Abd EL-Aziz Ahmed
Abd EL-Aziz Ahmed
Jouf University and Cairo University
بريد إلكتروني تم التحقق منه على cu.edu.eg - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
JSON Encryption
AA Abd El-Aziz, A Kannan
2014 International Conference on Computer Communication and Informatics …, 2014
156*2014
A Survey on Exploring Key Performance Indicators
M Badawy, AA Abd El-Aziz, H. Hefny, AM Idress, S Hossam
Future Computing and Informatics Journal, 10.1016/j.fcij.2016.04.001, 2016, 2016
662016
Mapping XML DTDs to relational schemas
AA Abd El-Aziz, H Oakasha
Computer Systems and Applications, 2005. The 3rd ACS/IEEE International …, 2005
182005
Access control for healthcare data using extended XACML-SRBAC model
AA Abd EL-Aziz, A Kannan
2012 International Conference on Computer Communication and Informatics, 1-4, 2012
172012
A Literature Review on Twitter Data Analysis
H Anber, A Salah, AA Abd El-Aziz
2016 2nd International Conference on Computer and Information Technology …, 2016
112016
A Comprehensive Presentation to XACML
AA Abd El-Aziz, A Kannan
In the Proceedings of the Third International Conference on Computational …, 2013
112013
XML Access Control: Mapping XACML Policies to Relational Database Tables
AA Abd El-Aziz, A Kannan
IAJIT 11 (6), 9, 2014
52014
Effectiveness of Web Usage Mining Techniques in Business Application
A ElAzab, AA Abd El-Aziz, MA Mahmood
IGI Global, 2016
42016
Survey on securing a querying process by blocking SQL injection
Y Gomaa, MA Mahmood, H Hefny
2015 Third World Conference on Complex Systems (WCCS), 1-7, 2015
42015
Storing XML documents and XML policies in Relational Databases
AA Abd El-Aziz, A Kannan
2nd international conference on computer communication and informatics-2012 …, 2012
4*2012
Analysis of Learning Objectives for Higher Education Textbooks using Text Mining
M Badawy, AA Abd El-Aziz, HA Hefny
12th International Computer Engineering Conference Boundless Smart …, 2016
32016
Federated cloud computing security using forward-secure broadcast encryption HIBE
F Rekaby, AA Abd El-Aziz, MA Mahmood, HA Hefny
2015 11th International Computer Engineering Conference (ICENCO), 13-18, 2015
32015
A secure Algorithm for Executing Queries over Encrypted Data
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
Third World Conference on Complex Systems ( WCCS15) during November 23-25 …, 2015
32015
Storing XML Rules in Relational Storage of XML DTD
AA Abd El-Aziz, A Kannan
The Second International Conference on Computational Science, Engineering …, 2012
3*2012
A Novel Coronavirus Forecasting Model using Nonlinear Autoregressive Artificial Neural Network
NM Ghazaly, MA Abdel-Fattah, AA Abd EL-Aziz
International journal of Advanced Sciene and Technology (IJAST) 29 (5), 2020
22020
A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture
A Baker., AA Abd EL-Aziz, Hesham A. Hefny
International journal of Advanced Sciene and Technology (IJAST) 28 (12), 187-200, 2019
22019
A Literature Survey on Mapping between Fuzzy XML Databases and Relational or Object Oriented Databases
MM Gamal, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The Third World Conference on Complex Systems( WCCS15), November 23-25, 2015 …, 2015
22015
A Survey On Executing Query On Encrypted Database
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The International Conference on Intelligent Information Technologies (ICIIT …, 2014
2*2014
A Survey on XML Security
AA Abd El-Aziz, A Kannan
In the Proceedings of the 3rd International Conference on Recent Trends in …, 2013
22013
Social Network Analysis through Big Data Platform Review
MMA Khedra, AA Abd EL-Aziz, HA Hefny
2019 International Conference on Computer and Information Sciences (ICCIS), 1-5, 2019
12019
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20