Shadi Nashwan

Orcid: 0000-0002-1476-4162

According to our database1, Shadi Nashwan authored at least 15 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models.
Int. Arab J. Inf. Technol., 2024

Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

2023
Transactional Services for Concurrent Mobile Agents over Edge/Cloud Computing-Assisted Social Internet of Things.
ACM J. Data Inf. Qual., September, 2023

Synthetic Generation of Multidimensional Data to Improve Classification Model Validity.
ACM J. Data Inf. Qual., September, 2023

2022
Analysis of the Desynchronization Attack Impact on the E2EA Scheme.
Comput. Syst. Sci. Eng., 2022

Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems.
Comput. Syst. Sci. Eng., 2022

2021
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme.
Sensors, 2021

Reducing the Overhead Messages Cost of the SAK-AKA Authentication Scheme for 4G/5G Mobile Networks.
IEEE Access, 2021

2020
General model for best feature extraction of EEG using discrete wavelet transform wavelet family and differential evolution.
Int. J. Distributed Sens. Networks, 2020

Design a secure IoT Architecture using Smart Wireless Networks.
Int. J. Commun. Networks Inf. Secur., 2020

2018
Performance Analysis of SAP-NFC Protocol.
Int. J. Commun. Networks Inf. Secur., 2018

2017
SE-H: A Secure and Efficient Hash Protocol for RFID System.
Int. J. Commun. Networks Inf. Secur., 2017

SAK-AKA: a secure anonymity key of authentication and key agreement protocol for LTE network.
Int. Arab J. Inf. Technol., 2017

2007
A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007


  Loading...