dblp.uni-trier.dewww.uni-trier.de

Sherif El-Kassas

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
12EEYomna Ali, Sherif El-Kassas, Mohy Mahmoud: A Rigorous Methodology for Security Architecture Modeling and Verification. HICSS 2009: 1-10
11EERiham Hassan, Shawn A. Bohner, Sherif El-Kassas, Michael G. Hinchey: Integrating Formal Analysis and Design to Preserve Security Properties. HICSS 2009: 1-10
2008
10EERiham Hassan, Shawn A. Bohner, Sherif El-Kassas, Mohamed Eltoweissy: Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements. ARES 2008: 1443-1450
9EEMarianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani: Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. ARES 2008: 636-641
8EEMarianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy M. S. El-Soudani: A Survey on Trust and Reputation Schemes in Ad Hoc Networks. ARES 2008: 881-886
2007
7EEMarianne Azer, Sherif El-Kassas, Magdy M. S. El-Soudani: Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 17
6EEMarianne Azer, Sherif El-Kassas, Magdy M. S. El-Soudani: Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 5
5 Ahmed M. Azab, Samir I. Shaheen, Sherif El-Kassas: Tracing DDoS attacks using VPNs and mobile agents. ISCA PDCS 2007: 68-73
2006
4EEHoda M. Hassan, Mohy Mahmoud, Sherif El-Kassas: Securing the AODV protocol using specification-based intrusion detection. Q2SWinet 2006: 33-36
3 Marianne Azer, Sherif El-Kassas, Magdi M. S. El-Soudani: Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. SECRYPT 2006: 63-68
2005
2EERamy Bebawy, Hesham Sabry, Sherif El-Kassas, Youssef Hanna, Youssef Youssef: Nedgty: Web Services Firewall. ICWS 2005: 597-601
1EEAbdalla Mahmoud, Ahmed Sameh, Sherif El-Kassas: Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN). PE-WASUN 2005: 258-259

Coauthor Index

1Yomna Ali [12]
2Ahmed M. Azab [5]
3Marianne Azer [3] [6] [7] [8] [9]
4Ramy Bebawy [2]
5Shawn A. Bohner [10] [11]
6Magdy M. S. El-Soudani (Magdi M. S. El-Soudani) [3] [6] [7] [8] [9]
7Mohamed Eltoweissy [10]
8Youssef Hanna [2]
9Abdel Wahab F. Hassan [8] [9]
10Hoda M. Hassan [4]
11Riham Hassan [10] [11]
12Michael G. Hinchey (Mike Hinchey) [11]
13Abdalla Mahmoud [1]
14Mohy Mahmoud [4] [12]
15Hesham Sabry [2]
16Ahmed Sameh [1]
17Samir I. Shaheen [5]
18Youssef Youssef [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)