default search action
Marianne Azer
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Ahmed M. Eltahlawy, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
Detection of sequence number attacks using enhanced AODV protocol in MANETs. Comput. Electr. Eng. 118: 109395 (2024) - [j17]Ahmad Kabil, Heba Aslan, Marianne Azer:
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. Cryptogr. 8(1): 4 (2024) - [j16]Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan:
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs. Cryptogr. 8(3): 43 (2024) - [j15]Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki, Marianne A. Azer:
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization. Inf. 15(1): 46 (2024) - [j14]Khaled Rabieh, Rasha Samir, Marianne A. Azer:
Empowering Pedestrian Safety: Unveiling a Lightweight Scheme for Improved Vehicle-Pedestrian Safety. Inf. 15(3): 160 (2024) - [c31]Ashraf Abdelhamid, Mahmoud Said Elsayed, Heba K. Aslan, Marianne A. Azer:
Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation. ARES 2024: 124:1-124:9 - 2023
- [j13]Ayman M. El-Zoghby, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack. IEEE Access 11: 48169-48191 (2023) - [j12]Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
Intrusion Detection for Electric Vehicle Charging Systems (EVCS). Algorithms 16(2): 75 (2023) - [j11]Ahmed Refaat Mousa, Mahmoud Said Elsayed, Anca Jurcut, Marianne A. Azer:
A lightweight-X-authentication protocol over automotive gateway. Comput. Electr. Eng. 110: 108887 (2023) - [j10]Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut, Marianne Azer:
Analysis of ICS and SCADA Systems Attacks Using Honeypots. Future Internet 15(7): 241 (2023) - [j9]Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
IoT Vulnerabilities and Attacks: SILEX Malware Case Study. Symmetry 15(11): 1978 (2023) - 2022
- [j8]Belal Ibrahim Hairab, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks. IEEE Access 10: 98427-98440 (2022) - [j7]Ahmad Kabil, Khaled Rabieh, Faisal Kaleem, Marianne A. Azer:
Vehicle to Pedestrian Systems: Survey, Challenges and Recent Trends. IEEE Access 10: 123981-123994 (2022) - [j6]Mena Safwat, Ali Elgammal, Eslam G. AbdAllah, Marianne A. Azer:
Survey and taxonomy of information-centric vehicular networking security attacks. Ad Hoc Networks 124: 102696 (2022) - [j5]Mena Safwat, Ali Elgammal, Eslam G. AbdAllah, Marianne A. Azer:
Segmented OTA Platform Over ICN Vehicular Networks. Mob. Networks Appl. 27(3): 1327-1336 (2022) - [j4]Mahmoud Said Elsayed, Nhien-An Le-Khac, Marianne A. Azer, Anca D. Jurcut:
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs. IEEE Trans. Cogn. Commun. Netw. 8(4): 1862-1880 (2022) - [c30]Khaled Fawzy Mohamed, Marianne A. Azer:
Malware Detection Techniques. NILES 2022: 349-353 - 2021
- [c29]Khaled Rabieh, Ahmet Furkan Aydogan, Marianne A. Azer:
Towards Safer Roads: An Efficient VANET-based Pedestrian Protection Scheme. CCCI 2021: 1-6 - 2020
- [c28]Ali Elgammal, Mena Safwat, Wael M. Badawy, Eslam G. AbdAllah, Marianne A. Azer, Changcheng Huang:
Vehicle Software Update over ICN Architectures. ADHOCNETS 2020: 44-54 - [c27]Ayman M. El-Zoghby, Marianne A. Azer:
Survey of Code Reuse Attacks and Comparison of Mitigation Techniques. ICSIE 2020: 88-96
2010 – 2019
- 2019
- [c26]Mohamed Mesbah, Marianne Azer:
Cyber Threats and Policies for Industrial Control Systems. SmartNets 2019: 1-6 - 2018
- [c25]Mohamed A. Abo-Soliman, Marianne A. Azer:
Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. ARES 2018: 34:1-34:8 - [c24]Loay Abdelrazek, Marianne A. Azer:
User Privacy in Legacy Mobile Network Protocols. ICSRS 2018: 109-114 - [c23]Mohamed A. Abo-Soliman, Marianne A. Azer:
Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments. ICUFN 2018: 268-273 - [c22]Loay Abdelrazek, Marianne A. Azer:
SigPloit: A New Signaling Exploitation Framework. ICUFN 2018: 481-486 - [c21]Mahmoud Said Elsayed, Marianne A. Azer:
Detection and Countermeasures of DDoS Attacks in Cloud Computing. ICUFN 2018: 708-713 - [c20]Mohamed Khalil, Marianne A. Azer:
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks. Wireless Days 2018: 184-186 - 2017
- [j3]Tarek Radwan, Marianne A. Azer, Nashwa Abdelbaki:
Cloud computing security: challenges and future trends. Int. J. Comput. Appl. Technol. 55(2): 158-172 (2017) - 2016
- [c19]Ahmed Refaat Mousa, Pakinam NourElDeen, Marianne Azer, Mahmoud Allam:
Lightweight Authentication Protocol Deployment over FlexRay. INFOS 2016: 233-239 - 2015
- [j2]Khaled Rabieh, Mohamed M. E. A. Mahmoud, Marianne Azer, Mahmoud Allam:
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks. Secur. Commun. Networks 8(17): 3271-3281 (2015) - 2014
- [c18]Sara El-Refaay, Marianne A. Azer, Nashwa Abdelbaki:
Cluster Head election in Wireless Sensor Networks. IAS 2014: 1-5 - 2013
- [c17]Mai H. El-Sherief, Marianne A. Azer:
A Novel Proximity Based Trust Model for Opportunistic Networks. ARES 2013: 281-284 - [c16]Poussy A. Amr, Marianne A. Azer:
Performance evaluation of AODV under dos attacks. WMNC 2013: 1-4 - [c15]Mohamed Fathy, Marianne Azer, Moustapha Bahgat, Ayman Yehia:
Security access control research trends. WMNC 2013: 1-6 - [c14]Amr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer:
Hardware Advancements Effects on MANET Development, Application and Research. SecNet 2013: 44-53 - 2012
- [c13]Marianne Azer, Ahmed Shaker, Sherif Nagy, Ahmed Raafat, Mohamad M. Abuzaid:
Organizational Risk Assessment Based on Attacks Repetition. ARES 2012: 286-290 - [c12]Mohamad M. Abuzaid, Marianne A. Azer:
Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks. ARES 2012: 383-387 - 2011
- [j1]Marianne Amir Azer, Ahmed Mostafa El-Sherbini:
Cultural Challenges in Developing E-Learning Content. Int. J. Emerg. Technol. Learn. 6(1): 11-14 (2011) - [c11]Marianne A. Azer:
Wormhole Attacks Mitigation in Ad Hoc Networks. ARES 2011: 561-568 - [c10]Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer:
Immunizing the SAODV protocol against routing information disclosure. ICITST 2011: 330-334 - [c9]Khaled Mohammed Rabieh, Marianne Amir Azer:
Combating Sybil Attacks in Vehicular Ad Hoc Networks. WiMo/CoNeCo 2011: 65-72 - 2010
- [c8]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks. ICNSC 2010: 366-371
2000 – 2009
- 2009
- [c7]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes. SECRYPT 2009: 69-74 - [c6]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Security in Ad Hoc Networks: From Vulnerability to Risk Management. SECURWARE 2009: 203-209 - [i1]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks. CoRR abs/0906.1245 (2009) - 2008
- [c5]Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani:
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. ARES 2008: 636-641 - [c4]Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani:
A Survey on Trust and Reputation Schemes in Ad Hoc Networks. ARES 2008: 881-886 - 2007
- [c3]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 5 - [c2]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 17 - 2006
- [c1]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. SECRYPT 2006: 63-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint