
192018
A new efficient and configurable image encryption structure for secure transmission
WI Khedr
Multimedia Tools and Applications 79 (23), 16797-16821, 2020
182020
A TOPSIS based Method for Gene Selection for Cancer Classification
IM Abd-ElFattah, W Khedr, KM Sallam
International Journal of Computer Applications 67 (17), 39-44, 2013
152013
Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network
AAE Walid I. Khedr, Mahmoud I. Abdalla
IET Information Security, 2015
132015
Recognition of phonetic Arabic figures via wavelet based Mel Frequency Cepstrum using HMMs
IM El-Henawy, WI Khedr, OM ELkomy, AZMI Abdalla
HBRC Journal 10 (1), 49-54, 2014
132014
An efficient neural network-based prediction scheme for heterogeneous networks
KM Hosny, MM Khashaba, WI Khedr, FA Amer
International Journal of Sociotechnology and Knowledge Development (IJSKD …, 2020
112020
Improved Lightweight Authentication Scheme for IEEE 802.11 p Vehicle-to-Infrastructure Communication.
WI Khedr
Adhoc & Sensor Wireless Networks 31, 2016
112016
On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
W Khedr
International Journal of Network Security 16, 333-339, 2014
92014
Prediction-based secured handover authentication for mobile cloud computing
WI Khedr, KM Hosny, MM Khashaba, FA Amer
Wireless Networks 26 (6), 4657-4675, 2020
72020
Framework to secure the OAuth 2.0 and JSON web token for rest API
E Rushdy, W Khedr, N Salah
Journal of Theoretical and Applied Information Technology 99 (9), 2144-2161, 2021
62021
AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks
M Hamad, W Khedr
International Conference on Security and Cryptography (SECRYPT 2009), 274 - 284, 2009
52009
Managing a secure refresh token implementation with json web token in rest api
E Rushdy, W Khedr, N Salah
Full Length Article 2 (1), 01-1-20, 2021
42021
P4-HLDMC: A novel framework for DDoS and ARP attack detection and mitigation in SD-IoT networks using machine learning, stateful P4, and distributed multi-controller architecture
WI Khedr, AE Gouda, ER Mohamed
Mathematics 11 (16), 3552, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20