default search action
Eman Shaaban
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Rokaya Safwat, Eman Shaaban, Shahinaz M. Al-Tabbakh, Karim Emara:
Rf-based fingerprinting for indoor localization: deep transfer learning approach. J. Ambient Intell. Humaniz. Comput. 15(9): 3393-3403 (2024) - 2023
- [j9]Noura E. Maghawry, Samy S. Ghoniemy, Eman Shaaban, Karim Emara:
An Automatic Generation of Heterogeneous Knowledge Graph for Global Disease Support: A Demonstration of a Cancer Use Case. Big Data Cogn. Comput. 7(1): 21 (2023) - [j8]Eman M. Elshahed, Randa M. Abdelmoneem, Eman Shaaban, Hayam A. Elzahed, Shahinaz M. Al-Tabbakh:
Prioritized scheduling technique for healthcare tasks in cloud computing. J. Supercomput. 79(5): 4895-4916 (2023) - [j7]Omar Elnakib, Eman Shaaban, Mohamed Mahmoud, Karim Emara:
EIDM: deep learning model for IoT intrusion detection systems. J. Supercomput. 79(12): 13241-13261 (2023) - 2021
- [c9]Randa M. Abdelmoneem, Abderrahim Benslimane, Eman Shaaban:
Mobility-Enabled Authentication Scheme for IoT Architecture. ICC 2021: 1-6 - [c8]Amira Mahmoud Olayan, Eman Shaaban, Samy S. Ghoniemy, Karim Emara:
Proposed Energy Efficiency and Power Management Framework for Energy Harvesting -Wireless Body Area Network. ICSIE 2021: 1-9 - 2020
- [j6]Randa M. Abdelmoneem, Abderrahim Benslimane, Eman Shaaban:
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures. Comput. Networks 179: 107348 (2020)
2010 – 2019
- 2019
- [j5]Hesham Hussien, Eman Shaaban, Said Ghoniemy:
Adaptive Hierarchical Scheduling Framework for TiRTOS. Int. J. Embed. Real Time Commun. Syst. 10(1): 119-135 (2019) - [c7]Randa M. Abdelmoneem, Abderrahim Benslimane, Eman Shaaban, Sherin Abdel Hamid, Salma A. Ghoneim:
A Cloud-Fog Based Architecture for IoT Applications Dedicated to Healthcare. ICC 2019: 1-6 - 2018
- [j4]Heba Essam, Mohamed F. Younis, Eman Shaaban:
Minimum cost flow based approach for connectivity restoration in WSN. Int. J. Sens. Networks 27(1): 37-51 (2018) - [c6]Noran AboDoma, Ahmad Mostafa, Eman Shaaban:
Adaptive Time-Bound Key Management Scheme for the Internet of Things. VTC Fall 2018: 1-5 - 2017
- [j3]Safi Ibrahim, Mohamed Hamdy, Eman Shaaban:
Towards an Optimum Authentication Service Allocation and Availability in VANETs. Int. J. Netw. Secur. 19(6): 955-965 (2017) - 2016
- [j2]Randa M. Abdelmoneem, Eman Shaaban:
Scalable SOCP-based localization technique for wireless sensor network. EAI Endorsed Trans. Ind. Networks Intell. Syst. 3(6): e5 (2016) - 2015
- [c5]Heba Essam, Mohamed F. Younis, Eman Shaaban:
Minimum cost flow solution for tolerating multiple node failures in wireless sensor networks. ICC 2015: 6475-6480 - 2013
- [j1]Mohamed H. Abdel Meniem, Ahmed M. Hamad, Eman Shaaban:
GSM-Based Positioning Technique Using Relative Received Signal Strength. Int. J. Handheld Comput. Res. 4(4): 38-51 (2013) - [c4]Mohamed H. Abdel Meniem, Ahmed M. Hamad, Eman Shaaban:
Relative RSS-based GSM localization technique. EIT 2013: 1-6 - [i3]Mohamed Elhoseiny, Hossam El Deen Mostafa Faheem, Taymour Nazmy, Eman Shaaban:
GPU-Framework for Teamwork Action Recognition. CoRR abs/1310.3322 (2013) - [i2]Hafez Maowad, Eman Shaaban, Zaki Taha Fayed:
Stop_times based Routing Protocol for VANET. CoRR abs/1311.7400 (2013) - 2012
- [c3]Mona El Saadawy, Eman Shaaban:
Enhancing S-LEACH security for wireless sensor networks. EIT 2012: 1-6 - [c2]Hafez Maowad, Eman Shaaban:
Efficient routing protocol for Vehicular Ad hoc networks. ICNSC 2012: 209-215 - 2010
- [i1]Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem:
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags. CoRR abs/1005.4499 (2010)
2000 – 2009
- 2009
- [c1]Shereen Abd El-Hameed, Hossam El Deen Mostafa Faheem, Eman Shaaban, Said Ghoneimy:
Mobility-aware MAC protocol for delay-sensitive wireless sensor networks. ICUMT 2009: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint