Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ali M. Meligy is active.

Publication


Featured researches published by Ali M. Meligy.


International Conference on Advanced Intelligent Systems and Informatics | 2017

Colored Petri Net Model for Blocking Misleading Information Propagation in Online Social Networks

Mohamed Torky; Ali M. Meligy; Hani M. Ibrahim; Aboul Ella Hassanein

Rumors and misleading information propagation is one of the open problems in Online Social Networks (OSN) that haven’t mature solutions till now. In this paper, we propose a Colored Petri Net(CPN) model for detecting and blocking misleading information propagation in OSNs. We experimentally simulated and evaluated the effectiveness of our proposed model on dataset of 1003-newsworthy tweets under the trending topic (#ISIS) in Twitter social network. According to Precision, Recall, and Accuracy metrics, our obtained results cleared outperforming in detecting misleading newsworthy tweets compared with other mechanisms in the literature. In addition, verifying the Reachability property of our CPN model proved that detecting and blocking misleading tweets are reachable states according to the firing life-cycle of tokens.


international conference on informatics and systems | 2016

Minimal privacy disclosure for Accessing Web services

Ali M. Meligy; Emad Elabd; Sahar Kootb

Web services are considered as a powerful solution for information systems integration which is based on the service oriented architecture (SOA). Privacy is a big obstacle when using web services. Therefore, accessing web service with minimal privacy disclosure is an important challenge. Credentials encryption are used for privacy preserving. To the best of our knowledge, in the current privacy preserving approaches for web services, there is no technique that uses the credentials encryption using certificate authority as a third party. In this paper, a proposed approach for minimal privacy disclosure is proposed. This approach is based on the encryption and certificate authorities as third parties. The proposed approach is implemented and tested. The results show that the minimal privacy disclosure is achieved in the proposed approach.


International Journal of Image, Graphics and Signal Processing | 2016

A Hybrid Technique for Enhancing the Efficiency of Audio Steganography

Ali M. Meligy; Mohammed M. Nasef; Fatma T. Eid


International Journal of Intelligent Systems and Applications | 2015

A Framework for Detecting Cloning Attacks in OSN Based on a Novel Social Graph Topology

Ali M. Meligy; Hani M. Ibrahim; Mohamed Torky


International Journal of Computer Network and Information Security | 2015

An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys

Ali M. Meligy; Mohammed M. Nasef; Fatma T. Eid


International Journal of Computer Network and Information Security | 2017

Identity Verification Mechanism for Detecting Fake Profiles in Online Social Networks

Ali M. Meligy; Hani M. Ibrahim; Mohamed Torky


international computer engineering conference | 2016

Securing Online Social Networks against bad Bots based on a Necklace CAPTCHA approach

Mohamed Torky; Ali M. Meligy; Hani M. Ibrahim


Indian journal of science and technology | 2017

Recognizing and Stopping Rumors Patterns in Social Networks

Ali M. Meligy; H. M. Ibrahim; M. F. Torky


international computer engineering conference | 2016

Recognizing Fake identities in Online Social Networks based on a Finite Automaton approach

Mohamed Torky; Ali M. Meligy; Hani M. Ibrahim


International Journal of Modern Education and Computer Science | 2016

Web Services Privacy Preserving Based on Negotiation and Certificate Authorities

Ali M. Meligy; Emad Elabd; Sahar Kotb

Collaboration


Dive into the Ali M. Meligy's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge