Amira Kotb

Learn More
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security scheme it is necessary to understand how malicious nodes can attack the MANETs. Focusing on the(More)
This paper proposes a new approach for e-assessment or e-examination authentication. This approach enables educational institutions to conduct cheating-free e-examinations, which has been considered a big challenge of e-learning within the previous decade. It ensures that an examinee is the correct student throughout his exam. This approach provides(More)
Wireless network is a growing technology that facilitates users for sharing of information instantly through wireless electronic devices irrespective of their locations. It can be infrastructure based or infrastructure less (ad hoc networks). An ad hoc network gains more attention because of its convenience, mobility, scalability, cost and easy setup. It is(More)
Cognitive Radio Networks (CRNs) allow their unlicensed users named Secondary Users (SUs) to share and access licensed wireless spectrum band without any kind of interference with its original users named Primary Users (PUs); and under condition that the PUs' Quality of Service (QoS) won't degrade. Due to the large number of SUs and as all of them will have(More)
  • 1