Amira Sayed A. Aziz
According to our database1,
Amira Sayed A. Aziz
authored at least 17 papers
between 2012 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Comput. Syst. Sci. Eng., 2023
Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network.
Comput. Syst. Sci. Eng., 2023
Improved Attentive Recurrent Network for Applied Linguistics-Based Offensive Speech Detection.
Comput. Syst. Sci. Eng., 2023
Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption.
Comput. Syst. Sci. Eng., 2023
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model.
Comput. Syst. Sci. Eng., 2023
Modified Seagull Optimization With Deep Learning for Affect Classification in Arabic Tweets.
IEEE Access, 2023
2022
A fuzzy-based fast routing algorithm with guaranteed latency-throughput over software defined networks.
J. King Saud Univ. Comput. Inf. Sci., 2022
2017
Comparison of classification techniques applied for network intrusion detection and classification.
J. Appl. Log., 2017
2014
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014
CoRR, 2014
CoRR, 2014
Multi-agent Artificial Immune System for Network Intrusion Detection and Classification.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
2013
Proceedings of the Advances in Security of Information and Communication Networks, 2013
Multi-layer hybrid machine learning techniques for anomalies detection and classification approach.
Proceedings of the 13th International Conference on Hybrid Intelligent Systems, 2013
Genetic Algorithms with Different Feature Selection Techniques for Anomaly Detectors Generation.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
2012
Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm.
Informatica (Slovenia), 2012
Detectors Generation using Genetic Algorithm for a Negative Selection Inspired Anomaly Network Intrusion Detection System.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012