Sherif El-Kassas
Affiliations:- Department of Computer Science and Engineering, American University in Cairo, Cairo, Egypt
According to our database1,
Sherif El-Kassas
authored at least 28 papers
between 1989 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on aucegypt.edu
On csauthors.net:
Bibliography
2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
2011
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
2010
Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements.
IET Softw., 2010
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010
2009
Egypt. Comput. Sci. J., 2009
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
CoRR, 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Tracing DDoS attacks using VPNs and mobile agents.
Proceedings of the ISCA 20th International Conference on Parallel and Distributed Computing Systems, 2007
2006
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Q2SWinet'06, 2006
2005
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005
2002
An Efficient Hybrid Sealed Bid Auction Protocol.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
1992
Proceedings of the 1992 IEEE Workshop on Visual Languages, 1992
1989