


default search action
Magdy S. El-Soudani
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j4]Mohamed S. AbuZeid
, Yasmine A. Fahmy
, Magdy S. El-Soudani:
Adaptive Combined Channel-Network Coding for Cooperative Relay Aided Cognitive Radio Networks. Inf. 12(8): 320 (2021) - [c18]Nora A. Ali, Magdy S. El-Soudani, Hany M. ElSayed, Hebat-Allah M. Mourad, Hassanein H. Amer:
Interference Mitigation in D2D Communications for 5G Mobile Networks. ECAI 2021: 1-6 - 2020
- [j3]Mohamed Haggag
, Mohsen M. Tantawy
, Magdi M. S. El-Soudani
:
Implementing a Deep Learning Model for Intrusion Detection on Apache Spark Platform. IEEE Access 8: 163660-163672 (2020) - [c17]Nagwa Ibrahim, Ashraf A. Eltholth
, Magdy S. El-Soudani:
Hybrid FSO/mmWave based Fronthaul C-RAN Optimization for Future Wireless Communications. WOCC 2020: 1-6
2010 – 2019
- 2019
- [c16]Gehad I. Alkady, Dina G. Mahmoud
, Ramez M. Daoud, Hassanein H. Amer, Manar N. Shaker, Hany M. ElSayed, Magdy S. El-Soudani, Ihab Adly, Betim Cico
:
Reliable FPGA-Based Network Architecture for Smart Cities. ICM 2019: 334-337 - 2015
- [c15]Ibrahim Atef, Ashraf A. Eltholth
, Ahmed S. Ibrahim
, Magdy S. El-Soudani:
Energy detection of random arrival and departure of primary user signals in Cognitive Radio systems. EUROCON 2015: 1-6 - 2012
- [j2]Mahmoud A. Abdelmonem, Mohammed Nafie
, Mahmoud H. Ismail
, Magdy S. El-Soudani:
Optimized spectrum sensing algorithms for cognitive LTE femtocells. EURASIP J. Wirel. Commun. Netw. 2012: 6 (2012) - 2010
- [c14]Marianne Azer
, Sherif El-Kassas, Magdy S. El-Soudani:
An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks. ICNSC 2010: 366-371 - [c13]Shereen A. M. Baghdady, Yasmine A. Fahmy, Magdi M. S. El-Soudani:
An incremental redundancy short length LDPC codes based on random construction techniques. ICT 2010: 18-22 - [c12]Mahmoud A. Abdelmonem, Mahmoud H. Ismail
, Magdy S. El-Soudani, Mohammed Nafie
:
Coarse spectrum sensing for LTE systems. ICT 2010: 116-121
2000 – 2009
- 2009
- [c11]Samy S. Botros, Hany M. Elsayed, Hassanein H. Amer, Magdy S. El-Soudani:
Lifetime Optimization in Hierarchical Wireless Sensor Networks. ETFA 2009: 1-8 - [c10]George F. Zaki, Hany M. Elsayed, Hassanein H. Amer, Magdy S. El-Soudani:
Energy Balanced Model for Data Gathering in Wireless Sensor Networks with Fixed and Mobile Sinks. ICCCN 2009: 1-6 - [c9]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes. SECRYPT 2009: 69-74 - [c8]Marianne Azer
, Sherif El-Kassas, Magdy S. El-Soudani:
Security in Ad Hoc Networks: From Vulnerability to Risk Management. SECURWARE 2009: 203-209 - [i1]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks. CoRR abs/0906.1245 (2009) - 2008
- [c7]Marianne Azer
, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani:
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. ARES 2008: 636-641 - [c6]Marianne Azer
, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani:
A Survey on Trust and Reputation Schemes in Ad Hoc Networks. ARES 2008: 881-886 - 2007
- [c5]Marianne Azer
, Sherif El-Kassas, Magdy S. El-Soudani:
Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 5 - [c4]Marianne Azer
, Sherif El-Kassas, Magdy S. El-Soudani:
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges. ICSNC 2007: 17 - 2006
- [c3]Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection. SECRYPT 2006: 63-68 - 2004
- [j1]Mahmoud H. Ismail
, Hebat-Allah M. Mourad, Magdi M. S. El-Soudani:
Link Adaptation Based on Explicit Channel Estimation for Throughput Maximization Over Rayleigh Fading Channels. Wirel. Pers. Commun. 31(1-2): 77-87 (2004) - 2003
- [c2]Magdy S. El-Soudani, Mohamed A. Eissa:
Cooperative Defense Firewall Protocol. SEC 2003: 373-384 - 2002
- [c1]Magdy S. El-Soudani, H. S. El-Refaey, H. M. Mourad:
Zero Knowledge Broadcasting Identification Scheme. SEC 2002: 227-238
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint