default search action
Mohamed A. El-Zawawy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Mohamed A. El-Zawawy, Chhagan Lal, Mauro Conti:
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 25(2): 2017-2033 (2024) - 2023
- [j10]Mohamed A. El-Zawawy, Pallavi Kaliyar, Mauro Conti, Sokratis K. Katsikas:
Honey-list based authentication protocol for industrial IoT swarms. Comput. Commun. 211: 239-253 (2023) - [j9]Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 20(2): 1775-1789 (2023) - 2022
- [j8]Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022) - [j7]Mohamed A. El-Zawawy, Parvez Faruki, Mauro Conti:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022) - 2021
- [j6]Mohamed A. El-Zawawy, Eleonora Losiouk, Mauro Conti:
Vulnerabilities in Android webview objects: Still not the end! Comput. Secur. 109: 102395 (2021) - [j5]Mohamed A. El-Zawawy, Eleonora Losiouk, Mauro Conti:
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps. Int. J. Inf. Sec. 20(1): 39-58 (2021)
2010 – 2019
- 2019
- [j4]Mohamed A. El-Zawawy:
A new technique for intent elicitation in Android applications. Iran J. Comput. Sci. 2(2): 113-124 (2019) - 2017
- [c18]Mohamed A. El-Zawawy:
Separation Logic for States Dependencies in Life Cycles of Android Activities and Fragments. ICCSA (6) 2017: 218-232 - [c17]Mohamed A. El-Zawawy:
Posting Graphs for Finding Non-Terminating Executions in Asynchronous Programs. ICCSA (6) 2017: 233-245 - [c16]Mohamed A. El-Zawawy:
Modeling Android Fragments and Activities Life Cycles Coordination. ICCSA (5) 2017: 620-634 - 2016
- [c15]Mohamed A. El-Zawawy:
An Operational Semantics for Android Applications. ICCSA (5) 2016: 100-114 - [c14]Mohamed A. El-Zawawy:
A Type System for Android Applications. ICCSA (5) 2016: 115-128 - [c13]Mohamed A. El-Zawawy:
Finding Divergent Executions in Asynchronous Programs. ICCSA (5) 2016: 410-421 - 2015
- [c12]Mohamed A. El-Zawawy:
An Efficient Layer-Aware Technique for Developing Asynchronous Context-Oriented Software (ACOS). ICCSA (Short Papers/poster papers/PhD student showcase works) 2015: 14-20 - [c11]Mohamed A. El-Zawawy:
Boosting the Software Quality of Parallel Programming Using Logical Means. ICCSA (5) 2015: 101-116 - [c10]Mohamed A. El-Zawawy:
Novel Designs for Memory Checkers Using Semantics and Digital Sequential Circuits. ICCSA (4) 2015: 597-611 - [i16]Mohamed A. El-Zawawy:
Asynchronous Programming in a Prioritized Form. CoRR abs/1501.00669 (2015) - 2014
- [j3]Mohamed A. El-Zawawy:
Testing Automation of Context-Oriented Programs Using Separation Logic. Appl. Comput. Intell. Soft Comput. 2014: 930186:1-930186:8 (2014) - [c9]Mohamed A. El-Zawawy:
Proof-Carrying Model for Parsing Techniques. ICCSA (5) 2014: 1-14 - [c8]Mohamed A. El-Zawawy:
Certified Transformation for Static Single Assignment of SPMD Programs. ICCSA (Workshops/Short Papers/Posters) 2014: 12-17 - [c7]Mohamed A. El-Zawawy:
ConNet: A Network Programming Language with Concurrency. ICCSA (Workshops/Short Papers/Posters) 2014: 165-170 - [i15]Mohamed A. El-Zawawy, Eisa A. Aleisa:
A new model for Context-Oriented Programs. CoRR abs/1402.5647 (2014) - [i14]Mohamed A. El-Zawawy:
Distributed Data and Programs Slicing. CoRR abs/1402.5745 (2014) - [i13]Mohamed A. El-Zawawy, Adel I. AlSalem:
ImNet: An Imperative Network Programming Language. CoRR abs/1403.8028 (2014) - [i12]Mohamed A. El-Zawawy, Mohammad N. Alanazi:
An Efficient Binary Technique for Trace Simplifications of Concurrent Programs. CoRR abs/1405.4399 (2014) - [i11]Mohamed A. El-Zawawy, Mohammad N. Alanazi:
Probabilistic Alias Analysis for Parallel Programming in SSA Forms. CoRR abs/1405.4401 (2014) - [i10]Mohamed A. El-Zawawy, Adel I. AlSalem:
ImpNet: Programming Software-Defied Networks Using Imperative Techniques. CoRR abs/1407.2041 (2014) - 2013
- [c6]Mohamed A. El-Zawawy:
Frequent Statement and De-reference Elimination for Distributed Programs. ICCSA (3) 2013: 82-97 - [c5]Mohamed A. El-Zawawy:
Detection of Probabilistic Dangling References in Multi-core Programs Using Proof-Supported Tools. ICCSA (5) 2013: 516-530 - 2012
- [j2]Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:
New Error-recovery Techniques for Faulty-Calls of Functions. Comput. Inf. Sci. 5(3): 67-75 (2012) - [j1]Mohamed A. El-Zawawy, Hamada A. Nayel:
Type Systems Based Data Race Detector. Comput. Inf. Sci. 5(4): 53-60 (2012) - [c4]Mohamed A. El-Zawawy:
Abstraction Analysis and Certified Flow and Context Sensitive Points-to Relation for Distributed Programs. ICCSA (4) 2012: 83-99 - [c3]Mohamed A. El-Zawawy:
Heap Slicing Using Type Systems. ICCSA (3) 2012: 592-606 - [i9]Mohamed A. El-Zawawy:
Efficient techniques for mining spatial databases. CoRR abs/1206.0217 (2012) - [i8]Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:
Dynamic Verification for File Safety of Multithreaded Programs. CoRR abs/1206.1090 (2012) - [i7]Mohamed A. El-Zawawy:
Dead code elimination based pointer analysis for multithreaded programs. CoRR abs/1212.5089 (2012) - [i6]Mohamed A. El-Zawawy:
Recognition of Logically Related Regions Based Heap Abstraction. CoRR abs/1212.5094 (2012) - 2011
- [c2]Mohamed A. El-Zawawy:
Flow Sensitive-Insensitive Pointer Analysis Based Memory Safety for Multithreaded Programs. ICCSA (5) 2011: 355-369 - [i5]Mohamed A. El-Zawawy:
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis. CoRR abs/1104.0644 (2011) - [i4]Mohamed A. El-Zawawy, Hamada A. Nayel:
Partial Redundancy Elimination for Multi-threaded Programs. CoRR abs/1111.0640 (2011) - [i3]Mohamed A. El-Zawawy:
Probabilistic pointer analysis for multithreaded programs. CoRR abs/1112.3756 (2011)
2000 – 2009
- 2009
- [i2]Mohamed A. El-Zawawy, Mohamed E. El-Sharkawi:
Clustering with Obstacles in Spatial Databases. CoRR abs/0909.4409 (2009) - [i1]Mohamed E. El-Sharkawi, Mohamed A. El-Zawawy:
Algorithm for Spatial Clustering with Obstacles. CoRR abs/0909.4412 (2009) - 2006
- [c1]Mohamed A. El-Zawawy, Achim Jung:
Priestley Duality for Strong Proximity Lattices. MFPS 2006: 199-217
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint