default search action
Nashwa Abdelbaki
Person information
- affiliation: Nile University, Cairo, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki, Marianne A. Azer:
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization. Inf. 15(1): 46 (2024) - 2023
- [j2]Ayman Gaber, Nashwa Abdelbaki, Tamer Arafa:
Community Detection Applications in Mobile Networks: Towards Data-Driven Design for Next Generation Cellular Networks. J. Commun. Inf. Networks 8(1): 155-163 (2023) - [c39]Khaled Fawzy Mohamed, Nashwa Abdelbaki, Ahmed F. Shosha:
Remote Clipboard Data In-Memory Attacks and Detection. APWG.EU Tech 2023 - [c38]Mohamed Adel ElBahaay, Tamer Arafa, Nashwa Abdelbaki:
Unsupervised Anomaly Detection for Throughput Enhancement in Mobile Networks. ICCA 2023: 1-6 - [c37]Khaled Fawzy Mohamed, Nashwa Abdelbaki, Ahmed F. Shosha:
Clipboard Data Attacks and Detection via Remote Desktop Protocol. NILES 2023: 98-102 - [c36]Mohamed Mahmoud Zaki, Ayman Gaber, Mohammad Galal Khafagy, Mohamed Beshara, Nashwa Abdelbaki:
Autonomous Traffic-Aware and QoS-Constrained Capacity Cell Shutdown for Green Mobile Networks. NILES 2023: 142-145 - 2022
- [c35]Sherief A. Hassan, Nashwa Abdelbaki:
A Survey of Concurrency Control Algorithms in Collaborative Applications. AISI 2022: 309-320 - [c34]Mohammed Hossam Aboelnasr, Nashwa Abdelbaki:
Handwriting Letter Recognition on the Steering Wheel Switches. AISI 2022: 573-586 - [c33]Ayman Gaber, Tamer Arafa, Nashwa Abdelbaki:
Semi-Supervised Machine Learning Applications in RAN Design: Towards Data-Driven Next Generation Cellular Networks. ICCA 2022: 1-5 - [c32]Ahmed Maher Mohamed, Nashwa Abdelbaki, Tamer Arafa:
Feasibility Study of Using Predictive LTE Connection Selection from Multi-Operator for Teleoperated Vehicles. ICCA 2022: 1-6 - [c31]Nader Elgohary, Nashwa Abdelbaki:
Detecting Mimikatz in Lateral Movements Using Windows API Call Sequence Analysis. NILES 2022: 306-310 - 2021
- [c30]Amira Tarek, Belal Mohammed, Rameez Barakat, Yomna Eid, Shaymaa El-Kaliouby, Nashwa Abdelbaki:
Software-Defined Networks Towards Big Data: A Survey. AMLTA 2021: 626-636 - [c29]Mohammed Aboelnasr, Nashwa Abdelbaki:
A Comprehensive Survey on Vehicular Ad Hoc Networks (VANET). AMLTA 2021: 736-749 - [c28]Mina Awad, Mahmoud Nour, Mina Kamel, Mostafa Essa, Nashwa Abdelbaki:
Supervised Models Enhancement using UnSupervised Transition in Mobile Network. ICCTA 2021: 200-205 - [c27]Noha Ahmed Thabet, Nashwa Abdelbaki:
Efficient Quering Blockchain Applications. NILES 2021: 365-369 - 2020
- [c26]Ahmed Maher Hamed, Nashwa Abdelbaki:
Acoustic Attacks in IOT Era: Risks and Mitigations. CCIOT 2020: 13-19 - [c25]Lobna Khaled, Nashwa Abdelbaki:
Evaluation of Software Static Analyzers. ICSIE 2020: 11-17 - [c24]Mahmoud Bahaa, Ayman Aboulmagd, Khaled Adel, Hesham Fawzy, Nashwa Abdelbaki:
nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks. NILES 2020: 165-170 - [c23]Ayman Gaber, Mohamed Adel ElBahaay, Ahmed Maher Mohamed, Mohamed Mahmoud Zaki, Ahmed Samir Abdo, Nashwa Abdelbaki:
5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies. NILES 2020: 366-373
2010 – 2019
- 2019
- [c22]Amr ElBanna, Nashwa Abdelbaki:
NONYM!ZER: Mitigation Framework for Browser Fingerprinting. QRS Companion 2019: 158-163 - 2018
- [c21]Islam A. Heggo, Nashwa Abdelbaki:
Hybrid Information Filtering Engine for Personalized Job Recommender System. AMLTA 2018: 553-563 - [c20]Islam A. Heggo, Nashwa Abdelbaki:
Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs. AMLTA 2018: 564-574 - [c19]Amr ElBanna, Nashwa Abdelbaki:
Browsers Fingerprinting Motives, Methods, and Countermeasures. CITS 2018: 1-5 - [c18]May Medhat, Samir Gaber, Nashwa Abdelbaki:
A New Static-Based Framework for Ransomware Detection. DASC/PiCom/DataCom/CyberSciTech 2018: 710-715 - [c17]Ayman Shaaban, Nashwa Abdelbaki:
Comparison Study of Digital Forensics Analysis Techniques; Findings versus Resources. EUSPN/ICTH 2018: 545-551 - [c16]Doaa Wael, Samir G. Sayed, Nashwa Abdelbaki:
Enhanced Approach to Detect Malicious VBScript Files Based on Data Mining Techniques. EUSPN/ICTH 2018: 552-558 - [c15]Amr I. Elkhawas, Nashwa Abdelbaki:
Malware Detection using Opcode Trigram Sequence with SVM. SoftCOM 2018: 1-6 - [p3]Sally Mosaad, Nashwa Abdelbaki, Ahmed F. Shosha:
A Postmortem Forensic Analysis for a JavaScript Based Attack. Computer and Network Security Essentials 2018: 79-94 - [p2]Mohamed T. Abdelazim, Nashwa Abdelbaki, Ahmed F. Shosha:
Experimental Digital Forensics of Subscriber Identification Module (SIM) Card. Computer and Network Security Essentials 2018: 391-405 - 2017
- [j1]Tarek Radwan, Marianne A. Azer, Nashwa Abdelbaki:
Cloud computing security: challenges and future trends. Int. J. Comput. Appl. Technol. 55(2): 158-172 (2017) - [c14]Ehab ElShafei, Nashwa Abdelbaki:
Stock Exchange Threat Modeling, EGX as a Case Study. AISI 2017: 203-212 - [c13]Mohamed Aly Mohamed, Nashwa Abdelbaki:
HTTP Application Layer DDoS Attack Mitigation Using Resources Monitor. AISI 2017: 213-221 - [c12]Gehad Hassan, Nashwa Abdelbaki:
Gesture Recognition for Improved User Experience in Augmented Biology Lab. AISI 2017: 299-308 - [c11]Ahmed Samy Nassar, Ahmed Hossam Montasser, Nashwa Abdelbaki:
A Survey on Smart Cities' IoT. AISI 2017: 855-864 - [c10]AbdelRahman Ahmed Saleh, Nashwa Abdelbaki:
Innovative human-robot interaction for a robot tutor in biology game. ICAR 2017: 614-619 - 2014
- [c9]Sara El-Refaay, Marianne A. Azer, Nashwa Abdelbaki:
Cluster Head election in Wireless Sensor Networks. IAS 2014: 1-5 - [c8]Ahmed Shaker Saidah, Nashwa Abdelbaki:
New Governance Framework to Secure Cloud Computing. CLOSER (Selected Papers) 2014: 187-199 - [c7]Ahmed Shaker Saidah, Nashwa Abdelbaki:
A New Cloud Computing Governance Framework. CLOSER 2014: 671-678 - [c6]Poussy Amr, Nashwa Abdelbaki:
Convergence study of IPv6 tunneling techniques. COMM 2014: 1-6 - [p1]Sameh Hussein, Nashwa Abdelbaki:
Towards Cloud Customers Self-Monitoring and Availability-Monitoring. Bio-inspiring Cyber Security and Cloud Services 2014: 565-585 - 2013
- [c5]Poussy Amr, Nashwa Abdelbaki:
VoIP Performance Evaluation over IPv4-6 and 6to4 Networks. ICCTA 2013: 114-120 - [c4]Poussy Amr, Nashwa Abdelbaki:
VoIP performance evaluation over IPv4-6 and manually configured tunnels. M&N 2013: 121-126 - [c3]Sameh Hussein, Nashwa Abdelbaki:
Towards IT-Legal Framework for Cloud Computing. SecNet 2013: 122-130
2000 – 2009
- 2005
- [c2]Nashwa Abdelbaki, Hans Peter Großmann:
Study of Inter-effect and Behavior of Multimedia Traffic in a QoS-Enabled Communication Network. PCM (2) 2005: 141-152 - 2004
- [c1]Nashwa Abdelbaki, Hans Peter Großmann:
Simulation and Development of Event-Driven Multimedia Session. PCM (2) 2004: 447-454
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint