Marianne Azer
Orcid: 0000-0002-8068-5120
According to our database1,
Marianne Azer
authored at least 50 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on nileu.edu.eg
On csauthors.net:
Bibliography
2024
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs.
Cryptogr., September, 2024
Empowering Pedestrian Safety: Unveiling a Lightweight Scheme for Improved Vehicle-Pedestrian Safety.
Inf., March, 2024
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
Cryptogr., March, 2024
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization.
Inf., 2024
Comput. Electr. Eng., 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Comput. Electr. Eng., September, 2023
Future Internet, July, 2023
Algorithms, February, 2023
NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack.
IEEE Access, 2023
2022
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs.
IEEE Trans. Cogn. Commun. Netw., 2022
Ad Hoc Networks, 2022
IEEE Access, 2022
Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks.
IEEE Access, 2022
Proceedings of the 4th Novel Intelligent and Leading Emerging Sciences Conference, 2022
2021
Proceedings of the International Conference on Communications, 2021
2020
Proceedings of the ICSIE 2020: 2020 9th International Conference on Software and Information Engineering, 2020
Proceedings of the Ad Hoc Networks - 12th EAI International Conference, 2020
2019
Proceedings of the International Conference on Smart Applications, 2019
2018
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks.
Proceedings of the 2018 Wireless Days, 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Int. J. Comput. Appl. Technol., 2017
2016
Proceedings of the 10th International Conference on Informatics and Systems, 2016
2015
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks.
Secur. Commun. Networks, 2015
2014
Proceedings of the 10th International Conference on Information Assurance and Security, 2014
2013
Proceedings of the Advances in Security of Information and Communication Networks, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Int. J. Emerg. Technol. Learn., 2011
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010
2009
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
CoRR, 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes.
Proceedings of the SECRYPT 2009, 2009
2008
Proceedings of the The Third International Conference on Availability, 2008
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
2006
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
Proceedings of the SECRYPT 2006, 2006