Abd EL-Aziz Ahmed
Title
Cited by
Cited by
Year
JSON Encryption
AA Abd El-Aziz, A Kannan
2014 International Conference on Computer Communication and Informatics …, 2014
201*2014
A Survey on Exploring Key Performance Indicators
M Badawy, AA Abd El-Aziz, H. Hefny, AM Idress, S Hossam
Future Computing and Informatics Journal, 10.1016/j.fcij.2016.04.001, 2016, 2016
1282016
A Novel Coronavirus Forecasting Model using Nonlinear Autoregressive Artificial Neural Network
NM Ghazaly, MA Abdel-Fattah, AA Abd EL-Aziz
International journal of Advanced Sciene and Technology (IJAST) 29 (5), 2020
192020
A Literature Review on Twitter Data Analysis
H Anber, A Salah, AA Abd El-Aziz
2016 2nd International Conference on Computer and Information Technology …, 2016
192016
Mapping XML DTDs to relational schemas
AA Abd El-Aziz, H Oakasha
Computer Systems and Applications, 2005. The 3rd ACS/IEEE International …, 2005
182005
Access control for healthcare data using extended XACML-SRBAC model
AA Abd EL-Aziz, A Kannan
2012 International Conference on Computer Communication and Informatics, 1-4, 2012
172012
A Comprehensive Presentation to XACML
AA Abd El-Aziz, A Kannan
In the Proceedings of the Third International Conference on Computational …, 2013
142013
A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture
A Baker., AA Abd EL-Aziz, Hesham A. Hefny
International journal of Advanced Sciene and Technology (IJAST) 28 (12), 187-200, 2019
82019
Exploring and Measuring the Key Performance Indicators in Higher Education Institutions
M Badway, AA Abd El-Aziz, H Hefny
The International Journal of Intelligent Computing and Information Sciences …, 2018
82018
Survey on securing a querying process by blocking SQL injection
Y Gomaa, MA Mahmood, H Hefny
2015 Third World Conference on Complex Systems (WCCS), 1-7, 2015
72015
Analysis of Learning Objectives for Higher Education Textbooks using Text Mining
M Badawy, AA Abd El-Aziz, HA Hefny
12th International Computer Engineering Conference Boundless Smart …, 2016
52016
XML Access Control: Mapping XACML Policies to Relational Database Tables
AA Abd El-Aziz, A Kannan
IAJIT 11 (6), 9, 2014
52014
Social Network Analysis through Big Data Platform Review
MM Abo Khedra, AA Abd EL-Aziz, Hesham A. Hefny
in proceeding of the 2019 International Conference on Computer and …, 2019
4*2019
Effectiveness of Web Usage Mining Techniques in Business Application
A ElAzab, AA Abd El-Aziz, MA Mahmood
IGI Global, 2016
42016
Federated cloud computing security using forward-secure broadcast encryption HIBE
F Rekaby, AA Abd El-Aziz, MA Mahmood, HA Hefny
2015 11th International Computer Engineering Conference (ICENCO), 13-18, 2015
42015
A secure Algorithm for Executing Queries over Encrypted Data
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
Third World Conference on Complex Systems ( WCCS15) during November 23-25 …, 2015
42015
Storing XML documents and XML policies in Relational Databases
AA Abd El-Aziz, A Kannan
2nd international conference on computer communication and informatics-2012 …, 2012
4*2012
Design a secure IoT Architecture using Smart Wireless Networks
N Almrezeq, L Almadhoor, T Alrasheed, AA Abd El-Aziz, S Nashwan
International Journal of Communication Networks and Information Security 12 …, 2020
32020
A New Efficient Algorithm for Executing Queries over Encrypted Data
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
International Conference on Computing, Communication and Security, 2015
32015
A Survey On Executing Query On Encrypted Database
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The International Conference on Intelligent Information Technologies (ICIIT …, 2014
3*2014
The system can't perform the operation now. Try again later.
Articles 1–20