Ghoneim, A. A., M. A. Ameer, A. M. Fekry, and E. - T. F. Heakal,
"Cyclic Voltammetric Studies on Selected Tin-Silver Binary Alloys in Sodium Hydroxide Solution",
Corrosion, vol. 66, no. 11, pp. 115001–115001, 2010.
Abstractn/a
Gouda, O. E., G. Osman, W. Salem, and S. H.,
"Cyclic Loading of Underground Cables Including the Variations of Backfill Soil Thermal Resistivity and Specific Heat With Temperature Variation",
IEEE TRANSACTIONS ON POWER DELIVERY, vol. 33, issue 6, pp. 3122-3129, Submitted.
Gouda, O. E., G. A. Osman, W. A. A. Salem, and S. H. Arafa,
"Cyclic Loading of Underground Cables Including the Variations of Backfill Soil Thermal Resistivity and Specific Heat With Temperature Variation",
IEEE TRANSACTIONS ON POWER DELIVERY, vol. 33, issue 6, pp. 3122-3129, 2018.
Abdelhamid, S. A. S. G. I. A., D. M. Abdelmoniem, H. M. Hassaneen, A. M. Abdelmoniem, and I. A. Abdelhamid,
"Cyclic Enaminone Incorporating 5‐cyanomethylpyrazole‐4‐carbonitrile: Unexpected Formation of Pyrazolo[l,5‐a]pyridine Derivatives",
J. Heterocyclic Chem, vol. 55, issue 7, pp. 1798-1803, 2018.
Ghozlan, S. A. S., D. M. Abdelmoniem, H. M. Hassaneen, A. M. Abdelmoniem, and I. A. Abdelhamid,
"Cyclic Enaminone Incorporating 5‐cyanomethylpyrazole‐4‐carbonitrile: Unexpected Formation of Pyrazolo [l, 5‐a] pyridine Derivatives",
Journal of Heterocyclic Chemistry, vol. 55, issue 7, pp. 1798-1803, 2018.
Abstractn/a
Ghozlan, S. A. S., D. M. Abdelmoniem, H. M. Hassaneen, A. M. Abdelmoniem, and I. A. Abdelhamid,
"Cyclic Enaminone Incorporating 5-cyanomethylpyrazole-4-carbonitrile: Unexpected Formation of Pyrazolo[l,5-a]pyridine Derivatives",
Journal of Heterocyclic Chemistry, vol. 55, issue 7, pp. 1798 - 1803, 2018///.
AbstractNovel pyrazolo[l,5-a]pyridine derivatives containing (3-oxocyclohex-1-enyl) amino group at position 2 were synthesized in good yields using simple and efficient methodology. All new compounds are characterized by the different spectral tools.
el Ridi, R., S. Zada, A. Afifi, S. el Deeb, S. el Rouby, M. Farag, and A. H. Saad,
"Cyclic changes in the differentiation of lymphoid cells in reptiles.",
Cell Differentiation, vol. 24, issue 1, pp. 1-8., 1988.
Badr, E., and M. Saleem,
"Cyclic automorphisms groups of genus 10 non-hyperelliptic curves",
Groups, Group Rings, and Related Topics (GGRRT 2013), United Arab Emirates University, Al Ain, United Arab Emirates, May 13-24, 2013.
Soudy, R., A. Patel, W. Fu, K. Kaur, D. Westaway, R. Davey, and J. Jhamandas,
"Cyclic AC253, a novel amylin receptor antagonist, improves cognitive deficits in a mouse model of Alzheimer's disease.",
Alzheimer’s & Dementia: Translational Research & Clinical Interventions, vol. 3, pp. 44-56, 2017.
Al-Matari, O. M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy,
"Cybersecurity Tools for IS Auditing",
The 6th International Conference on Enterprise Systems, Limassol, Cyprus, IEEE, pp. 217-223, 2018.
AbstractIn a time of growing threats and advancing circumstances, receiving and keeping up a strong cybersecurity profile in the enterprises are crucial. Important data and resources must be protected. Nowadays, cybersecurity became a predominant issue facing most organizations. It is recognized by organizations as an enterprise-wide issue requiring protection and detection from possible and malicious attacks to protect enterprise information assets. Hence, enterprises are obligated to use multiple tools for covering most of the cybersecurity aspects through different operations and for supporting different levels of users. Information systems auditing is becoming more difficult due to the rapidly developing technological threats. Hence, having these audits and reviews performed by independent functions increase the likelihood of detecting control weaknesses and provides further checks. These control issues are typically not due to the failure of the technology. However, they are mostly the result of individuals not executing the process, or using a process that is poorly defended. The main purpose of this research is to make a comparative study of the capabilities of most of the available automated cybersecurity auditing tools for frontend cloud computing. The results of this comparative study lead to knowing how to secure the enterprise's assets by using automated tools and techniques. Also, it uses clear steps to gather the information to provide the evidence required in the final report of IS auditing.