Anber, H., A. Salah, and A. A. A. El-Aziz, "Analysis of Major Events in Egypt based on Twitter", Journal of Computers, vol. 13, issue 3, 2018.

Information Security

Semester: 
Fall

2017

The References are:

  1. Cryptography and Network Security Principles and
    Practices, Six Edition by WILLIAM STALLINGS.
    2. Cryptography: Theory and Practice, Third Edition, by
    Douglas Stinson.
    3. A CLASSICAL INTRODUCTION TO
    CRYPTOGRAPHY Applications for Communications
    Security by Serge Vaudenay
    4. Cryptology for Beginners, Wissahickon High.


Scientific Writing

Semester: 
Fall
HadeelElsayedElsherbeiny, A. A. Abd El-Aziz, and N. Ramadan, "Decision Support for Requirements Prioritization Using Data Analysis", Egyptian Computer Science Journal (ISSN-1110-2586), vol. 41, issue 2, 2017.
Badawy, M., A. A. Abd El-Aziz, and H. A. Hefny, "Analysis of Learning Objectives for Higher Education Textbooks using Text Mining", 12th International Computer Engineering Conference Boundless Smart Societies Faculty of Engineering, Cairo University: IEEEXplore, 2016. Abstract
n/a
Gomaa, Y., A. E. A. Ahmed, M. A. Mahmood, and H. Hefny, "Survey on Securing a Querying process by Blocking SQL injection", 2015 Third World Conference on Complex Systems (WCCS): IEEE, pp. 1–7, 2015. Abstract
n/a
Shouman, M. A., M. Aziz, A. H. N. Ahmed, and N. Z. A. Fatah, "A Comparative Study of SQL Based Approaches for Mining Association Rules over Relational DBMS", Egyptian Computer Science Journal, vol. 34, no. 2, 2010. Abstract
n/a
Rekaby, F., A. A. Abd El-Aziz, M. A, Mahmood, and H. Hefny, "Federated Cloud Computing Security using FS-Broadcast Encryption HIBE", The 11th International Computer Engineering Conference. Today Information Society What’s next? Faculty of Engineering, Cairo University Cairo, EGYPT December 29-30, 2015, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A secure Algorithm for Executing Queries over Encrypted Data", Third World Conference on Complex Systems ( WCCS15) during November 23-25, 2015 in Marrakech-Morocco: IEEE, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A New Efficient Algorithm for Executing Queries over Encrypted Data", International Conference on Computing, Communication and Security: IEEE, 2015. Abstract
n/a