Mahmoud Elkhodr

Orcid: 0000-0001-9904-7551

According to our database1, Mahmoud Elkhodr authored at least 28 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Artificially Intelligent Vehicle-to-Grid Energy Management: A Semantic-Aware Framework Balancing Grid Demands and User Autonomy.
Comput., October, 2024

A Systematic Review and Comprehensive Analysis of Pioneering AI Chatbot Models from Education to Healthcare: ChatGPT, Bard, Llama, Ernie and Grok.
Future Internet, July, 2024

A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness.
Future Internet, 2024

IoT-Enhanced Malicious URL Detection Using Machine Learning.
Proceedings of the Advanced Information Networking and Applications, 2024

Vulnerability Assessment and Risk Modeling of IoT Smart Home Devices.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A simulated measurement for COVID-19 pandemic using the effective reproductive number on an empirical portion of population: epidemiological models.
Neural Comput. Appl., November, 2023

Identifying Fake News in the Russian-Ukrainian Conflict Using Machine Learning.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Covert Timing Channels Detection Based on Image Processing Using Deep Learning.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services.
Sensors, 2021

Enhancing Robots Navigation in Internet of Things Indoor Systems.
Comput., 2021

A Cloud-Based Mobile Application for Women with Gestational Diabetes.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Data provenance and trust establishment in the Internet of Things.
Secur. Priv., 2020

Prevention of Cross-Site Scripting Attacks in Web Applications.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
On the challenges of data provenance in the Internet of Things.
CoRR, 2019

Passive RFID Localization in the Internet of Things.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

A Distributed Trust Management Model for the Internet of Things (DTM-IoT).
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

2018
Data Provenance in the Internet of Things.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
RFID Localisation For Internet Of Things Smart Homes: A Survey.
CoRR, 2017

2016
Emerging Wireless Technologies in the Internet of Things: a Comparative Study.
CoRR, 2016

The Internet of Things: New Interoperability, Management and Security Challenges.
CoRR, 2016

A Middleware for the Internet of Things.
CoRR, 2016

2015
Managing the Internet of Things.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

A Smart Home Application Based on the Internet of Things Management Platform.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

2014
A semantic obfuscation technique for the Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2014

2013
A contextual-adaptive Location Disclosure Agent for general devices in the Internet of Things.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

2011
An approach to enhance the security of remote health monitoring systems.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Enhancing the security of mobile health monitoring systems through trust negotiations.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Improving e-Health Security through Trust Negotiation.
Proceedings of the ICSOFT 2011, 2011


  Loading...