Nashwa Abdelbaki

Orcid: 0000-0002-2724-6209

Affiliations:
  • Nile University, Cairo, Egypt


According to our database1, Nashwa Abdelbaki authored at least 46 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization.
Inf., 2024

Rigorous Assessment of 5G O-RAN Security Protocol Stack.
Proceedings of the 6th Novel Intelligent and Leading Emerging Sciences Conference, 2024

2023
Community Detection Applications in Mobile Networks: Towards Data-Driven Design for Next Generation Cellular Networks.
J. Commun. Inf. Networks, March, 2023

Autonomous Traffic-Aware and QoS-Constrained Capacity Cell Shutdown for Green Mobile Networks.
Proceedings of the 5th Novel Intelligent and Leading Emerging Sciences Conference, 2023

Clipboard Data Attacks and Detection via Remote Desktop Protocol.
Proceedings of the 5th Novel Intelligent and Leading Emerging Sciences Conference, 2023

Unsupervised Anomaly Detection for Throughput Enhancement in Mobile Networks.
Proceedings of the International Conference on Computer and Applications, 2023

Remote Clipboard Data In-Memory Attacks and Detection.
Proceedings of Research papers at APWG.EU TECH 2023 co-located with the APWG.EU Tech 2023 Summit & Researchers Sync-Up (APWG.EU Tech 2023), 2023

2022
Detecting Mimikatz in Lateral Movements Using Windows API Call Sequence Analysis.
Proceedings of the 4th Novel Intelligent and Leading Emerging Sciences Conference, 2022

Feasibility Study of Using Predictive LTE Connection Selection from Multi-Operator for Teleoperated Vehicles.
Proceedings of the International Conference on Computer and Applications, 2022

Semi-Supervised Machine Learning Applications in RAN Design: Towards Data-Driven Next Generation Cellular Networks.
Proceedings of the International Conference on Computer and Applications, 2022

A Survey of Concurrency Control Algorithms in Collaborative Applications.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022

Handwriting Letter Recognition on the Steering Wheel Switches.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022

2021
Efficient Quering Blockchain Applications.
Proceedings of the 3rd Novel Intelligent and Leading Emerging Sciences Conference, 2021

Supervised Models Enhancement using UnSupervised Transition in Mobile Network.
Proceedings of the 31st International Conference on Computer Theory and Applications, 2021

Software-Defined Networks Towards Big Data: A Survey.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2021

A Comprehensive Survey on Vehicular Ad Hoc Networks (VANET).
Proceedings of the Advanced Machine Learning Technologies and Applications, 2021

2020
5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies.
Proceedings of the 2nd Novel Intelligent and Leading Emerging Sciences Conference, 2020

nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks.
Proceedings of the 2nd Novel Intelligent and Leading Emerging Sciences Conference, 2020

Evaluation of Software Static Analyzers.
Proceedings of the ICSIE 2020: 2020 9th International Conference on Software and Information Engineering, 2020

Acoustic Attacks in IOT Era: Risks and Mitigations.
Proceedings of the CCIOT 2020: 5th International Conference on Cloud Computing and Internet of Things, 2020

2019
NONYM!ZER: Mitigation Framework for Browser Fingerprinting.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

2018
Malware Detection using Opcode Trigram Sequence with SVM.
Proceedings of the 26th International Conference on Software, 2018

Enhanced Approach to Detect Malicious VBScript Files Based on Data Mining Techniques.
Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops, 2018

Comparison Study of Digital Forensics Analysis Techniques; Findings versus Resources.
Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops, 2018

A New Static-Based Framework for Ransomware Detection.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Browsers Fingerprinting Motives, Methods, and Countermeasures.
Proceedings of the 2018 International Conference on Computer, 2018

Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs.
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2018

Hybrid Information Filtering Engine for Personalized Job Recommender System.
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2018

A Postmortem Forensic Analysis for a JavaScript Based Attack.
Proceedings of the Computer and Network Security Essentials., 2018

Experimental Digital Forensics of Subscriber Identification Module (SIM) Card.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Cloud computing security: challenges and future trends.
Int. J. Comput. Appl. Technol., 2017

Innovative human-robot interaction for a robot tutor in biology game.
Proceedings of the 18th International Conference on Advanced Robotics, 2017

A Survey on Smart Cities' IoT.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, 2017

HTTP Application Layer DDoS Attack Mitigation Using Resources Monitor.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, 2017

Gesture Recognition for Improved User Experience in Augmented Biology Lab.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, 2017

Stock Exchange Threat Modeling, EGX as a Case Study.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, 2017

2014
Towards Cloud Customers Self-Monitoring and Availability-Monitoring.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

Convergence study of IPv6 tunneling techniques.
Proceedings of the 10th International Conference on Communications, 2014

New Governance Framework to Secure Cloud Computing.
Proceedings of the Cloud Computing and Services Sciences, 2014

A New Cloud Computing Governance Framework.
Proceedings of the CLOSER 2014, 2014

Cluster Head election in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Towards IT-Legal Framework for Cloud Computing.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

VoIP performance evaluation over IPv4-6 and manually configured tunnels.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013

VoIP Performance Evaluation over IPv4-6 and 6to4 Networks.
Proceedings of the 2013 23rd International Conference on Computer Theory and Applications (ICCTA), 2013

2005
Study of Inter-effect and Behavior of Multimedia Traffic in a QoS-Enabled Communication Network.
Proceedings of the Advances in Multimedia Information Processing, 2005

2004
Simulation and Development of Event-Driven Multimedia Session.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004


  Loading...