default search action
Hisham A. Kholidy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Adda Boualem, Marwane Ayaida, Cyril de Runz, Hisham A. Kholidy, Hichem Sedjelmaci:
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication. Clust. Comput. 27(10): 13777-13793 (2024) - [j13]Adda Boualem, Cyril De Runz, Marwane Ayaida, Hisham A. Kholidy:
Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs. Peer Peer Netw. Appl. 17(3): 1190-1207 (2024) - [c31]Islam Elgarhy, Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy:
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. CCNC 2024: 333-338 - 2023
- [j12]Islam Elgarhy, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy:
Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks. IEEE Access 11: 112147-112164 (2023) - [j11]Tahani Jaser Alahmadi, Atta Ur Rahman, Hend Khalid Alkahtani, Hisham A. Kholidy:
Enhancing Object Detection for VIPs Using YOLOv4_Resnet101 and Text-to-Speech Conversion Model. Multimodal Technol. Interact. 7(8): 77 (2023) - [j10]Mohammed Alkhowaiter, Hisham A. Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff C. Zou:
Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach. Sensors 23(14): 6287 (2023) - [j9]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Muneeba Asif, Alvi Ataur Khalil, Hisham A. Kholidy, Matthew Anderson, Steven Drager:
Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives. IEEE Trans. Netw. Serv. Manag. 20(1): 138-151 (2023) - [c30]Abdulbast A. Abushgra, Hisham A. Kholidy, Abdelkader Berrouachedi, Rakia Jaziri:
Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G Networks. AICCSA 2023: 1-7 - [c29]Ibrahim Almazyad, Sicong Shao, Salim Hariri, Hisham A. Kholidy:
Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation. AICCSA 2023: 1-7 - [c28]Adda Boualem, Abdelkader Berrouachedi, Marwane Ayaida, Hisham A. Kholidy, Elhadj Benkhelifa:
A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G Networks. AICCSA 2023: 1-8 - [c27]Hisham A. Kholidy, Abdelkader Berrouachedi, Elhadj Benkhelifa, Rakia Jaziri:
Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification. AICCSA 2023: 1-8 - [c26]Hisham A. Kholidy, Keven Disen, Andrew Karam, Elhadj Benkhelifa, Mohammad Ashiqur Rahman, Atta-ur-Rahman, Ibrahim Almazyad, Ahmed F. Sayed, Rakia Jaziri:
Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures. AICCSA 2023: 1-8 - [c25]Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Hisham A. Kholidy:
FAKEY: Fake Hashed Key Attack on Payment Channel Networks. CNS 2023: 1-9 - [c24]Hisham A. Kholidy:
A Smart Network Slicing Provisioning Framework for 5G-based IoT Networks. IOTSMS 2023: 104-110 - [c23]Meriem Chiraz Zouzou, Mohamed Shahawy, Elhadj Benkhelifa, Hisham A. Kholidy:
SIoTSim: Simulator for Social Internet of Things. IOTSMS 2023: 149-155 - [c22]Soufiane Hamadache, Elhadj Benkhelifa, Hisham A. Kholidy, Pradeeban Kathiravelu, Brij B. Gupta:
Leveraging SDN for Real World Windfarm Process Automation Architectures. SDS 2023: 115-120 - [i10]Thomas Grippo, Hisham A. Kholidy:
Detecting Forged Kerberos Tickets in an Active Directory Environment. CoRR abs/2301.00044 (2023) - [i9]Daniel Zielinski, Hisham A. Kholidy:
An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. CoRR abs/2301.00045 (2023) - [i8]Mohammed Alkhowaiter, Hisham A. Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff C. Zou:
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach. CoRR abs/2306.00314 (2023) - [i7]Mirsad Malkoc, Hisham A. Kholidy:
5G Network Slicing: Analysis of Multiple Machine Learning Classifiers. CoRR abs/2310.01747 (2023) - 2022
- [j8]Hisham A. Kholidy:
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method. Sensors 22(1): 9 (2022) - [c21]Hisham A. Kholidy, Andrew Karam, Jeffrey H. Reed, Yusuf Elazzazi:
An Experimental 5G Testbed for Secure Network Slicing Evaluation. FNWF 2022: 131-138 - [c20]Hisham A. Kholidy, Riaad Kamaludeen:
An Innovative Hashgraph-based Federated Learning Approach for Multi Domain 5G Network Protection. FNWF 2022: 139-146 - [c19]Hisham A. Kholidy, Salim Hariri:
Toward An Experimental Federated 6G Testbed: A Federated Leaning Approach. AICCSA 2022: 1-6 - [c18]Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman, Mohamed Mahmoud, Mahmoud M. Badr, Maqsood Mahmud, Ahmed F. Sayed:
Toward Zero Trust Security IN 5G Open Architecture Network Slices. MILCOM 2022: 577-582 - [i6]Hisham A. Kholidy, Mohammad Ashiqur Rahman, Andrew Karam, Zahid Akhtar:
Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform. CoRR abs/2201.00484 (2022) - [i5]Mohammed Abuzamak, Hisham A. Kholidy:
UAV Based 5G Network: A Practical Survey Study. CoRR abs/2212.13329 (2022) - [i4]Hisham A. Kholidy, Mohammed Abuzamak:
5G Network Management, Orchestration, and Architecture: A Practical Study of the MonB5G project. CoRR abs/2212.13747 (2022) - 2021
- [j7]Hisham A. Kholidy:
Autonomous mitigation of cyber risks in the Cyber-Physical Systems. Future Gener. Comput. Syst. 115: 171-187 (2021) - [j6]Hisham A. Kholidy:
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach. Future Gener. Comput. Syst. 117: 299-320 (2021) - [c17]Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman:
5G Core Security in Edge Networks: A Vulnerability Assessment Approach. ISCC 2021: 1-6 - [c16]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Dong Chen, Hisham A. Kholidy:
BIoTA: Control-Aware Attack Analytics for Building Internet of Things. SECON 2021: 1-9 - [i3]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Dong Chen, Hisham A. Kholidy:
BIoTA Control-Aware Attack Analytics for Building Internet of Things. CoRR abs/2107.14136 (2021) - [i2]Hisham A. Kholidy:
A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks. CoRR abs/2112.13072 (2021) - [i1]Hisham A. Kholidy:
State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems. CoRR abs/2112.14137 (2021) - 2020
- [j5]Hisham A. Kholidy:
An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs. Comput. Commun. 151: 133-144 (2020) - [j4]Hisham A. Kholidy:
Correlation-based sequence alignment models for detecting masquerades in cloud computing. IET Inf. Secur. 14(1): 39-50 (2020)
2010 – 2019
- 2019
- [j3]Hisham A. Kholidy, Abdelkarim Erradi:
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems. Secur. Commun. Networks 2019: 6816943:1-6816943:15 (2019) - 2018
- [c15]Samar SH. Haytamy, Hisham A. Kholidy, Fatma A. Omara:
ICSD: Integrated Cloud Services Dataset. SERVICES 2018: 18-30 - 2017
- [c14]Stefano Iannucci, Hisham A. Kholidy, Amrita Dhakal Ghimire, Rui Jia, Sherif Abdelwahed, Ioana Banicescu:
A Comparison of Graph-Based Synthetic Data Generators for Benchmarking Next-Generation Intrusion Detection Systems. CLUSTER 2017: 278-289 - [c13]Qian Chen, Hisham A. Kholidy, Sherif Abdelwahed, John Hamilton:
Towards Realizing a Distributed Event and Intrusion Detection System. FNSS 2017: 70-83 - 2016
- [j2]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi:
A risk mitigation approach for autonomous cloud intrusion response system. Computing 98(11): 1111-1135 (2016) - [c12]Abdelkarim Erradi, Hisham A. Kholidy:
An efficient hybrid prediction approach for predicting cloud consumer resource needs. AICCSA 2016: 1-8 - 2015
- [j1]Hisham A. Kholidy, Fabrizio Baiardi, Salim Hariri:
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks. IEEE Trans. Dependable Secur. Comput. 12(2): 164-178 (2015) - [c11]Hisham A. Kholidy, Abdelkarim Erradi:
A cost-aware model for risk mitigation in Cloud computing systems. AICCSA 2015: 1-7 - 2014
- [c10]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Ahmed M. Yousof, Hisham Arafat Ali:
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems. AICCSA 2014: 715-722 - [c9]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab:
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems. DASC 2014: 14-19 - [c8]Hisham A. Kholidy, Ahmed M. Yousof, Abdelkarim Erradi, Sherif Abdelwahed, Hisham Arafat Ali:
A Finite Context Intrusion Prediction Model for Cloud Systems with a Probabilistic Suffix Tree. EMS 2014: 526-531 - [c7]Hisham A. Kholidy, Hala Hassan, Amany M. Sarhan, Abdelkarim Erradi, Sherif Abdelwahed:
QoS Optimization for Cloud Service Composition Based on Economic Model. IoT360 (1) 2014: 355-366 - 2013
- [c6]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi:
HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems. CICSyN 2013: 179-184 - 2012
- [c5]Hisham A. Kholidy, Fabrizio Baiardi:
CIDS: A Framework for Intrusion Detection in Cloud Systems. ITNG 2012: 379-385 - [c4]Hisham A. Kholidy, Fabrizio Baiardi:
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks. ITNG 2012: 397-402 - 2010
- [c3]Hisham A. Kholidy, N. Chatterjee:
Towards developing an Arabic word alignment annotation tool with some Arabic alignment guidelines. ISDA 2010: 778-783 - [c2]Hisham A. Kholidy:
A study for access control flow analysis with a proposed job analyzer component based on stack inspection methodology. ISDA 2010: 1442-1447
2000 – 2009
- 2009
- [c1]Hisham A. Kholidy, Khaled Alghathbar:
A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data. IAS 2009: 617-622
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint