Egyptian Informatics Journal

Papers
(The H4-Index of Egyptian Informatics Journal is 26. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
IFC: Editorial273
Gaining insights into the physicochemical properties and sequence space of blood–brain barrier penetrating peptides238
A resilient image encryption scheme using Laplace transform155
An analysis of 5G-MIMO communication system based SS for centralized cooperative and non-cooperative users74
CoTNeT: Contextual transformer network for encrypted traffic classification72
A blockchain-based models for student information systems62
Detecting Covid-19 chaos driven phishing/malicious URL attacks by a fuzzy logic and data mining based intelligence system60
High-accuracy lung disease classification via logistic regression and advanced feature extraction techniques46
Precision blood pressure prediction leveraging Photoplethysmograph signals using Support Vector Regression43
An improvised nature-inspired algorithm enfolded broad learning system for disease classification40
Intelligent vineyard blade density measurement method incorporating a lightweight vision transformer37
Reverse polarity optical Orthogonal frequency Division Multiplexing for High-Speed visible light communications system35
Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems34
Cerebral palsy-affected individuals' brain-computer interface for wheelchair movement in an indoor environment using mental tasks32
ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks32
Ransomware detection based on machine learning using memory features31
Advanced colon cancer detection: Integrating context-aware multi-image fusion (Camif) in a multi-stage framework31
IFC: Editorial30
Enhanced threat intelligence framework for advanced cybersecurity resilience30
Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization28
An improved energy-efficient head election protocol for clustering techniques of wireless sensor network (June 2020)28
The fuzzy common vulnerability scoring system (F-CVSS) based on a least squares approach with fuzzy logistic regression28
Optimizing fault prediction in software based on MnasNet/LSTM optimized by an improved lotus flower algorithm27
Advanced segmentation method for integrating multi-omics data for early cancer detection27
Graph Sample and Aggregate-Attention network optimized for automatic translation of five line stanzas of Tang poems to poetic language27
Email spam detection by deep learning models using novel feature selection technique and BERT26
0.1024181842804