Abd EL-Aziz Ahmed
Abd EL-Aziz Ahmed
Jouf University and Cairo University
Verified email at cu.edu.eg - Homepage
TitleCited byYear
JSON Encryption
AA Abd El-Aziz, A Kannan
2014 International Conference on Computer Communication and Informatics …, 2014
A Survey on Exploring Key Performance Indicators
M Badawy, AA Abd El-Aziz, H. Hefny, AM Idress, S Hossam
Future Computing and Informatics Journal, 10.1016/j.fcij.2016.04.001, 2016, 2016
Mapping XML DTDs to relational schemas
AA Abd El-Aziz, H Oakasha
Computer Systems and Applications, 2005. The 3rd ACS/IEEE International …, 2005
A Comprehensive Presentation to XACML
AA Abd El-Aziz, A Kannan
In the Proceedings of the Third International Conference on Computational …, 2013
A Literature Review on Twitter Data Analysis
H Anber, A Salah, AA Abd El-Aziz
2016 2nd International Conference on Computer and Information Technology …, 2016
Effectiveness of Web Usage Mining Techniques in Business Application
A ElAzab, AA Abd El-Aziz, MA Mahmood
IGI Global, 2016
A secure Algorithm for Executing Queries over Encrypted Data
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
Third World Conference on Complex Systems ( WCCS15) during November 23-25 …, 2015
Analysis of Learning Objectives for Higher Education Textbooks using Text Mining
M Badawy, AA Abd El-Aziz, HA Hefny
12th International Computer Engineering Conference Boundless Smart …, 2016
XML Access Control: Mapping XACML Policies to Relational Database Tables
AA Abd El-Aziz, A Kannan
IAJIT 11 (6), 9, 2014
Survey on Securing a Querying process by Blocking SQL injection
Y Gomaa, AEA Ahmed, MA Mahmood, H Hefny
2015 Third World Conference on Complex Systems (WCCS), 1-7, 2015
A Literature Survey on Mapping between Fuzzy XML Databases and Relational or Object Oriented Databases
MM Gamal, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The Third World Conference on Complex Systems( WCCS15), November 23-25, 2015 …, 2015
A Survey On Executing Query On Encrypted Database
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The International Conference on Intelligent Information Technologies (ICIIT …, 2014
Storing XML Rules in Relational Storage of XML DTD
AA Abd El-Aziz, A Kannan
The Second International Conference on Computational Science, Engineering …, 2012
Relational Storage for XML Rules
AA Abd El-Aziz, A Kannan
International Journal of Web Service Computing (IJWSC) 3 (4), 2012
A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture
A Baker., AA Abd EL-Aziz, Hesham A. Hefny
International journal of Advanced Sciene and Technology (IJAST) 28 (12), 187-200, 2019
A Cloud Authentication Mechanism over Encrypted Data using XACML Framework
AA Abd EL-Aziz, AM Mostafa
Jokull 69 (8), 7, 2019
Social Network Analysis through Big Data Platform Review
MM Abo Khedra, AA Abd EL-Aziz, Hesham A. Hefny
in proceeding of the 2019 International Conference on Computer and …, 2019
A Survey on Mobile Virtualization using Cloud Computing
H M. Said, AA Abd El-Aziz, AEA Khamis
International Journal of Information Technology (IIJIT) 6 (6), 9, 2018
Swarm Optimization Techniques: A survey
MF Amira, AA Abd El-Aziz, AH Hesham, AF Ahmed
Egyptian Computer Science Journal 42 (3), 12, 2018
Analysis of Major Events in Egypt based on Twitter
A Anber, H., Salah, AA Abd El-Aziz
Journal of Computers 13 (3), 2018
The system can't perform the operation now. Try again later.
Articles 1–20