Hisham Alasmary
Orcid: 0000-0002-6482-3968
According to our database1,
Hisham Alasmary
authored at least 43 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2018
2019
2020
2021
2022
2023
2024
0
5
10
7
8
5
3
3
4
3
2
6
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Blockchain-Enhanced Time-Variant Mean Field-Optimized Dynamic Computation Sharing in Mobile Network.
IEEE Trans. Wirel. Commun., September, 2024
Futuristic Decentralized Vehicular Network Architecture and Repairing Management System on Blockchain.
IEEE Internet Things J., July, 2024
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing.
IEEE Trans. Mob. Comput., May, 2024
ScalableDigitalHealth (SDH): An IoT-Based Scalable Framework for Remote Patient Monitoring.
Sensors, February, 2024
IEEE Trans. Veh. Technol., January, 2024
Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization.
IEEE Trans. Computers, January, 2024
IEEE Access, 2024
2023
Symmetry, November, 2023
CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things.
Internet Things, October, 2023
Deep convolutional cross-connected kernel mapping support vector machine based on SelectDropout.
Inf. Sci., May, 2023
Sensors, March, 2023
Sensors, February, 2023
Comput. Networks, February, 2023
Network load prediction and anomaly detection using ensemble learning in 5G cellular networks.
Comput. Commun., 2023
A Provable Secure and Efficient Authentication Framework for Smart Manufacturing Industry.
IEEE Access, 2023
2022
DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2022
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation.
IEEE Internet Things J., 2022
Comput. Networks, 2022
Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022
Analysis of Tree-Family Machine Learning Techniques for Risk Prediction in Software Requirements.
IEEE Access, 2022
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering.
Proceedings of the 12th International Conference on Communication and Network Security, 2022
Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing.
Proceedings of the International Conference on Computer, 2022
Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment.
Proceedings of the International Conference on Computer, 2022
2021
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation.
CoRR, 2021
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021
Comput. Networks, 2021
2020
EAI Endorsed Trans. Security Safety, 2020
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification.
CoRR, 2020
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
2019
IEEE Internet Things J., 2019
CoRR, 2019
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019
Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019
2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018