


default search action
Mohamed Azab
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Yomna Ibrahim, Mai A. Abdel-Malek
, Mohamed Azab
, Mohamed R. M. Rizk:
Privacy-preserved mutually-trusted 5G communications in presence of pervasive attacks. Internet Things 30: 101491 (2025) - 2024
- [j22]Efat Fathalla
, Mohamed Azab
:
Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations. IEEE Access 12: 175969-175987 (2024) - [j21]Mai A. Abdel-Malek
, Mohamed Azab:
UAV-fleet management for extended NextG emergency support infrastructure with QoS and cost aware. Internet Things 25: 101043 (2024) - [c38]Anthony Lee
, Kenneth King
, Denis Gracanin
, Mohamed Azab
:
Experiential Learning Through Immersive XR: Cybersecurity Education for Critical Infrastructures. HCI (46) 2024: 56-69 - [c37]Kyle Bordeaux
, James Manning
, Aidan Noonan, Mohamed Azab
:
SmartSecur: Integrating an Empatica Watch to Enhance Patient Physical Security. HCI (61) 2024: 251-258 - [c36]Kenneth King
, Mohamed Azab
:
SafeSpace, the Smart Caretaker: An AI-Driven Safe and Comfortable Environment for the Well-Being of Alzheimer's and Dementia Patients. HCI (43) 2024: 358-369 - [c35]David Jones, Denis Gracanin, Mohamed Azab:
Augmented Reality Research: Benefit or Detriment for Neurodiverse People. ISMAR-Adjunct 2024: 26-28 - [c34]Amal O. Hamada, Salwa Mohamed Hassan, Salma Samy, Mohamed Azab, Efat Fathalla:
A Review: State-of-the-Art of Integrating AI Models with Moving-target Defense for Enhancing IoT Networks Security. UEMCON 2024: 108-114 - [c33]Fatemeh Sarshartehrani, Anthony Lee, Mohamed Azab, Trenton Watkins, Denis Gracanin:
Towards immersive cybersecurity workforce development for mission-critical IoT Systems. UEMCON 2024: 176-182 - [c32]Majid Behravan, Elham Mohammadrezaei, Mohamed Azab, Denis Gracanin:
Multilingual Standalone Trustworthy Voice-Based Social Network for Disaster Situations. UEMCON 2024: 264-270 - [c31]Rajarshi Mukherjee, Mohamed Azab, Thidapat Chantem:
Enabling Moving Target Defense for Real-Time CPS Security. UEMCON 2024: 636-642 - [i2]Majid Behravan, Elham Mohammadrezaei, Mohamed Azab, Denis Gracanin:
Multilingual Standalone Trustworthy Voice-Based Social Network for Disaster Situations. CoRR abs/2411.08889 (2024) - 2023
- [j20]Efat Samir Fathalla
, Mohamed Azab
, Chunsheng Xin
, Hongyi Wu:
PT-SSIM: A Proactive, Trustworthy Self-Sovereign Identity Management System. IEEE Internet Things J. 10(19): 17155-17169 (2023) - [c30]Rana R. Ergawy, Hassan M. A. Elkamchouchi, Mohamed Azab, Adel Elfahar:
Open Source Intelligence Driven Moving Target Defense for Secure Software-defined WAN: a Game Theoretic Approach. GCAIoT 2023: 134-141 - [c29]David Jones
, Shiva Ghasemi
, Denis Gracanin
, Mohamed Azab
:
Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse Users. HCI (35) 2023: 511-528 - 2022
- [j19]Mohamed Azab, Mohamed Samir
, Effat Samir:
"MystifY": A proactive Moving-Target Defense for a resilient SDN controller in Software Defined CPS. Comput. Commun. 189: 205-220 (2022) - [j18]Efat Samir
, Hongyi Wu, Mohamed Azab
, Chunsheng Xin
, Qiao Zhang
:
DT-SSIM: A Decentralized Trustworthy Self-Sovereign Identity Management Framework. IEEE Internet Things J. 9(11): 7972-7988 (2022) - [j17]Marwa K. Elteir, Shaimaa Lazem
, Mohamed Azab:
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study. J. King Saud Univ. Comput. Inf. Sci. 34(3): 747-756 (2022) - [j16]Mai A. Abdel-Malek
, Muhammad M. Sayed, Mohamed Azab:
UAV-Based Privacy-Preserved Trustworthy Seamless Service Agility for NextG Cellular Networks. Sensors 22(7): 2756 (2022) - [j15]Yousra Magdy, Mohamed Azab
, Amal O. Hamada
, Mohamed R. M. Rizk, Nayera M. Sadek
:
Moving-Target Defense in Depth: Pervasive Self- and Situation-Aware VM Mobilization across Federated Clouds in Presence of Active Attacks. Sensors 22(23): 9548 (2022) - [j14]Esraa M. Ghourab
, Mohamed Azab
, Noha Ezzeldin:
Blockchain-Guided Dynamic Best-Relay Selection for Trustworthy Vehicular Communication. IEEE Trans. Intell. Transp. Syst. 23(8): 13678-13693 (2022) - 2021
- [j13]Mohamed Samir, Mohamed Azab, Effat Samir:
SD-CPC: SDN Controller Placement Camouflage based on Stochastic Game for Moving-target Defense. Comput. Commun. 168: 75-92 (2021) - [j12]Salwa M. Hassan
, Mohamed Azab, Amal O. Hamada
:
PeTroShare: Blockchain-Managed, Logistics-Aware, Privacy-Friendly, Comparative, and Efficient Petroleum Transportation. Sensors 21(21): 7066 (2021) - [c28]Salma Samy
, Mohamed Azab, Mohamed R. M. Rizk:
Towards a Secured Blockchain-based Smart Grid. CCWC 2021: 1066-1069 - 2020
- [j11]Esraa M. Ghourab, Mohamed Azab:
Benign false-data injection as a moving-target defense to secure mobile wireless communications. Ad Hoc Networks 102: 102064 (2020) - [j10]Amr S. Abed, Mohamed Azab, Charles Clancy, Mona S. Kashkoush:
Resilient intrusion detection system for cloud containers. Int. J. Commun. Networks Distributed Syst. 24(1): 1-22 (2020) - [c27]Yousra Magdy, Mona S. Kashkoush, Mohamed Azab, Mohamed R. M. Rizk:
Anonymous blockchain Based Routing For Moving-target Defense Across Federated Clouds. HPSR 2020: 1-7 - [c26]Mohamed Azab, Bahaaeldin Mohamed A. Moustafa:
Multi-Mode Self-Driving EV Control for Industrial Sites and Logistic Stores. NILES 2020: 41-46 - [c25]Ahmed Abdelraoof, Mohamed Azab, Igor Stoppa:
Write-protection enforcement: hypervisor-backed kernel hardening. SAC 2020: 1736-1744
2010 – 2019
- 2019
- [j9]Mona S. Kashkoush, Mohamed Azab, Gamal Attiya
, Amr S. Abed:
Online Smart Disguise: real-time diversification evading coresidency-based cloud attacks. Clust. Comput. 22(3): 721-736 (2019) - [j8]Hanan A. Hassan
, Mona S. Kashkoush, Mohamed Azab, Walaa M. Sheta:
Impact of using multi-levels of parallelism on HPC applications performance hosted on Azure cloud computing. Int. J. High Perform. Comput. Netw. 13(3): 251-260 (2019) - [j7]Esraa M. Ghourab, Effat Samir, Mohamed Azab, Mohamed Eltoweissy:
Trustworthy Vehicular CommunicationEmploying Multidimensional Diversificationfor Moving-target Defense. J. Cyber Secur. Mobil. 8(2): 133-164 (2019) - [j6]Esraa M. Ghourab, Mohamed Azab, Ahmed Mansour:
Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network. J. Netw. Comput. Appl. 138: 1-14 (2019) - [c24]Bassem Mokhtar
, Mohamed Azab, Efat Fathalla, Esraa M. Ghourab, Mohamed Magdy, Mohamed Eltoweissy:
Reliable Collaborative Semi-infrastructure Vehicle-to-Vehicle Communication for Local File Sharing. CollaborateCom 2019: 698-711 - [c23]Denis Gracanin, Ramoni O. Lasisi, Mohamed Azab, Mohamed Eltoweissy:
Next Generation Smart Built Environments: The Fusion of Empathy, Privacy and Ethics. TPS-ISA 2019: 260-267 - [c22]Mohamed Azab, Efat Fathalla, Rawan Reda:
Reliable Collaborative Vehicle-to-Vehicle Communication for Local Video Streaming. HotMobile 2019: 177 - 2018
- [j5]Mohamed Samir
, Mohamed Azab, Mohamed R. M. Rizk, Nayera M. Sadek:
PYGRID: A software development and assessment framework for grid-aware software defined networking. Int. J. Netw. Manag. 28(5) (2018) - [j4]Esraa M. Ghourab
, Mohamed Azab, Mohamed Fathy Feteiha, Hesham El-Sayed:
A Novel Approach to Enhance the Physical Layer Channel Security of Wireless Cooperative Vehicular Communication Using Decode-and-Forward Best Relaying Selection. Wirel. Commun. Mob. Comput. 2018: 9624856:1-9624856:15 (2018) - [c21]Esraa M. Ghourab, Effat Samir, Mohamed Azab, Mohamed Eltoweissy:
Diversity-Based Moving-Target Defense for Secure Wireless Vehicular Communications. IEEE Symposium on Security and Privacy Workshops 2018: 287-292 - [c20]Mostafa Kahla, Mohamed Azab, Ahmed Mansour:
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments. TrustCom/BigDataSE 2018: 49-54 - [c19]Mohamed Azab, Ahmed Hamdy, Ahmed Mansour:
Repoxy: Replication Proxy for Trustworthy SDN Controller Operation. TrustCom/BigDataSE 2018: 55-60 - 2017
- [c18]Mona S. Kashkoush, Mohamed Azab, Mohamed Eltoweissy, Gamal Attiya
:
Towards Online Smart Disguise: Real-Time Diversification Evading Co-Residency Based Cloud Attacks. CIC 2017: 235-242 - [c17]Mohamed Azab, José A. B. Fortes:
Towards proactive SDN-controller attack and failure resilience. ICNC 2017: 442-448 - [c16]Mohamed Sherif, Mohamed Azab, Yamen Emad, Sherine Sameh, Farida Menisy, Boshra Kandil:
Eyes in the Sky: A Free of Charge Infrastructure-less Mobile Ad-hoc Cloud. UCC (Companion") 2017: 131-137 - 2016
- [j3]Bassem Mokhtar
, Mohamed Azab, Nader Shehata
, Mohamed R. M. Rizk:
System-Aware Smart Network Management for Nano-Enriched Water Quality Monitoring. J. Sensors 2016: 3023018:1-3023018:13 (2016) - [c15]Mohamed Azab, Bassem Mokhtar, Amr S. Abed, Mohamed Eltoweissy:
Smart Moving Target Defense for Linux Container Resiliency. CIC 2016: 122-130 - [c14]Bassem Mokhtar, Mohamed Azab, Nader Shehata, Mohamed R. M. Rizk:
Hybrid Intelligence Nano-enriched Sensing and Management System for Efficient Water-Quality Monitoring. IntelliSys (1) 2016: 584-604 - [c13]Mohamed Azab, Bassem Mokhtar
, Amr S. Abed
, Mohamed Eltoweissy:
Toward Smart Moving Target Defense for Linux Container Resiliency. LCN 2016: 619-622 - [c12]Mohamed Azab, Mohamed Eltoweissy:
MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-Channels. IEEE Symposium on Security and Privacy Workshops 2016: 96-103 - [i1]Mohamed Azab, Bassem Mokhtar, Amr S. Abed, Mohamed Eltoweissy:
Toward Smart Moving Target Defense for Linux Container Resiliency. CoRR abs/1611.03065 (2016) - 2015
- [j2]Nader Shehata
, Mohamed Azab
, Ishac Kandas
, Kathleen Meehan:
Nano-Enriched and Autonomous Sensing Framework for Dissolved Oxygen. Sensors 15(8): 20193-20203 (2015) - [c11]Atin Basuchoudhary
, Mohamed Eltoweissy, Mohamed Azab
, Laura Razzolini, Shimaa Mohamed:
Cyberdefense When Attackers Mimic Legitimate Users: A Bayesian Approach. IRI 2015: 502-509 - 2014
- [c10]Ahmed Khalifa, Mohamed Azab
, Mohamed Eltoweissy:
Resilient hybrid Mobile Ad-hoc Cloud over collaborating heterogeneous nodes. CollaborateCom 2014: 134-143 - [c9]Mohamed Azab, Bassem Mokhtar, Mohammed M. Farag:
CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security. CRITIS 2014: 275-282 - [c8]Mohamed Azab, Mohamed Eltoweissy:
CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform for SmartGrid defense. IRI 2014: 639-645 - [c7]Latifur R. Khan, Mohamed Azab:
IEEE IRI 2014 tutorial: Big data management and mining. IRI 2014: xxxvi-xxxvii - [c6]Mohamed Azab:
Multidimensional Diversity Employment for Software Behavior Encryption. NTMS 2014: 1-5 - [c5]Ahmed Khalifa, Mohamed Azab, Mohamed Eltoweissy:
Towards a Mobile Ad-Hoc Cloud Management Platform. UCC 2014: 427-434 - [p1]Mohamed Azab, Mohamed Eltoweissy:
Bio-inspired Evolutionary Sensory System for Cyber-Physical System Security. Bio-inspiring Cyber Security and Cloud Services 2014: 39-69 - 2013
- [j1]Mohamed Azab, Mohamed Eltoweissy:
ChameleonSoft: Software Behavior Encryption for Moving Target Defense. Mob. Networks Appl. 18(2): 271-292 (2013) - 2012
- [c4]Mohamed Azab, Mohamed Eltoweissy:
CyberX: A biologically-inspired platform for cyber trust management. CollaborateCom 2012: 655-663 - 2011
- [c3]Mohamed Azab, Riham Hassan, Mohamed Eltoweissy:
ChameleonSoft: A moving target defense system. CollaborateCom 2011: 241-250 - [c2]Mohamed Azab, Mohamed Eltoweissy:
Defense as a service cloud for Cyber-Physical Systems. CollaborateCom 2011: 392-401 - [c1]Mohamed Azab, Mohamed Eltoweissy:
Towards a cooperative autonomous resilient defense platform for cyber-physical systems. CSIIRW 2011: 56
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 02:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint