Dr. Marianne A.  Azer
Dr. Marianne A. Azer
MCIT, National Telecommunication Institute, Nile University
Verified email at nu.edu.eg
TitleCited byYear
A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks
M Azer, S El-Kassas, M El-Soudani
arXiv preprint arXiv:0906.1245, 2009
522009
A survey on trust and reputation schemes in ad hoc networks
MA Azer, SM El-Kassas, AWF Hassan, MS El-Soudani
2008 Third International Conference on Availability, Reliability and …, 2008
442008
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
2010 International Conference on Networking, Sensing and Control (ICNSC …, 2010
272010
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
2010 International Conference on Networking, Sensing and Control (ICNSC …, 2010
272010
Cloud computing security: challenges and future trends
T Radwan, MA Azer, N Abdelbaki
International Journal of Computer Applications in Technology 55 (2), 158-172, 2017
192017
Immuning routing protocols from the wormhole attack in wireless ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
2009 Fourth International Conference on Systems and Networks Communications …, 2009
192009
A survey on anomaly detection methods for ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
Ubiquitous Computing and Communication Journal 2 (3), 67-76, 2005
192005
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme
M Azer, S El-Kassas, AW Hassan, M El-Soudani
2008 Third International Conference on Availability, Reliability and …, 2008
182008
A secure and privacy‐preserving event reporting scheme for vehicular Ad Hoc networks
K Rabieh, MMEA Mahmoud, M Azer, M Allam
Security and Communication Networks 8 (17), 3271-3281, 2015
162015
Certification and revocation schemes in ad hoc networks survey and challenges
MA Azer, SM El-Kassas, MS El-Soudani
2007 Second International Conference on Systems and Networks Communications …, 2007
152007
IoT ethics challenges and legal issues
A AboBakr, MA Azer
2017 12th International Conference on Computer Engineering and Systems …, 2017
122017
Threshold cryptography and authentication in ad hoc networks survey and challenges
MA Azer, SM El-Kassas, MS El-Soudani
2007 Second International Conference on Systems and Networks Communications …, 2007
122007
Security in ad hoc networks: from vulnerability to risk management
MA Azer, SM El-Kassas, MS El-Soudani
2009 Third International Conference on Emerging Security Information …, 2009
112009
El-Kassas, Abdel Wahab F
MA Azer, M Sherif
Hassan, Magdy S. El-Soudani," A Survey on Trust and Reputation Schemes in Ad …, 2008
112008
Using Attack Graphs in Ad Hoc Networks-For Intrusion Prediction Correlation and Detection
M Azer, S El-Kassas, M El-Soudani
International Conference on Security and Cryptography 2, 63-68, 2006
92006
Performance evaluation of AODV under dos attacks
PA Lotfy, MA Azer
6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-4, 2013
82013
Immunizing the saodv protocol against routing information disclosure
AA Hanafy, SH Noureldin, MA Azer
2011 International Conference for Internet Technology and Secured …, 2011
82011
Cultural challenges in developing e-learning content
M Azer, A El-Sherbini
International Journal of Emerging Technologies in Learning (iJET) 6 (1), 11-14, 2011
72011
A novel proximity based trust model for opportunistic networks
MH El-Sherief, MA Azer
2013 International Conference on Availability, Reliability and Security, 281-284, 2013
62013
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
M Khalil, MA Azer
2018 Wireless Days (WD), 184-186, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20