Hisham A. Kholidy
Orcid: 0000-0002-7673-5850
According to our database1,
Hisham A. Kholidy
authored at least 53 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication.
Clust. Comput., December, 2024
Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs.
Peer Peer Netw. Appl., May, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach.
Sensors, July, 2023
IEEE Trans. Netw. Serv. Manag., March, 2023
Enhancing Object Detection for VIPs Using YOLOv4_Resnet101 and Text-to-Speech Conversion Model.
Multimodal Technol. Interact., 2023
Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks.
IEEE Access, 2023
Proceedings of the Tenth International Conference on Software Defined Systems, 2023
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G Networks.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G Networks.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
2022
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method.
Sensors, 2022
5G Network Management, Orchestration, and Architecture: A Practical Study of the MonB5G project.
CoRR, 2022
Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform.
CoRR, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022
Proceedings of the 2022 IEEE Future Networks World Forum, 2022
An Innovative Hashgraph-based Federated Learning Approach for Multi Domain 5G Network Protection.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022
2021
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach.
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems.
CoRR, 2021
A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks.
CoRR, 2021
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
2020
Correlation-based sequence alignment models for detecting masquerades in cloud computing.
IET Inf. Secur., 2020
An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs.
Comput. Commun., 2020
2019
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems.
Secur. Commun. Networks, 2019
2018
Proceedings of the Services - SERVICES 2018, 2018
2017
Proceedings of the Future Network Systems and Security - Third International Conference, 2017
A Comparison of Graph-Based Synthetic Data Generators for Benchmarking Next-Generation Intrusion Detection Systems.
Proceedings of the 2017 IEEE International Conference on Cluster Computing, 2017
2016
Computing, 2016
An efficient hybrid prediction approach for predicting cloud consumer resource needs.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016
2015
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
2014
Proceedings of the Internet of Things. User-Centric IoT, 2014
A Finite Context Intrusion Prediction Model for Cloud Systems with a Probabilistic Suffix Tree.
Proceedings of the 2014 European Modelling Symposium, Pisa, Italy, October 21-23, 2014, 2014
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems.
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014
2013
Proceedings of the Fifth International Conference on Computational Intelligence, 2013
2012
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
2010
Towards developing an Arabic word alignment annotation tool with some Arabic alignment guidelines.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
A study for access control flow analysis with a proposed job analyzer component based on stack inspection methodology.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010
2009
A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009