Follow
Sherif El-Kassas
Sherif El-Kassas
Verified email at aucegypt.edu - Homepage
Title
Cited by
Cited by
Year
A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks
M Azer, S El-Kassas, M El-Soudani
arXiv preprint arXiv:0906.1245, 2009
682009
Capturing security requirements for software systems
H El-Hadary, S El-Kassas
Journal of advanced research 5 (4), 463-472, 2014
592014
A survey on trust and reputation schemes in ad hoc networks
MA Azer, SM El-Kassas, AWF Hassan, MS El-Soudani
2008 Third International Conference on Availability, Reliability and …, 2008
552008
Securing the AODV protocol using specification-based intrusion detection
HM Hassan, M Mahmoud, S El-Kassas
Proceedings of the 2nd ACM international workshop on Quality of service …, 2006
292006
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
2010 International Conference on Networking, Sensing and Control (ICNSC …, 2010
282010
Nedgty: Web services firewall
R Bebawy, H Sabry, S El-Kassas, Y Hanna, Y Youssef
IEEE International Conference on Web Services (ICWS'05), 2005
282005
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)
A Mahmoud, A Sameh, S El-Kassas
Proceedings of the 2nd ACM international workshop on Performance evaluation …, 2005
272005
A rigorous methodology for security architecture modeling and verification
Y Ali, S El-Kassas
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
252008
Immuning routing protocols from the wormhole attack in wireless ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
2009 Fourth International Conference on Systems and Networks Communications …, 2009
222009
A survey on anomaly detection methods for ad hoc networks
MA Azer, SM El-Kassas, MS El-Soudani
Ubiquitous Computing and Communication Journal 2 (3), 67-76, 2005
222005
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme
M Azer, S El-Kassas, AW Hassan, M El-Soudani
2008 Third International Conference on Availability, Reliability and …, 2008
202008
Goal-oriented, B-based formal derivation of security design specifications from security requirements
R Hassan, S Bohner, S El-Kassas, M Eltoweissy
2008 Third International Conference on Availability, Reliability and …, 2008
202008
Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements
R Hassan, M Eltoweissy, S Bohner, S El-Kassas
IET software 4 (2), 149-160, 2010
172010
Integrating formal analysis and design to preserve security properties
R Hassan, S Bohner, S El-Kassas, M Hinchey
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
172009
Applying Scrum framework in the IT service support domain
M Shalaby, S El-Kassas
2011 IEEE Asia-Pacific Services Computing Conference, 9-15, 2011
162011
Certification and revocation schemes in ad hoc networks survey and challenges
MA Azer, SM El-Kassas, MS El-Soudani
2007 Second International Conference on Systems and Networks Communications …, 2007
152007
Developing a security typed java servlet
D Hassan, S El-Kassas, I Ziedan
2008 The Fourth International Conference on Information Assurance and …, 2008
132008
Security in ad hoc networks: from vulnerability to risk management
MA Azer, SM El-Kassas, MS El-Soudani
2009 Third International Conference on Emerging Security Information …, 2009
122009
Threshold cryptography and authentication in ad hoc networks survey and challenges
MA Azer, SM El-Kassas, MS El-Soudani
2007 Second International Conference on Systems and Networks Communications …, 2007
122007
Using Attack Graphs in Ad Hoc Networks-For Intrusion Prediction Correlation and Detection
M Azer, S El-Kassas, M El-Soudani
International Conference on Security and Cryptography 2, 63-68, 2006
112006
The system can't perform the operation now. Try again later.
Articles 1–20