![]() | ![]() |
2009 | ||
---|---|---|
3 | EE | Yomna Ali, Sherif El-Kassas, Mohy Mahmoud: A Rigorous Methodology for Security Architecture Modeling and Verification. HICSS 2009: 1-10 |
2008 | ||
2 | Mohy Mahmoud, Sherif G. Aly, Sherif AbdelSalam: Policy-Based Messaging Services in a Pervasive Environment. ICWN 2008: 234-240 | |
2006 | ||
1 | EE | Hoda M. Hassan, Mohy Mahmoud, Sherif El-Kassas: Securing the AODV protocol using specification-based intrusion detection. Q2SWinet 2006: 33-36 |
1 | Sherif AbdelSalam | [2] |
2 | Yomna Ali | [3] |
3 | Sherif G. Aly | [2] |
4 | Sherif El-Kassas | [1] [3] |
5 | Hoda M. Hassan | [1] |