Walid Khedr
Walid Khedr
Professor of Cyber Security, College of Computers and Informatics, Zagazig University, Egypt
Verified email at - Homepage
Cited by
Cited by
A lightweight android malware classifier using novel feature selection methods
A Salah, E Shalabi, W Khedr
Symmetry 12 (5), 858, 2020
Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage
WI Khedr, HM Khater, ER Mohamed
IEEE Access 7, 65635-65651, 2019
SRFID: A hash-based security scheme for low cost RFID systems
WI Khedr
Egyptian Informatics Journal 14 (1), 89-98, 2013
Robust image hashing using exact Gaussian–Hermite moments
KM Hosny, YM Khedr, WI Khedr, ER Mohamed
IET Image Processing 12 (12), 2178-2185, 2018
Robust color image hashing using quaternion polar complex exponential transform for image authentication
KM Hosny, YM Khedr, WI Khedr, ER Mohamed
Circuits, Systems, and Signal Processing 37 (12), 5441-5462, 2018
New vertical handover prediction schemes for LTE-WLAN heterogeneous networks
KM Hosny, MM Khashaba, WI Khedr, FA Amer
PloS one 14 (4), e0215334, 2019
FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks
WI Khedr, AE Gouda, ER Mohamed
IEEE Access 11, 28934-28954, 2023
Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol
WI Khedr
Journal of Information Security and Applications 39, 41-57, 2018
A new efficient and configurable image encryption structure for secure transmission
WI Khedr
Multimedia Tools and Applications 79 (23), 16797-16821, 2020
A TOPSIS based Method for Gene Selection for Cancer Classification
IM Abd-ElFattah, W Khedr, KM Sallam
International Journal of Computer Applications 67 (17), 39-44, 2013
Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network
AAE Walid I. Khedr, Mahmoud I. Abdalla
IET Information Security, 2015
Recognition of phonetic Arabic figures via wavelet based Mel Frequency Cepstrum using HMMs
IM El-Henawy, WI Khedr, OM ELkomy, AZMI Abdalla
HBRC Journal 10 (1), 49-54, 2014
An efficient neural network-based prediction scheme for heterogeneous networks
KM Hosny, MM Khashaba, WI Khedr, FA Amer
International Journal of Sociotechnology and Knowledge Development (IJSKD …, 2020
Improved Lightweight Authentication Scheme for IEEE 802.11 p Vehicle-to-Infrastructure Communication.
WI Khedr
Adhoc & Sensor Wireless Networks 31, 2016
On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
W Khedr
International Journal of Network Security 16, 333-339, 2014
Prediction-based secured handover authentication for mobile cloud computing
WI Khedr, KM Hosny, MM Khashaba, FA Amer
Wireless Networks 26 (6), 4657-4675, 2020
AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks
M Hamad, W Khedr
International Conference on Security and Cryptography (SECRYPT 2009), 274 - 284, 2009
A digital watermarking for relational database: state of Art techniques
K El Drandaly, W Khedr, AM Mostafa, I Mohamed
International Journal of Advanced Science and Technology, 870-883, 2020
P4-HLDMC: A novel framework for DDoS and ARP attack detection and mitigation in SD-IoT networks using machine learning, stateful P4, and distributed multi-controller architecture
WI Khedr, AE Gouda, ER Mohamed
Mathematics 11 (16), 3552, 2023
Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
ISM Abdelsalam
Tech Science Press 71, 5253-5270, 2022
The system can't perform the operation now. Try again later.
Articles 1–20