Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Amira Kotb is active.

Publication


Featured researches published by Amira Kotb.


Procedia Computer Science | 2011

Misbehavior nodes detection and isolation for MANETs OLSR protocol

Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari

Abstract Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs) are required to develop a strong security scheme it is therefore necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol, an IDS mechanism to accurately detect and isolate misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The collaboration of a group of neighbor nodes is used to make accurate decisions. Creating and broadcasting attackers list to neighbor nodes enables other node to isolate misbehavior nodes by eliminating them from the routing table. Eliminating misbehavior node allows the source to select another trusted path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.


International Journal of Advanced Computer Science and Applications | 2013

Detection and Isolation of Packet Dropping Attacker in MANETs

Ahmed Mohamed Abdalla; Ahmad H. Almazeed; Imane Aly Saroit; Amira Kotb

Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR) routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM). DIPDAM mechanism based on three ID messages Path Validation Message (PVM) , Attacker Finder Message (AFM) and Attacker Isolation Message (AIM). DIPDAM mechanism based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.


international conference on computer technology and development | 2010

An IDS for detecting misbehavior nodes in optimized link state routing protocol

Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari

Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security scheme it is necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol an IDS mechanism to accurately detect misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.


international conference on sciences of electronics technologies of information and telecommunications | 2012

Synchronous authentication with bimodal biometrics for e-assessment: A theoretical model

Yousef Sabbah; Imane Aly Saroit; Amira Kotb

This paper presents a theoretical model for summative e-assessment in distance learning for the future, where exams can be conducted distantly, e.g. at home. This model aims to provide e-learning systems with an authentication approach that guarantees cheating-free summative e-assessment. It utilizes a combination of live video monitoring and a bimodal biometrics approach. Together they form a robust and highly secure model to ensure that the examinee is the correct person throughout the e-assessment period without a need for a proctor. Advanced techniques of image and video processing and feature extraction are required to implement this model.


Egyptian Informatics Journal | 2017

Grouped tasks scheduling algorithm based on QoS in cloud computing network

Hend Gamal El Din Hassan Ali; Imane Aly Saroit; Amira Kotb


International journal of advanced computer science | 2011

An IDS for Detecting Misbehavior Nodes in Optimized Link State Routing Protocol

Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari


Biometrics and Bioinformatics | 2012

A Smart Approach for Bimodal Biometric Authentication in Home-Exams (SABBAH Model)

Yousef Sabbah; Imane Aly Saroit; Amira Kotb


2011 RoEduNet International Conference 10th Edition: Networking in Education and Research | 2011

An interactive and secure e-examination unit (ISEEU)

Yousef Sabbah; Imane Aly Saroit; Amira Kotb


Archive | 2011

An Interactive and Secure E-Examination Unit (ISEEU) A Proposed Model for Proctoring Online Exams

Yousef Sabbah; Imane Aly Saroit; Amira Kotb


The Egyptian Computer Science Journal (ESC) | 2016

ARDS: A Model for Securing Data in Mobile Cloud Computing

Hesham N. Elmahdy; Heba Sherif Sobhy; Amira Kotb

Collaboration


Dive into the Amira Kotb's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ahmed Mohamed Abdalla

The Public Authority for Applied Education and Training

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge