default search action
BibTeX records: Ahmed Awad
@inproceedings{DBLP:conf/ACMdis/JonesAKN24, author = {Lee Jones and Ahmed Awad and Marion Koelle and Sara Nabil}, editor = {Anna Vallg{\aa}rda and Li J{\"{o}}nsson and Jonas Fritsch and Sarah Fdili Alaoui and Christopher A. Le Dantec}, title = {Hand Spinning E-textile Yarns: Understanding the Craft Practices of Hand Spinners and Workshop Explorations with E-textile Fibers and Materials}, booktitle = {Designing Interactive Systems Conference, {DIS} 2024, {IT} University of Copenhagen, Denmark, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643834.3660717}, doi = {10.1145/3643834.3660717}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMdis/JonesAKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-01940, author = {Saeed Sanati and Maher A. Azzouz and Ahmed Awad}, title = {An Adaptive Overcurrent Protection for Solar-based {DC} Microgrids Using {IEC} 61850}, journal = {CoRR}, volume = {abs/2307.01940}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.01940}, doi = {10.48550/ARXIV.2307.01940}, eprinttype = {arXiv}, eprint = {2307.01940}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-01940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlshanketiTA19, author = {Faisal Alshanketi and Issa Traor{\'{e}} and Ahmed Awad}, title = {Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords}, journal = {Secur. Priv.}, volume = {2}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/spy2.48}, doi = {10.1002/SPY2.48}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AlshanketiTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsie/AwadN19, author = {Ahmed Awad and Khaled Nagaty}, title = {Commit Message Generation from Code Differences using Hidden Markov Models}, booktitle = {Proceedings of the 2019 8th International Conference on Software and Information Engineering, {ICSIE} 2019, Cairo, Egypt, April 09-12, 2019}, pages = {96--99}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3328833.3328873}, doi = {10.1145/3328833.3328873}, timestamp = {Fri, 05 Feb 2021 13:35:00 +0100}, biburl = {https://dblp.org/rec/conf/icsie/AwadN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/AwadK19, author = {Ahmed Awad and Brad Karp}, title = {Execution integrity without implicit trust of system software}, booktitle = {Proceedings of the 4th Workshop on System Software for Trusted Execution, SysTEX@SOSP 2019, Huntsville, ON, Canada, October 27-30, 2019}, pages = {5:1--5:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3342559.3365337}, doi = {10.1145/3342559.3365337}, timestamp = {Tue, 19 Nov 2019 12:43:42 +0100}, biburl = {https://dblp.org/rec/conf/sosp/AwadK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/WoungangDRA18, author = {Isaac Woungang and Sanjay Kumar Dhurandher and Joel J. P. C. Rodrigues and Ahmed Awad}, title = {Special Issue on security and privacy in Internet of Things and cloud computing systems}, journal = {Secur. Priv.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/spy2.43}, doi = {10.1002/SPY2.43}, timestamp = {Fri, 29 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/WoungangDRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isddc/AlshanketiTKA18, author = {Faisal Alshanketi and Issa Traor{\'{e}} and Awos Kanan and Ahmed Awad}, editor = {Issa Traor{\'{e}} and Isaac Woungang and Sherif Saad Ahmed and Yasir Malik}, title = {Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods}, booktitle = {Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments - Second International Conference, {ISDDC} 2018, Vancouver, BC, Canada, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11317}, pages = {38--49}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03712-3\_4}, doi = {10.1007/978-3-030-03712-3\_4}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/isddc/AlshanketiTKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipr/TaqiAAM18, author = {Arwa Mohammed Taqi and Ahmed Awad and Fadwa Al{-}Azzo and Mariofanna G. Milanova}, title = {The Impact of Multi-Optimizers and Data Augmentation on TensorFlow Convolutional Neural Network Performance}, booktitle = {{IEEE} 1st Conference on Multimedia Information Processing and Retrieval, {MIPR} 2018, Miami, FL, USA, April 10-12, 2018}, pages = {140--145}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.ieeecomputersociety.org/10.1109/MIPR.2018.00032}, doi = {10.1109/MIPR.2018.00032}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mipr/TaqiAAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RoseLA17, author = {Jamison Rose and Yudong Liu and Ahmed Awad}, title = {Biometric Authentication Using Mouseand Eye Movement Data}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {1}, pages = {1--16}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.611}, doi = {10.13052/JCSM2245-1439.611}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RoseLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChaiphetNAJGG17, author = {Chiraphat Chaiphet and Sudsanguan Ngamsuriyaroj and Ahmed Awad and Betran Jacob and Ioannis Gakos and Wiktor Grajkowski}, title = {Secure Enclave for {TLS} Web Server on Untrusted Environment}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {27--31}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163063}, doi = {10.1145/3163058.3163063}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ChaiphetNAJGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RoseLA17, author = {Jamison Rose and Yudong Liu and Ahmed Awad}, title = {Biometric Authentication Using Mouse and Eye Movement Data}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {47--55}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.18}, doi = {10.1109/SPW.2017.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RoseLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isddc/2017, editor = {Issa Traor{\'{e}} and Isaac Woungang and Ahmed Awad}, title = {Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments - First International Conference, {ISDDC} 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10618}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69155-8}, doi = {10.1007/978-3-319-69155-8}, isbn = {978-3-319-69154-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isddc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icca/AwadW16, author = {Ahmed Awad and Haoping Wang}, title = {Sliding mode based integrated pitch-yaw acceleration autopilot design for varying-velocity missile}, booktitle = {12th {IEEE} International Conference on Control and Automation, {ICCA} 2016, Kathmandu, Nepal, June 1-3, 2016}, pages = {104--109}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCA.2016.7505260}, doi = {10.1109/ICCA.2016.7505260}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icca/AwadW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/AwadAH11, author = {Ahmed Awad and Abdallatif S. Abu{-}Issa and Said Hamdioui}, title = {Reducing Test Power for Embedded Memories}, booktitle = {2011 {IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2011, Vancouver, BC, Canada, October 3-5, 2011}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DFT.2011.59}, doi = {10.1109/DFT.2011.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/AwadAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.