Abd EL-Aziz Ahmed
Abd EL-Aziz Ahmed
Jouf University and Cairo University
بريد إلكتروني تم التحقق منه على cu.edu.eg - الصفحة الرئيسية
عنوانعدد مرات الاقتباساتالسنة
JSON Encryption
AA Abd El-Aziz, A Kannan
2014 International Conference on Computer Communication and Informatics …, 2014
124*2014
A Survey on Exploring Key Performance Indicators
M Badawy, AA Abd El-Aziz, H. Hefny, AM Idress, S Hossam
Future Computing and Informatics Journal, 10.1016/j.fcij.2016.04.001, 2016, 2016
482016
Mapping XML DTDs to relational schemas
AA Abd El-Aziz, H Oakasha
Computer Systems and Applications, 2005. The 3rd ACS/IEEE International …, 2005
152005
A Comprehensive Presentation to XACML
AA Abd El-Aziz, A Kannan
In the Proceedings of the Third International Conference on Computational …, 2013
10*2013
A Literature Review on Twitter Data Analysis
H Anber, A Salah, AA Abd El-Aziz
2016 2nd International Conference on Computer and Information Technology …, 2016
82016
Effectiveness of Web Usage Mining Techniques in Business Application
A ElAzab, AA Abd El-Aziz, MA Mahmood
IGI Global, 2016
42016
Analysis of Learning Objectives for Higher Education Textbooks using Text Mining
M Badawy, AA Abd El-Aziz, HA Hefny
12th International Computer Engineering Conference Boundless Smart …, 2016
3*2016
A secure Algorithm for Executing Queries over Encrypted Data
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
Third World Conference on Complex Systems ( WCCS15) during November 23-25 …, 2015
32015
XML Access Control: Mapping XACML Policies to Relational Database Tables
AA Abd El-Aziz, A Kannan
IAJIT 11 (6), 9, 2014
32014
Survey on securing a querying process by blocking SQL injection
Y Gomaa, AEA Ahmed, MA Mahmood, H Hefny
2015 Third World Conference on Complex Systems (WCCS), 1-7, 2015
22015
A Literature Survey on Mapping between Fuzzy XML Databases and Relational or Object Oriented Databases
MM Gamal, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The Third World Conference on Complex Systems( WCCS15), November 23-25, 2015 …, 2015
22015
A Survey On Executing Query On Encrypted Database
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The International Conference on Intelligent Information Technologies (ICIIT …, 2014
2*2014
Storing XML Rules in Relational Storage of XML DTD
AA Abd El-Aziz, A Kannan
The Second International Conference on Computational Science, Engineering …, 2012
2*2012
Relational Storage for XML Rules
AA Abd El-Aziz, A Kannan
International Journal of Web Service Computing (IJWSC) 3 (4), 2012
1*2012
Storing XML documents and XML policies in Relational Databases
AA Abd El-Aziz, A Kannan
2nd international conference on computer communication and informatics-2012 …, 2012
1*2012
An Extended Data Protection Model Based on Cipher-Text-Policy Attribute Based Encryption Model and an XACML Framework in Cloud Computing
AA Abd EL-Aziz
International journal of Advanced Sciene and Technology (IJAST) 28 (16 …, 2019
2019
A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture
A Baker., AA Abd EL-Aziz, Hesham A. Hefny
International journal of Advanced Sciene and Technology (IJAST) 28 (12), 187-200, 2019
2019
Assessment of the central venous-to-arterial carbon dioxide tension difference (pCO [sub] 2 delta) in adult patients with sepsis: a systematic review.
A Ahmed, Y Mohamed, K Gaballah, A Abd El Aziz
Menoufia Medical Journal 32 (4), 1177-1177, 2019
2019
A Cloud Authentication Mechanism over Encrypted Data using XACML Framework
AA Abd EL-Aziz, AM Mostafa
Jokull 69 (8), 7, 2019
2019
Social Network Analysis through Big Data Platform Review
MM Abo Khedra, AA Abd EL-Aziz, Hesham A. Hefny
in proceeding of the 2019 International Conference on Computer and …, 2019
2019
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20