2009 |
12 | EE | Yomna Ali,
Sherif El-Kassas,
Mohy Mahmoud:
A Rigorous Methodology for Security Architecture Modeling and Verification.
HICSS 2009: 1-10 |
11 | EE | Riham Hassan,
Shawn A. Bohner,
Sherif El-Kassas,
Michael G. Hinchey:
Integrating Formal Analysis and Design to Preserve Security Properties.
HICSS 2009: 1-10 |
2008 |
10 | EE | Riham Hassan,
Shawn A. Bohner,
Sherif El-Kassas,
Mohamed Eltoweissy:
Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
ARES 2008: 1443-1450 |
9 | EE | Marianne Azer,
Sherif El-Kassas,
Abdel Wahab F. Hassan,
Magdy M. S. El-Soudani:
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme.
ARES 2008: 636-641 |
8 | EE | Marianne Azer,
Sherif El-Kassas,
Abdel Wahab F. Hassan,
Magdy M. S. El-Soudani:
A Survey on Trust and Reputation Schemes in Ad Hoc Networks.
ARES 2008: 881-886 |
2007 |
7 | EE | Marianne Azer,
Sherif El-Kassas,
Magdy M. S. El-Soudani:
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges.
ICSNC 2007: 17 |
6 | EE | Marianne Azer,
Sherif El-Kassas,
Magdy M. S. El-Soudani:
Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges.
ICSNC 2007: 5 |
5 | | Ahmed M. Azab,
Samir I. Shaheen,
Sherif El-Kassas:
Tracing DDoS attacks using VPNs and mobile agents.
ISCA PDCS 2007: 68-73 |
2006 |
4 | EE | Hoda M. Hassan,
Mohy Mahmoud,
Sherif El-Kassas:
Securing the AODV protocol using specification-based intrusion detection.
Q2SWinet 2006: 33-36 |
3 | | Marianne Azer,
Sherif El-Kassas,
Magdi M. S. El-Soudani:
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
SECRYPT 2006: 63-68 |
2005 |
2 | EE | Ramy Bebawy,
Hesham Sabry,
Sherif El-Kassas,
Youssef Hanna,
Youssef Youssef:
Nedgty: Web Services Firewall.
ICWS 2005: 597-601 |
1 | EE | Abdalla Mahmoud,
Ahmed Sameh,
Sherif El-Kassas:
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN).
PE-WASUN 2005: 258-259 |