A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks M Azer, S El-Kassas, M El-Soudani arXiv preprint arXiv:0906.1245, 2009 | 68 | 2009 |
Capturing security requirements for software systems H El-Hadary, S El-Kassas Journal of advanced research 5 (4), 463-472, 2014 | 59 | 2014 |
A survey on trust and reputation schemes in ad hoc networks MA Azer, SM El-Kassas, AWF Hassan, MS El-Soudani 2008 Third International Conference on Availability, Reliability and …, 2008 | 55 | 2008 |
Securing the AODV protocol using specification-based intrusion detection HM Hassan, M Mahmoud, S El-Kassas Proceedings of the 2nd ACM international workshop on Quality of service …, 2006 | 29 | 2006 |
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks MA Azer, SM El-Kassas, MS El-Soudani 2010 International Conference on Networking, Sensing and Control (ICNSC …, 2010 | 28 | 2010 |
Nedgty: Web services firewall R Bebawy, H Sabry, S El-Kassas, Y Hanna, Y Youssef IEEE International Conference on Web Services (ICWS'05), 2005 | 28 | 2005 |
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN) A Mahmoud, A Sameh, S El-Kassas Proceedings of the 2nd ACM international workshop on Performance evaluation …, 2005 | 27 | 2005 |
A rigorous methodology for security architecture modeling and verification Y Ali, S El-Kassas Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 25 | 2008 |
Immuning routing protocols from the wormhole attack in wireless ad hoc networks MA Azer, SM El-Kassas, MS El-Soudani 2009 Fourth International Conference on Systems and Networks Communications …, 2009 | 22 | 2009 |
A survey on anomaly detection methods for ad hoc networks MA Azer, SM El-Kassas, MS El-Soudani Ubiquitous Computing and Communication Journal 2 (3), 67-76, 2005 | 22 | 2005 |
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme M Azer, S El-Kassas, AW Hassan, M El-Soudani 2008 Third International Conference on Availability, Reliability and …, 2008 | 20 | 2008 |
Goal-oriented, B-based formal derivation of security design specifications from security requirements R Hassan, S Bohner, S El-Kassas, M Eltoweissy 2008 Third International Conference on Availability, Reliability and …, 2008 | 20 | 2008 |
Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements R Hassan, M Eltoweissy, S Bohner, S El-Kassas IET software 4 (2), 149-160, 2010 | 17 | 2010 |
Integrating formal analysis and design to preserve security properties R Hassan, S Bohner, S El-Kassas, M Hinchey 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 17 | 2009 |
Applying Scrum framework in the IT service support domain M Shalaby, S El-Kassas 2011 IEEE Asia-Pacific Services Computing Conference, 9-15, 2011 | 16 | 2011 |
Certification and revocation schemes in ad hoc networks survey and challenges MA Azer, SM El-Kassas, MS El-Soudani 2007 Second International Conference on Systems and Networks Communications …, 2007 | 15 | 2007 |
Developing a security typed java servlet D Hassan, S El-Kassas, I Ziedan 2008 The Fourth International Conference on Information Assurance and …, 2008 | 13 | 2008 |
Security in ad hoc networks: from vulnerability to risk management MA Azer, SM El-Kassas, MS El-Soudani 2009 Third International Conference on Emerging Security Information …, 2009 | 12 | 2009 |
Threshold cryptography and authentication in ad hoc networks survey and challenges MA Azer, SM El-Kassas, MS El-Soudani 2007 Second International Conference on Systems and Networks Communications …, 2007 | 12 | 2007 |
Using Attack Graphs in Ad Hoc Networks-For Intrusion Prediction Correlation and Detection M Azer, S El-Kassas, M El-Soudani International Conference on Security and Cryptography 2, 63-68, 2006 | 11 | 2006 |