A
Ahmed ElShafee
Publications - 7
Citations - 144
Ahmed ElShafee is an academic researcher. The author has contributed to research in topics: Computer science & The Internet. The author has an hindex of 2, co-authored 2 publications receiving 131 citations.
Papers
More filters
Journal ArticleDOI
Design and Implementation of a WiFi Based Home Automation System
Ahmed ElShafee,Karim Alaa Hamed +1 more
TL;DR: A design and prototype implementation of new home automation system that uses WiFi technology as a network infrastructure connecting its parts and is better from the scalability and flexibility point of view than the commercially available home automation systems.
Journal Article
Requirements and Design of RFID based EManufacturing System
TL;DR: The requirements and design of RFID based system for SFC (Shop Floor Control) in order to achieve the factory real time controllability are proposed and RFID deployment in E-Manufacturing systems is investigated.
Journal ArticleDOI
Design and analysis of data link impersonation attack for wired LAN application layer services
Ahmed ElShafee,Walid El-Shafai +1 more
TL;DR: In this article , a new MAC spoofing attack called data link impersonation attack is proposed, where the attacker is considered a hardware intruder that deceives data link layer apparatus like the switches of layer two or three, taking advantage of a vulnerability in the MAC address table of the network nodes.
Journal ArticleDOI
Real-Time Multi-Class Infection Classification for Respiratory Diseases
Ahmed ElShafee,Walid El-Shafai,Abdulaziz Saad Alarifi,Mohammed Amoon,Aman Singh,Moustafa H. Aly +5 more
TL;DR: The proposed system is shown to be extremely robust and reliable for real-time COVID-19 diagnostic prediction and can also be used to forecast other lung-related disorders.
Journal ArticleDOI
MSDAR: Multi-Stage Dynamic Architecture Intrusion Detection System
Ahmed ElShafee,Marianne A. Azer +1 more
TL;DR: A comprehensive survey on intrusion detection systems in ad hoc networks, designed with a multi-stage detection approach making use of both signature-based and anomaly detection benefits, and provides a comparison between different Intrusion Detection Systems’ architectures.