1.    Mohamed, Y.A., Mohamed, A.O. (2023). An Approach to Enhance Quality of Services Aware Resource Allocation in Cloud Computing. In: Al-Emran, M., Al-Sharafi, M.A., Shaalan, K. (eds) International Conference on Information Systems and Intelligent Applications. ICISIA 2022. Lecture Notes in Networks and Systems, vol 550. Springer, Cham.  https://doi.org/10.1007/978-3-031-16865-9_50 

DOI/URL: An Approach to Enhance Quality of Services Aware Resource Allocation in Cloud Computing | SpringerLink


2.     Y. A. Mohamed and A. B. Abdullah, "Immune inspired framework for ad hoc network security," 2009 IEEE International Conference on Control and Automation, Christchurch, New Zealand, 2009, pp. 297-302, doi: 10.1109/ICCA.2009.5410147. 

DOI/URL: Immune inspired framework for ad hoc network security | IEEE Conference Publication | IEEE Xplore


 3.     N. M. M. Alhag and Y. A. Mohamed, "An Enhancement of Data Encryption Standards Algorithm (DES)," 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 2018, pp. 1-6, doi: 10.1109/ICCCEEE.2018.8515843.

DOI/URL: An Enhancement of Data Encryption Standards Algorithm (DES) | IEEE Conference Publication | IEEE Xplore


 4.     Y. A. Mohamed and A. B. Abdullah, "Implementation of IDS with response for securing MANETs," 2010 International Symposium on Information Technology, Kuala Lumpur, Malaysia, 2010, pp. 660-665, doi: 10.1109/ITSIM.2010.5561608.

DOI/URL: Implementation of IDS with response for securing MANETs | IEEE Conference Publication | IEEE Xplore


 5.     Y. A. Mohamed and A. B. Abdullah, "Immune-inspired framework for securing hybrid MANET," 2009 IEEE Symposium on Industrial Electronics & Applications, Kuala Lumpur, Malaysia, 2009, pp. 301-306, doi: 10.1109/ISIEA.2009.5356451

DOI/URL: Immune-inspired framework for securing hybrid MANET | IEEE Conference Publication | IEEE Xplore


 6.     R. A. Ahmed Farah and Y. A. Mohamed, "Adaptive Immune-Based System For Network Security," 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 2018, pp. 1-7, doi: 10.1109/ICCCEEE.2018.8515827.

DOI/URL: Adaptive Immune-Based System For Network Security | IEEE Conference Publication | IEEE Xplore


7.     M. A. Ahmed and Y. A. Mohamed, "Enhancing Intrusion Detection Using Statistical Functions," 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 2018, pp. 1-6, doi: 10.1109/ICCCEEE.2018.8515882..

DOI/URL: Enhancing Intrusion Detection Using Statistical Functions | IEEE Conference Publication | IEEE Xplore


 8.     Y. Abdelgadir and A. Abdullah, "Biologically inspired model for securing hybrid mobile ad hoc networks," 2008 International Symposium on Information Technology, Kuala Lumpur, Malaysia, 2008, pp. 1-6, doi: 10.1109/ITSIM.2008.4631673.

DOI/URL:  Biologically inspired model for securing hybrid mobile ad hoc networks | IEEE Conference Publication | IEEE Xplore

 9.     S. B. Ahmed and Y. A. Mohamed, "An Approach for Software-Defined Networks Security," 2023 Second International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), Trichirappalli, India, 2023, pp. 1-8, doi: 10.1109/ICEEICT56924.2023.10157809.

DOI/URL: An Approach for Software-Defined Networks Security | IEEE Conference Publication | IEEE Xplore

 10.  Y. a. Mohamed and A. B. Abdullah, "Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks," 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies, Penang, Malaysia, 2008, pp. 187-191, doi: 10.1109/HONET.2008.4810233.

DOI/URL: Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks | IEEE Conference Publication | IEEE Xplore


11.  S. Ibrahim and Y. Mohamed, "A Model for Enhancing Nested Mobile Nodes Performance," 2023 International Conference in Advances in Power, Signal, and Information Technology (APSIT), Bhubaneswar, India, 2023, pp. 411-418, doi: 10.1109/APSIT58554.2023.10201701.

DOI/URL: A Model for Enhancing Nested Mobile Nodes Performance | IEEE Conference Publication | IEEE Xplore

12. Y. A. Mohamed, M. Hashim and M. Bashir, "A Strategy to Mitigate ARP Spoofing Attacks on Hypervisors," 2024 Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, 2024, pp. 1-8, doi: 10.1109/ICAECT60202.2024.10469115.

DOI/URL: A Strategy to Mitigate ARP Spoofing Attacks on Hypervisors | IEEE Conference Publication | IEEE Xplore


13.  I. T. E. J. Mohammed and Y. A. Mohamed, "A New system for User Authentication Using Android Application," 2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 2021, pp. 1-5, doi: 10.1109/ICCCEEE49695.2021.9429637.

DOI/URL: A New system for User Authentication Using Android Application | IEEE Conference Publication | IEEE Xplore


14.  Y. A. Mohamed and A. B. Abdullah, "Securing mobile ad hoc domain by immune-inspired mechanism," TENCON 2009 - 2009 IEEE Region 10 Conference, Singapore, 2009, pp. 1-6, doi: 10.1109/TENCON.2009.5396041.
DOI/URL: Securing mobile ad hoc domain by immune-inspired mechanism | IEEE Conference Publication | IEEE Xplore


15.  Y. A. Mohamed and A. B. Abdullah, "Biologically inspired architecture for securing hybrid mobile ad hoc networks," 2008 International Conference on Innovations in Information Technology, Al Ain, United Arab Emirates, 2008, pp. 638-642, doi: 10.1109/INNOVATIONS.2008.4781710.

DOI/URL:Biologically inspired architecture for securing hybrid mobile ad hoc networks | IEEE Conference Publication | IEEE Xplore

آخر تعديل: Sunday، 13 October 2024، 9:28 PM