Follow
Aly M El-semary
Aly M El-semary
Professor of Systems and Computer Engineering
Verified email at azhar.edu.eg
Title
Cited by
Cited by
Year
BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map
AM El-Semary, H Diab
IEEE Access 7, 95197-95211, 2019
1072019
Applying data mining of fuzzy association rules to network intrusion detection
Edmonds, Papa
2006 IEEE information assurance workshop, 100-107, 2006
792006
A framework for hybrid fuzzy logic intrusion detection systems
A El, J Edmonds, J Gonzalez, M Papa
The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ'05., 325-330, 2005
412005
New trends in secure routing protocols for wireless sensor networks
AM El-Semary, MM Abdel-Azim
International Journal of Distributed Sensor Networks 9 (5), 802526, 2013
342013
Secure image cryptosystem with unique key streams via hyper-chaotic system
H Diab, AM El-semary
Signal Processing 142, 53-68, 2018
322018
Path energy weight: A global energy-aware routing protocol for wireless sensor networks
AM El-Semary, MMA Azim
2010 IFIP Wireless Days, 1-6, 2010
222010
Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically
H Diab, AM El-semary
Signal Processing 148, 172-192, 2018
172018
Counter chain: a new block cipher mode of operation
AM El-Semary, MMA Azim
Journal of Information Processing Systems 11 (2), 266-279, 2015
92015
Distributed and scalable intrusion detection system based on agents and intelligent techniques
AM El-Semary, MGHM Mostafa
Journal of Information Processing Systems 6 (4), 481-500, 2010
82010
Vulnerability assessment for mission critical networks against region failures: A case study
M Azim, A El-Semary
Proceedings of the 2nd International Conference on Communications and …, 2012
72012
A Dual-Sink Secure Routing Protocol for Wireless Sensor Networks.
AM El-Semary, M Azim
Journal of Information Assurance & Security 7 (6), 2012
42012
A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks
AM El-Semary, MMA Azim
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
42011
Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess.
A El-Semary, J Edmonds, J González, M Papa
ICEIS (2), 390-393, 2005
32005
Energy-Efficient Secure Routing Protocol Based on Roulette-Wheel and μTesla for Wireless Sensor Networks
AM El-Semary
The International Journal of Sensor Networks and Data Communications 1, 0
3
SPCBC: A secure parallel cipher block chaining mode of operation based on logistic chaotic map
AM El-Semary, MMA Azim, H Diab
KSII Transactions on Internet and Information Systems (TIIS) 11 (7), 3608-3628, 2017
22017
Secure Hybrid Payment System in KSA
AEA Aly M. Elsemary, Abdullah A. AlAnoor, Ahmad A. Alshammari
International Journal of Computing and Digital Systems 5 (1), 59-71, 2016
2*2016
A framework for network intelligence and security
AM El-Semary
The University of Tulsa, 2004
22004
Assessing the Vulnerabilities of Mission-Critical Wireless Sensor Networks
MMA Azim, AM Al-Semary
Wireless Sensor Networks-Technology and Protocols, 2012
12012
El-Semary, Mostafa Gadal-Haqq M. Mostafa,“Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques,”
M Aly
Journal of Information Processing Systems 6 (4), 2010
2010
Detecting Objectionable Internet Images using Artificial Neural network
AM El-semary
The University of Tulsa, 2001
2001
The system can't perform the operation now. Try again later.
Articles 1–20