关注
Heba Aslan
Heba Aslan
Professor of Information Security, ITCS, Nile University. Electronics Research Institute
在 nu.edu.eg 的电子邮件经过验证
标题
引用次数
引用次数
年份
A novel deep learning framework for copy-moveforgery detection in images
MA Elaskily, HA Elnemr, A Sedik, MM Dessouky, GM El Banby, ...
Multimedia Tools and Applications 79, 19167-19192, 2020
862020
WiMax security
M Nasreldin, H Aslan, M El-Hennawy, A El-Hennawy
22nd International Conference on Advanced Information Networking and …, 2008
572008
A survey of IoT security threats and defenses
HI Ahmed, AA Nasr, S Abdel-Mageid, HK Aslan
International Journal of Advanced Computer Research 9 (45), 325-350, 2019
462019
DADEM: Distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT)
HI Ahmed, AA Nasr, SM Abdel-Mageid, HK Aslan
International Journal of Ambient Computing and Intelligence (IJACI) 12 (1 …, 2021
282021
Comparative study of copy-move forgery detection techniques
MA Elaskily, HK Aslan, OA Elshakankiry, OS Faragallah, FE Abd El-Samie, ...
2017 Intl Conf on advanced control circuits systems (ACCS) Systems & 2017 …, 2017
262017
New real time multicast authentication protocol
R Abdellatif, HK Aslan, SH Elramly
2008 International Conference on Computer Engineering & Systems, 245-250, 2008
252008
A scalable and distributed multicast security protocol using a subgroup-key hierarchy
HK Aslan
Computers & Security 23 (4), 320-329, 2004
232004
A hybrid scheme for multicast authentication over lossy networks
HK Aslan
Computers & Security 23 (8), 705-713, 2004
202004
Digital forensics evidence acquisition and chain of custody in cloud computing
MM Nasreldin, M El-Hennawy, HK Aslan, A El-Hennawy
IJCSI International Journal of Computer Science Issues 12 (1), 153-160, 2015
192015
Implementation of a hybrid encryption scheme for Ethernet
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings IEEE Symposium on Computers and Communications, 150-156, 1995
171995
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach.
MMN Rasslan, YH Dakroury, HK Aslan
Int. J. Netw. Secur. 8 (1), 75-89, 2009
142009
Intrusion detection for electric vehicle charging systems (evcs)
M ElKashlan, H Aslan, M Said Elsayed, AD Jurcut, MA Azer
Algorithms 16 (2), 75, 2023
122023
A design of a fast parallel-pipelined implementation of AES: Advanced Encryption Standard
GF Elkabbany, HK Aslan, MN Rasslan
arXiv preprint arXiv:1501.01427, 2015
122015
Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution
HK Aslan
Computers & Security 23 (4), 290-299, 2004
122004
Security in the information society: visions and perspectives
MA Ghonaimy, MT El-Hadidi, HK Aslan
Springer, 2012
112012
A survey on parameters affecting Manet Performance
AM Eltahlawy, HK Aslan, EG Abdallah, MS Elsayed, AD Jurcut, MA Azer
Electronics 12 (9), 1956, 2023
102023
Anomaly detection of zero-day attacks based on CNN and regularization techniques
B Ibrahim Hairab, HK Aslan, MS Elsayed, AD Jurcut, MA Azer
Electronics 12 (3), 573, 2023
92023
Logic-based analysis of a new hybrid encryption protocol for authentication and key distribution
MT El-Hadidi, NH Hegazi, HK Aslan
Global IT security (Vienna, Budapest, 31 August-2 September 1998), 173-183, 1998
91998
Performance evaluation of a new hybrid encryption protocol for authentication and key distribution
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings IEEE International Symposium on Computers and Communications …, 1999
81999
Performance analysis of the Kerberos protocol in a distributed environment
MT El-Hadidi, NH Hegazi, HK Aslan
Proceedings Second IEEE Symposium on Computer and Communications, 235-239, 1997
81997
系统目前无法执行此操作,请稍后再试。
文章 1–20