default search action
Wael M. El-Medany
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Yusuf Mothanna, Wael Elmedany, Mustafa Hammad, Riadh Ksantini, Mhd Saeed Sharif:
Adopting security practices in software development process: Security testing framework for sustainable smart cities. Comput. Secur. 144: 103985 (2024) - [j13]Mohammad Tazeem Naz, Wael Elmedany, Mazen Ali:
Securing SCADA systems in smart grids with IoT integration: A Self-Defensive Post-Quantum Blockchain Architecture. Internet Things 28: 101381 (2024) - [j12]Osamah Ibrahim Khalaf, Ashokkumar S. R, Sameer Algburi, Anupallavi S, Dhanasekaran Selvaraj, Mhd Saeed Sharif, Wael Elmedany:
Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing. Secur. Priv. 7(3) (2024) - [c15]Mhd Saeed Sharif, Madhav Raj Theeng Tamang, Mohammed Swalih Koya, Wael Elmedany:
Advancements in Sentiment Analysis: Insights, Innovations and Future Directions. FiCloud 2024: 195-200 - [c14]Nada Khalifa, Wael Elmedany, Saeed Sharif:
Leveraging Digital Identity and Open Banking Data for Fraud Prevention in the Financial Industry. FiCloud 2024: 286-291 - 2023
- [j11]Marwa Fouda, Riadh Ksantini, Wael Elmedany:
A Novel Intrusion Detection System for Internet of Healthcare Things Based on Deep Subclasses Dispersion Information. IEEE Internet Things J. 10(10): 8395-8407 (2023) - [c13]Mhd Saeed Sharif, Madhav Raj Theeng Tamang, Cynthia H. Y. Fu, Wael Elmedany:
Employing Machine Learning Algorithms to Detect Stress with a Specific Emphasis on Commuting Methods. FiCloud 2023: 416-421 - [c12]Mohamed Sami Ragheb, Wael Elmedany, Mhd Saeed Sharif:
The Effectiveness of DKIM and SPF in Strengthening Email Security. FiCloud 2023: 422-426 - 2022
- [j10]Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany:
MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems. Comput. Secur. 120: 102777 (2022) - [j9]Yaqoob Al-Slais, Wael M. El-Medany:
User-centric adaptive password policies to combat password fatigue. Int. Arab J. Inf. Technol. 19(1): 55-62 (2022) - [c11]Mhd Saeed Sharif, Wael Elmedany:
A Proposed Machine Learning Based Approach to Support Students with Learning Difficulties in The Post-Pandemic Norm. EDUCON 2022: 1988-1993 - [c10]Mhd Saeed Sharif, Wael Elmedany, Godwin Onyewumbu:
Mobile Phone Data Usage Analysis Among Youth Studying at Universities. FiCloud 2022: 289-294 - [c9]Afia Murad Ashraf, Wael M. Elmedany, Mhd Saeed Sharif:
Secure IoT Data Transmission at Physical Layer using RC6 Encryption Technique. FiCloud 2022: 307-315 - [c8]Mohammed Aziz Al Kabir, Wael Elmedany:
An Overview of the Present and Future of User Authentication. MENACOMM 2022: 10-17 - 2021
- [j8]Yasser Ismail, Mohamed Hammad, Mahmoud Darwich, Wael Elmedany:
Homeland security video surveillance system utilising the internet of video things for smart cities. IET Comput. Digit. Tech. 15(4): 302-319 (2021) - [j7]Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany:
T-SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems. IET Inf. Secur. 15(2): 178-190 (2021) - [j6]Hazim S. Al-Sibai, Theyab Alrubaie, Wael M. Elmedany:
IoT cybersecurity threats mitigation via integrated technical and non-technical solutions. Int. J. Electron. Secur. Digit. Forensics 13(3): 298-333 (2021) - [j5]Nawal Alsaffar, Wael M. El-Medany, Hayat Ali:
Low complexity cybersecurity architecture for the development of ITS in smart cities. Int. J. Electron. Secur. Digit. Forensics 13(6): 571-599 (2021) - 2020
- [j4]Abdulkarim Katbi, Mustafa Hammad, Wael Elmedany:
Multi-view city-based approach for code-smell evolution visualisation. IET Softw. 14(5): 506-516 (2020)
2010 – 2019
- 2019
- [c7]Hasan Al-Aswad, Hesham Hasan, Wael Elmedany, Mazen Ali, Chitra Balakrishna:
Towards a Blockchain-Based Zero-Knowledge Model for Secure Data Sharing and Access. FiCloud Workshops 2019: 76-81 - 2018
- [c6]Sara Alromaihi, Wael Elmedany, Chitra Balakrishna:
Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications. FiCloud Workshops 2018: 140-145 - 2017
- [j3]Wael M. El-Medany:
Reconfigurable CRC IP core design on Xilinx Spartan 3AN FPGA. Int. J. Comput. Appl. Technol. 55(4): 257-265 (2017) - 2016
- [j2]Yasser Ismail, Wael M. El-Medany, Hessa Al-Junaid, Ahmed Abdelgawad:
High performance architecture for real-time HDTV broadcasting. J. Real Time Image Process. 11(4): 633-644 (2016) - [c5]Tasneem M. Yousif, Aysha K. Alharam, Wael M. El-Medany, Abeer A. AlKhalaf, Zainab Fardan:
GPRS-Based Robotic Tracking System with Real Time Video Streaming. FiCloud Workshops 2016: 299-303 - 2015
- [c4]Wael M. El-Medany:
Reconfigurable Packet FEC Architecture for Mobile Networks. MobiWIS 2015: 115-121 - 2013
- [c3]Yasser Ismail, Wael M. El-Medany, Hessa Al-Junaid, Ahmed Abdelgawad:
Fast co-processor for real time video transmission. ICECS 2013: 945-949 - 2010
- [c2]Wael M. El-Medany, Alauddin Alomary, Reyadh Al-Hakim, Sufyan Al-Irhayim, Mustafa Nousif:
Implementation of GPRS-Based Positioning System Using PIC Microcontroller. CICSyN 2010: 365-368
2000 – 2009
- 2009
- [j1]Wael M. El-Medany:
Gprs-based Remote Sensing and Climate control System using CMOD CPLD. Int. J. Comput. 8(2): 68-73 (2009) - [c1]Wael M. El-Medany:
FPGA-based MIMO system for Wireless Sensor Network. SoSE 2009: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint