Walid Khedr
Walid Khedr
Professor of Cyber Security, College of Computers and Informatics, Zagazig University, Egypt
Verified email at - Homepage
Cited by
Cited by
A lightweight android malware classifier using novel feature selection methods
A Salah, E Shalabi, W Khedr
Symmetry 12 (5), 858, 2020
Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage
WI Khedr, HM Khater, ER Mohamed
IEEE Access 7, 65635-65651, 2019
SRFID: A hash-based security scheme for low cost RFID systems
WI Khedr
Egyptian Informatics Journal 14 (1), 89-98, 2013
Robust image hashing using exact Gaussian–Hermite moments
KM Hosny, YM Khedr, WI Khedr, ER Mohamed
IET Image Processing 12 (12), 2178-2185, 2018
Robust color image hashing using quaternion polar complex exponential transform for image authentication
KM Hosny, YM Khedr, WI Khedr, ER Mohamed
Circuits, Systems, and Signal Processing 37 (12), 5441-5462, 2018
FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks
WI Khedr, AE Gouda, ER Mohamed
IEEE Access 11, 28934-28954, 2023
New vertical handover prediction schemes for LTE-WLAN heterogeneous networks
KM Hosny, MM Khashaba, WI Khedr, FA Amer
PloS one 14 (4), e0215334, 2019
A new efficient and configurable image encryption structure for secure transmission
WI Khedr
Multimedia Tools and Applications 79 (23), 16797-16821, 2020
Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol
WI Khedr
Journal of Information Security and Applications 39, 41-57, 2018
A TOPSIS based Method for Gene Selection for Cancer Classification
IM Abd-ElFattah, W Khedr, KM Sallam
International Journal of Computer Applications 67 (17), 39-44, 2013
Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network
AAE Walid I. Khedr, Mahmoud I. Abdalla
IET Information Security, 2015
Recognition of phonetic Arabic figures via wavelet based Mel Frequency Cepstrum using HMMs
IM El-Henawy, WI Khedr, OM ELkomy, AZMI Abdalla
HBRC Journal 10 (1), 49-54, 2014
An efficient neural network-based prediction scheme for heterogeneous networks
KM Hosny, MM Khashaba, WI Khedr, FA Amer
International Journal of Sociotechnology and Knowledge Development (IJSKD …, 2020
Improved Lightweight Authentication Scheme for IEEE 802.11 p Vehicle-to-Infrastructure Communication.
WI Khedr
Adhoc & Sensor Wireless Networks 31, 2016
On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
W Khedr
International Journal of Network Security 16, 333-339, 2014
Prediction-based secured handover authentication for mobile cloud computing
WI Khedr, KM Hosny, MM Khashaba, FA Amer
Wireless Networks 26 (6), 4657-4675, 2020
Framework to secure the OAuth 2.0 and JSON web token for rest API
E Rushdy, W Khedr, N Salah
Journal of Theoretical and Applied Information Technology 99 (9), 2144-2161, 2021
AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks
M Hamad, W Khedr
International Conference on Security and Cryptography (SECRYPT 2009), 274 - 284, 2009
Managing a secure refresh token implementation with json web token in rest api
E Rushdy, W Khedr, N Salah
Full Length Article 2 (1), 01-1-20, 2021
P4-HLDMC: A novel framework for DDoS and ARP attack detection and mitigation in SD-IoT networks using machine learning, stateful P4, and distributed multi-controller architecture
WI Khedr, AE Gouda, ER Mohamed
Mathematics 11 (16), 3552, 2023
The system can't perform the operation now. Try again later.
Articles 1–20