SELECTED PUBLICATIONS

BOOKS:

Cybersecurity Books:

___________________

JOURNALS:

  • Desoky, Abdelrahman, et al. “A Novel Keyless Cryptosystem Based on Latin Square and Cognitive Artificial Intelligence for Blockchain and Covert Communications.” (International Journal of Applied Cryptography, Dec. 2023 (Accepted/In Print).
  • Bagasra, O., Shamabadi, N. S., Pandey, P., Desoky, A., & McLean, E. (2021). Differential expression of miRNAs in a human developing neuronal cell line chronically infected with Zika virus. Libyan Journal of Medicine, 16(1).
  • Desoky, A., “Uniform Resource Locator Based Steganography Methodology,” International Journal of Network Security, Vol.20, No.6, PP.1005-1015, Nov. 2018.
  • Desoky, A., “Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm – High Level Of Security For Fooling The Enemy,” Information Security Journal, 83-97, 2013.
  • Desoky, A., “Jokestega: Automatic Joke Generation Based Steganography,” International Journal of Security and Networks, Vol.7, No.3, pp.148 – 160, 2012.
  • Desoky, A., “Edustega: An Education-Centric Steganography Methodology,” International Journal of Security and Networks, Vol. 6, No. 2/3, pp. 153-173, 2011.
  • Desoky, A., “Sumstega: Summarization-Based Steganography Methodology,” International Journal of Information and Computer Security, Vol. 4, No. 3, pp. 234 – 263, 2011.
  • Desoky, A., “Headstega: E-Mail-Headers-Based Steganography Methodology,” International Journal of Electronic Security and Digital Forensics, Vol. 3, No. 4, pp. 289 – 310, 2010.
  • Desoky, A., “Comprehensive Linguistic Steganography Survey,” International Journal of Information and Computer Security, Vol. 4, No. 2, pp. 164-197, 2010.
  • Desoky, A., “NORMALS: Normal Linguistic Steganography Methodology,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, pp. 145-171, July 2010.
  • Desoky, A., “Matlist: Mature Linguistic Steganography Methodology,” Journal of Security and Communication Networks, Vol. 4, No. 6, pp. 697-718, 2011.
  • Desoky, A., “Listega: List-Based Steganography Methodology,” International Journal of Information Security, Springer-Verlag, Vol. 8, No. 4, pp. 247-261, April 2009.
  • Desoky, A., and Younis, M., “Chestega: Chess Steganography Methodology,” Journal of Security and Communication Networks, Vol. 2, Issue 6, pp. 555 – 566, March 2009.
  • Desoky, A. “Notestega: Notes-Based Steganography Methodology,” Information Security Journal: A Global Perspective, Vol. 18, No 4, pp. 178-193, January 2009.
  • Desoky, A., “Nostega: A Novel Noiseless Steganography Paradigm,” Journal of Digital Forensic Practice, Vol. 2, No. 3, pp. 132-139, July 2008.
  • Desoky, A., and Younis, M., “Graphstega: Graph Steganography Methodology,” Journal of Digital Forensic Practice, Vol. 2, No. 1, pp. 27-36, January 2008.

___________________

CONFERENCES:

  • Desoky, Abdelrahman, et al. “Latin Square and Artificial Intelligence Cryptography for Blockchain and Centralized Systems.” International Conference on Advanced Intelligent Systems and Informatics. Cham: Springer Nature Switzerland, 2023.
  • Desoky, Abdelrahman, et al. “Securing Confidential Information in Big Data Based on Cognitive Artificial Intelligence and Machine Learning.” 2023 International Conference on Artificial Intelligence Science and Applications in Industry and Society (CAISAIS). IEEE, 2023.
  • Ahmad Sabry M., Desoky, A. “Pain scoring; What is new in the 21st century? Poster presentation World Congress of Pain” Yokohama, Japan Sept 26th, 2016. Link: https://event.crowdcompass.com/wcp2016/activity/aUpRFJvw3W.
  • Peng Meng, Yun-Qing Shi, Liusheng Huang, Zhili Chen, Wei Yang, and Abdelrahman Desoky, “LinL: Lost in n-best list,” in the Proceedings of 13th Information Hiding Conference, pp. 329-341, May 2011.
  • Desoky, A., et al., “Auto-Summarization-Based Steganography,” in the Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, pp. 608 – 612, December 2008.

___________________

SYMPOSIUMS:

  • Desoky, A., ”A Novel Hardware Security Methodology (HSM) for Computers and Networks” STOS 2003 Symposium Event (Secure Trusted Operating System Consortium) at The George Washington University. (Invited Speaker, 2003).

___________________

TECHNICAL REPORTS:

  • Abdelrahman Desoky, Hany Ammar, “Cognitive Artificial Intelligence and Machine Learning Methodology for Securing Sensitive Information in Big Data,” Scired Technical Report TR/Project # 0315202302, Scired: Scientific Research and Development (Scired Corporation), https://scired.com.
  • Desoky, A., et al., “Artificial Intelligence Based Framework for Predicting the Spread of Climate Change Related Infectious Diseases,” Scired Technical Report TR/Project # 0115202301, Scired: Scientific Research and Development (Scired Corporation), https://scired.com
  • Abdelrahman Desoky, Hany Ammar. (2022). Keyless Cryptosystem Based on Latin Square for Blockchain and Covert Communications. Scired Technical Report TR/Project # 0115202201, Scired: Scientific Research and Development (Scired Corporation), https://scired.com.
  • Desoky, A., “Matlist: Mature Linguistic Steganography Methodology,” Technical Report TR-CS-08-02, Department of Computer Science and Electrical Engineering, University of Maryland, July 2008.
  • Desoky, A. and Younis, M., “PSM: Public Steganography Methodology,” Technical Report TR-CS-06-07, Department of Computer Science and Electrical Engineering, University of Maryland, November 2006.

___________________

PATENTS:

PENDING/IN PROCESS:

  • Desoky, A., “CipherInCipher: A Novel Keyless Cryptosystem Based on Latin Square and Artificial Intelligence for Blockchain and Covert Communication,” US PPAN 63/514,796July 2023.
  • Desoky, A., “CAIMLSSI: Cognitive Artificial Intelligence and Machine Learning Methodology for Securing Sensitive Information in Big Data Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence, Machine Learning, and Blockchain Based System for Prevention, Early Detection, and Monitoring COVID-19, Next Pandemic, and Other Diseases,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Graphstega: Graph Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Nostega: A Novel Noiseless Steganography Paradigm Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Notestega: Notes-Based Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Chestega: Chess Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Listega: List-Based Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Matlist: Mature Linguistic Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for NORMALS: Normal Linguistic Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Headstega: E-Mail-Headers-Based Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Sumstega: Summarization-Based Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Edustega: An Education-Centric Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Jokestega: Automatic Joke Generation Based Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm Applicable To Both Blockchain And Centralized System – High Level Of Security For Fooling The Enemy,” Patent Application In Process at Scired Patent Office.
  • Desoky, A., “Cognitive Artificial Intelligence and Machine Learning Based for Uniform Resource Locator Based Steganography Methodology Applicable To Both Blockchain And Centralized System,” Patent Application In Process at Scired Patent Office.

__________________

More TBA soon.