Armed Forces Training Authority Symposium
The main symposium of the Armed Forces Training Authority, titled “The Role of Science and…
The Chartered Institute for IT (BCS) chose Dr. Mohamad El-guindy as one of the most important figures in the field of information technology at the international level
Dr. Mohamed has been chosen for this award for his efforts as a cyber security…
Dr. Mohamed El-guindy has been chosen as a finalist for the ISSA Hall of Fame Award
Every year ISSA International recognizes excellence in information security professionals, the companies they work for,…
Malicious Use of AI: Legal and Ethical Implications – GAIEN4SG Talk By Dr.Mohamed El-Guindy
Artificial Intelligence (Al) and Machine Learning (ML) disruption are everywhere, from industry to national security….
Remote stress monitoring package for the management of soldiers’ physical load
MILitUP is a remote stress monitoring package for the management of soldiers’ physical load. Monitoring…
Basic information security tips
Information security protects critical data from unauthorized activities, including inspection and modification. Sensitive information such…
Finding Information on the Internet
The era of the computer, or as they call it, the digital era, has led…
Within the framework of the Armed Forces’ keenness to support bonds of cooperation and transfer…
Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism
This research paper discusses the technical and legal aspects of open source intelligence (OSINT) as…
Proposal to Create an Internet Ombudsman adopted by the Parliamentary Assembly of the Council of Europe.
It is our pleasure to announce that the Parliamentary Assembly of The Council of Europe…
Armed Forces Training Authority Symposium
The main symposium of the Armed Forces Training Authority, titled “The Role of Science and…
The Chartered Institute for IT (BCS) chose Dr. Mohamad El-guindy as one of the most important figures in the field of information technology at the international level
Dr. Mohamed has been chosen for this award for his efforts as a cyber security…
Dr. Mohamed El-guindy has been chosen as a finalist for the ISSA Hall of Fame Award
Every year ISSA International recognizes excellence in information security professionals, the companies they work for,…
Malicious Use of AI: Legal and Ethical Implications – GAIEN4SG Talk By Dr.Mohamed El-Guindy
Artificial Intelligence (Al) and Machine Learning (ML) disruption are everywhere, from industry to national security….
Remote stress monitoring package for the management of soldiers’ physical load
MILitUP is a remote stress monitoring package for the management of soldiers’ physical load. Monitoring…
Basic information security tips
Information security protects critical data from unauthorized activities, including inspection and modification. Sensitive information such…
Finding Information on the Internet
The era of the computer, or as they call it, the digital era, has led…
Within the framework of the Armed Forces’ keenness to support bonds of cooperation and transfer…
Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism
This research paper discusses the technical and legal aspects of open source intelligence (OSINT) as…
Proposal to Create an Internet Ombudsman adopted by the Parliamentary Assembly of the Council of Europe.
It is our pleasure to announce that the Parliamentary Assembly of The Council of Europe…