BibTeX records: Ahmed Awad

download as .bib file

@article{DBLP:journals/corr/abs-2307-01940,
  author       = {Saeed Sanati and
                  Maher A. Azzouz and
                  Ahmed Awad},
  title        = {An Adaptive Overcurrent Protection for Solar-based {DC} Microgrids
                  Using {IEC} 61850},
  journal      = {CoRR},
  volume       = {abs/2307.01940},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.01940},
  doi          = {10.48550/ARXIV.2307.01940},
  eprinttype    = {arXiv},
  eprint       = {2307.01940},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-01940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlshanketiTA19,
  author       = {Faisal Alshanketi and
                  Issa Traor{\'{e}} and
                  Ahmed Awad},
  title        = {Multimodal mobile keystroke dynamics biometrics combining fixed and
                  variable passwords},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.48},
  doi          = {10.1002/SPY2.48},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AlshanketiTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsie/AwadN19,
  author       = {Ahmed Awad and
                  Khaled Nagaty},
  title        = {Commit Message Generation from Code Differences using Hidden Markov
                  Models},
  booktitle    = {Proceedings of the 2019 8th International Conference on Software and
                  Information Engineering, {ICSIE} 2019, Cairo, Egypt, April 09-12,
                  2019},
  pages        = {96--99},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3328833.3328873},
  doi          = {10.1145/3328833.3328873},
  timestamp    = {Fri, 05 Feb 2021 13:35:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsie/AwadN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/AwadK19,
  author       = {Ahmed Awad and
                  Brad Karp},
  title        = {Execution integrity without implicit trust of system software},
  booktitle    = {Proceedings of the 4th Workshop on System Software for Trusted Execution,
                  SysTEX@SOSP 2019, Huntsville, ON, Canada, October 27-30, 2019},
  pages        = {5:1--5:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342559.3365337},
  doi          = {10.1145/3342559.3365337},
  timestamp    = {Tue, 19 Nov 2019 12:43:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/AwadK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/WoungangDRA18,
  author       = {Isaac Woungang and
                  Sanjay Kumar Dhurandher and
                  Joel J. P. C. Rodrigues and
                  Ahmed Awad},
  title        = {Special Issue on security and privacy in Internet of Things and cloud
                  computing systems},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.43},
  doi          = {10.1002/SPY2.43},
  timestamp    = {Fri, 29 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/WoungangDRA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isddc/AlshanketiTKA18,
  author       = {Faisal Alshanketi and
                  Issa Traor{\'{e}} and
                  Awos Kanan and
                  Ahmed Awad},
  editor       = {Issa Traor{\'{e}} and
                  Isaac Woungang and
                  Sherif Saad Ahmed and
                  Yasir Malik},
  title        = {Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification
                  Methods},
  booktitle    = {Intelligent, Secure, and Dependable Systems in Distributed and Cloud
                  Environments - Second International Conference, {ISDDC} 2018, Vancouver,
                  BC, Canada, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11317},
  pages        = {38--49},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03712-3\_4},
  doi          = {10.1007/978-3-030-03712-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/isddc/AlshanketiTKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipr/TaqiAAM18,
  author       = {Arwa Mohammed Taqi and
                  Ahmed Awad and
                  Fadwa Al{-}Azzo and
                  Mariofanna G. Milanova},
  title        = {The Impact of Multi-Optimizers and Data Augmentation on TensorFlow
                  Convolutional Neural Network Performance},
  booktitle    = {{IEEE} 1st Conference on Multimedia Information Processing and Retrieval,
                  {MIPR} 2018, Miami, FL, USA, April 10-12, 2018},
  pages        = {140--145},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.ieeecomputersociety.org/10.1109/MIPR.2018.00032},
  doi          = {10.1109/MIPR.2018.00032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mipr/TaqiAAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RoseLA17,
  author       = {Jamison Rose and
                  Yudong Liu and
                  Ahmed Awad},
  title        = {Biometric Authentication Using Mouseand Eye Movement Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {1},
  pages        = {1--16},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.611},
  doi          = {10.13052/JCSM2245-1439.611},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RoseLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChaiphetNAJGG17,
  author       = {Chiraphat Chaiphet and
                  Sudsanguan Ngamsuriyaroj and
                  Ahmed Awad and
                  Betran Jacob and
                  Ioannis Gakos and
                  Wiktor Grajkowski},
  title        = {Secure Enclave for {TLS} Web Server on Untrusted Environment},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {27--31},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163063},
  doi          = {10.1145/3163058.3163063},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ChaiphetNAJGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RoseLA17,
  author       = {Jamison Rose and
                  Yudong Liu and
                  Ahmed Awad},
  title        = {Biometric Authentication Using Mouse and Eye Movement Data},
  booktitle    = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
                  Jose, CA, USA, May 25, 2017},
  pages        = {47--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SPW.2017.18},
  doi          = {10.1109/SPW.2017.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RoseLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isddc/2017,
  editor       = {Issa Traor{\'{e}} and
                  Isaac Woungang and
                  Ahmed Awad},
  title        = {Intelligent, Secure, and Dependable Systems in Distributed and Cloud
                  Environments - First International Conference, {ISDDC} 2017, Vancouver,
                  BC, Canada, October 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10618},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69155-8},
  doi          = {10.1007/978-3-319-69155-8},
  isbn         = {978-3-319-69154-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isddc/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icca/AwadW16,
  author       = {Ahmed Awad and
                  Haoping Wang},
  title        = {Sliding mode based integrated pitch-yaw acceleration autopilot design
                  for varying-velocity missile},
  booktitle    = {12th {IEEE} International Conference on Control and Automation, {ICCA}
                  2016, Kathmandu, Nepal, June 1-3, 2016},
  pages        = {104--109},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCA.2016.7505260},
  doi          = {10.1109/ICCA.2016.7505260},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icca/AwadW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/AwadAH11,
  author       = {Ahmed Awad and
                  Abdallatif S. Abu{-}Issa and
                  Said Hamdioui},
  title        = {Reducing Test Power for Embedded Memories},
  booktitle    = {2011 {IEEE} International Symposium on Defect and Fault Tolerance
                  in {VLSI} and Nanotechnology Systems, {DFT} 2011, Vancouver, BC, Canada,
                  October 3-5, 2011},
  pages        = {112--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DFT.2011.59},
  doi          = {10.1109/DFT.2011.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/AwadAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics