Eman Abdelfattah

Eman Abdelfattah
University of Bridgeport · Department of Computer Science & Engineering

About

34
Publications
25,367
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
383
Citations
Citations since 2016
15 Research Items
299 Citations
20162017201820192020202120220204060
20162017201820192020202120220204060
20162017201820192020202120220204060
20162017201820192020202120220204060

Publications

Publications (34)
Article
Full-text available
Every day, cyberattacks increase and use different strategies. One of the most common cyberattacks is Phishing, where the attacker collects sensitive and confidential information by pretending as a trusted party. Different traditional strategies have been introduced for anti-phishing, such as blacklisted, heuristic search, and visual similarity. Mo...
Conference Paper
Full-text available
Websites phishing is a cyber-attack that targets online users to steal their sensitive information including login credentials and banking details. Attackers fool the users by presenting the masked webpage as a legitimate or trustworthy to retrieve their essential data. Several solutions to phishing websites attacks have been proposed such as heuri...
Conference Paper
Full-text available
A Local Area Network is designed and simulated to investigate the effect of Quality of Service (QoS) on the performance of the network. The experiment examines the performance of non-QoS scenario and QoS scenario. Voice Jitter, Voice Mean Opinion Score value, Voice Packet End-to-End Delay, Voice Packet Delay Variation, Voice traffic received, and V...
Conference Paper
Full-text available
The enormous growth of Internet-based traffic exposes corporate networks with a wide variety of vulnerabilities. Intrusive traffics are affecting the normal functionality of network’s operation by consuming corporate resources and time. Efficient ways of identifying, protecting, and mitigating from intrusive incidents enhance productivity. As Intru...
Preprint
Full-text available
In the last decade, with the advancement of big data technology and the internet of things, wireless sensor networks (WSN) become fundamental for the success of different range of applications specially those demanding massive data processing. A target tracking system is a significant part of WSNs that has its own advantages and challenges. In this...
Conference Paper
Full-text available
Abstract—Effects of ping of death attack from standalone and multiple attacking machines are compared with healthy network configuration by applying the attack to the Database and File Transfer Protocol (FTP) server. Riverbed Modeler Academic Edition 17.5 is used to design and analyze the performance of the network. A comparison of three scenarios...
Article
Full-text available
Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development in both digital contents and communication. The imperceptibility, hiding capacity, and robustness against attacks are three main requirements that any video steganography method should take i...
Conference Paper
Full-text available
Quantum algorithms have gained a lot of consideration especially for the need of searching unsorted database in a faster way rather than using the classical search mechanisms. This paper introduces a new quantum sort algorithm by employing the quantum features to expedite the searching process in conventional environments. The proposed efficient so...
Conference Paper
Full-text available
This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text...
Conference Paper
Full-text available
A Wireless Sensor Network (WSN) is an assemblage of cooperative sensor nodes acting together into an environment to monitor an event of interest. However, one of the most limiting factors is the energy constrain for each node; therefore, it is a trade-off is required for that factor in designing of a network, while reporting, tracking or visualizin...
Article
Full-text available
With developments of real-time applications into data centers, the need for alternatives of the standard TCP protocol has been prime demand in several applications of data centers. The several alternatives of TCP protocol has been proposed but SCTP has edge due to its several well-built characteristics that make it capable to work efficiently. In t...
Chapter
Full-text available
Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and...
Conference Paper
Full-text available
Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and...
Conference Paper
Full-text available
this paper aims to solve the security issues between two parties communicating through a Quantum channel. One of the most effective factors in Quantum cryptography is the trust between two or more parties. Communication parties need to verify the authenticity of each other and who they claim to be. The proposed model introduces a trusted center as...
Conference Paper
Full-text available
Classical cryptography is based on the computational difficulty to compute the secret key using the current computing systems. Depending only on the difficulty of computational complexity does not provide enough security because finding a fast method to calculate the secret key will compromise the security of the systems. Quantum computing uses the...
Conference Paper
This paper presents a performance evaluation approach using the BERTool module provided under Matlab/Simulink software package. It compares different Quadrature Amplitude Modulation (QAM) techniques at different bit rates (8, 16, 32, 64, 128, and 256) based on the Bit Error Rate (BER) versus the Ratio of Bit Energy to Noise Power Spectral Density (...
Conference Paper
Full-text available
Vehicular Ad-hoc Network (VANET) is a new network technology where the cars are used as mobile nodes to form a communication network. In VANET, routing protocols have a significant role in terms of the performance because they determine the way of sending and receiving packets between mobile nodes. In this paper, we examine and analyze the performa...
Article
Full-text available
Extensive use of wireless networks in different fields increases the need to improve their performance, as well as minimize the amplitude of loss messages. Device mobility, where there is no standard topology that can be applied or fixed routing that can be designed, is a topic that received recent attention in wireless networks. In a Mobile Ad Hoc...
Article
Full-text available
Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to connect and disconnect from the network at any time and have also freedom of movement. Manhattan Mobility Model is proposed generally for urban areas that have grid streets topology, this model is organized in a specific way where there are number of v...
Article
Full-text available
In this paper, we are evaluating the performance of Huffman and Run Length Encoding compressionalgorithms with multimedia data. We have used different types of multimedia formats such as images andtext. Extensive experimentation with different file sizes was used to compare both algorithms evaluatingthe compression ratio and compression time. Huffm...
Article
Full-text available
The efficiency of sensor networks strongly depends on the routing protocol used. In this paper, we analyze three different types of routing protocols: LEACH, PEGASIS, and VGA. Sensor networks aresimulated using Sensoria simulator. Several simulations are conducted to analyze the performance of these protocols including the power consumption and ove...
Conference Paper
Full-text available
This paper investigates the role of the scientific signs in the holy Quran in improving the creative thinking skills for the deaf children using multimedia. The paper investigates if the performance made by the experimental group’s individuals is statistically significant compared with the performance made by the control group’s individuals on Torr...
Chapter
In this paper we are considering the performance evaluation of three routing protocols in Mobile Ad-hoc Networks (MANETs). We have tested the effect of speed, TCP types, and maximum queue length for Destination Sequence Distance Vector (DSDV) protocol, Dynamic Source Routing (DSR), and Ad-hoc On Demand Distance Vector (AODV).
Conference Paper
There are many congestion control mechanisms of TCP reported in the literature. Examples of these mechanisms are additive increase/multiplicative decrease, slow start, fast retransmit and fast recovery, and selective acknowledgement. Different versions of TCP have been implemented that include the previous mechanisms. Examples of these versions are...
Data
In this paper a simulated annealing algorithm for register allocation is presented. The algorithm is based on the Metropolis procedure. The procedure accepts a new solution with less profit based on a probabilistic function. The objective of the heuristic is to color a graph representing the register allocation problem to maximize the profit functi...
Data
In this paper a simulated annealing algorithm for register allocation is presented. The algorithm is based on the Metropolis procedure. The procedure accepts a new solution with less profit based on a probabilistic function. The objective of the heuristic is to color a graph representing the register allocation problem to maximize the profit functi...
Conference Paper
Full-text available
In this paper a simulated annealing algorithm for register allocation is presented. The algorithm is based on the Metropolis procedure. The procedure accepts a new solution with less profit based on a probabilistic function. The objective of the heuristic is to color a graph representing the register allocation problem to maximize the profit functi...

Network

Cited By