Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ali Ismail Awad
@article{DBLP:journals/csur/KebandeA24, author = {Victor R. Kebande and Ali Ismail Awad}, title = {Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions}, journal = {{ACM} Comput. Surv.}, volume = {56}, number = {5}, pages = {131:1--131:37}, year = {2024}, url = {https://doi.org/10.1145/3635030}, doi = {10.1145/3635030}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KebandeA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/TedeschiNAN24, author = {Pietro Tedeschi and Fatima Ali Al Nuaimi and Ali Ismail Awad and Enrico Natalizio}, title = {Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {20}, number = {2}, pages = {1069--1080}, year = {2024}, url = {https://doi.org/10.1109/TII.2023.3280325}, doi = {10.1109/TII.2023.3280325}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/TedeschiNAN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/AwadSKA23, author = {Ali Ismail Awad and Mostafa Shokry and Ashraf A. M. Khalaf and Mahmoud Khaled Abd{-}Ellah}, title = {Assessment of potential security risks in advanced metering infrastructure using the {OCTAVE} Allegro approach}, journal = {Comput. Electr. Eng.}, volume = {108}, pages = {108667}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108667}, doi = {10.1016/J.COMPELECENG.2023.108667}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/AwadSKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/AlaniAB23, author = {Mohammed M. Alani and Ali Ismail Awad and Ezedin Barka}, title = {{ARP-PROBE:} An {ARP} spoofing detector for Internet of Things networks using explainable deep learning}, journal = {Internet Things}, volume = {23}, pages = {100861}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100861}, doi = {10.1016/J.IOT.2023.100861}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/AlaniAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KheddarHA23, author = {Hamza Kheddar and Yassine Himeur and Ali Ismail Awad}, title = {Deep transfer learning for intrusion detection in industrial control networks: {A} comprehensive review}, journal = {J. Netw. Comput. Appl.}, volume = {220}, pages = {103760}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2023.103760}, doi = {10.1016/J.JNCA.2023.103760}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KheddarHA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShamimABA23, author = {Nouman Shamim and Muhammad Asim and Thar Baker and Ali Ismail Awad}, title = {Efficient Approach for Anomaly Detection in IoT Using System Calls}, journal = {Sensors}, volume = {23}, number = {2}, pages = {652}, year = {2023}, url = {https://doi.org/10.3390/s23020652}, doi = {10.3390/S23020652}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ShamimABA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/AlaniA23, author = {Mohammed M. Alani and Ali Ismail Awad}, title = {An Intelligent Two-Layer Intrusion Detection System for the Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {1}, pages = {683--692}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3192035}, doi = {10.1109/TII.2022.3192035}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/AlaniA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-10550, author = {Hamza Kheddar and Yassine Himeur and Ali Ismail Awad}, title = {Deep Transfer Learning Applications in Intrusion Detection Systems: {A} Comprehensive Review}, journal = {CoRR}, volume = {abs/2304.10550}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.10550}, doi = {10.48550/ARXIV.2304.10550}, eprinttype = {arXiv}, eprint = {2304.10550}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-10550.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlaniA22, author = {Mohammed M. Alani and Ali Ismail Awad}, title = {{PAIRED:} An Explainable Lightweight Android Malware Detection System}, journal = {{IEEE} Access}, volume = {10}, pages = {73214--73228}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3189645}, doi = {10.1109/ACCESS.2022.3189645}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlaniA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlaniA22, author = {Mohammed M. Alani and Ali Ismail Awad}, title = {AdStop: Efficient flow-based mobile adware detection using machine learning}, journal = {Comput. Secur.}, volume = {117}, pages = {102718}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102718}, doi = {10.1016/J.COSE.2022.102718}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlaniA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ShokryAAK22, author = {Mostafa Shokry and Ali Ismail Awad and Mahmoud Khaled Abd{-}Ellah and Ashraf A. M. Khalaf}, title = {Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision}, journal = {Future Gener. Comput. Syst.}, volume = {136}, pages = {358--377}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.06.013}, doi = {10.1016/J.FUTURE.2022.06.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ShokryAAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/RoyAAEA22, author = {Sanjiban Sekhar Roy and Ali Ismail Awad and Lamesgen Adugnaw Amare and Mabrie Tesfaye Erkihun and Mohd Anas}, title = {Multimodel Phishing {URL} Detection Using LSTM, Bidirectional LSTM, and {GRU} Models}, journal = {Future Internet}, volume = {14}, number = {11}, pages = {340}, year = {2022}, url = {https://doi.org/10.3390/fi14110340}, doi = {10.3390/FI14110340}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/RoyAAEA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/SodhroABN22, author = {Ali Hassan Sodhro and Ali Ismail Awad and Jaap van de Beek and George Nikolakopoulos}, title = {Intelligent authentication of 5G healthcare devices: {A} survey}, journal = {Internet Things}, volume = {20}, pages = {100610}, year = {2022}, url = {https://doi.org/10.1016/j.iot.2022.100610}, doi = {10.1016/J.IOT.2022.100610}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/SodhroABN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/WangBZAWZ22, author = {Junyong Wang and Thar Baker and Yingnan Zhou and Ali Ismail Awad and Bin Wang and Yongsheng Zhu}, title = {Automatic mapping of configuration options in software using static analysis}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {10 Part {B}}, pages = {10044--10055}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2022.10.004}, doi = {10.1016/J.JKSUCI.2022.10.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/WangBZAWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FarooqATBA22, author = {Umer Farooq and Muhammad Asim and Noshina Tariq and Thar Baker and Ali Ismail Awad}, title = {Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting {RPL} Security}, journal = {Sensors}, volume = {22}, number = {12}, pages = {4539}, year = {2022}, url = {https://doi.org/10.3390/s22124539}, doi = {10.3390/S22124539}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FarooqATBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisi/ShokryAAK22, author = {Mostafa Shokry and Ali Ismail Awad and Mahmoud Khaled Abd{-}Ellah and Ashraf A. M. Khalaf}, editor = {Aboul Ella Hassanien and V{\'{a}}clav Sn{\'{a}}sel and Mincong Tang and Tien{-}Wen Sung and Kuo{-}Chi Chang}, title = {{CORAS} Model for Security Risk Assessment in Advanced Metering Infrastructure Systems}, booktitle = {Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, {AISI} 2022, Cairo, Egypt, 20-22 November, 2022}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {152}, pages = {449--459}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20601-6\_39}, doi = {10.1007/978-3-031-20601-6\_39}, timestamp = {Thu, 18 Apr 2024 08:28:52 +0200}, biburl = {https://dblp.org/rec/conf/aisi/ShokryAAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MamdouhAKH21, author = {Moustafa Mamdouh and Ali Ismail Awad and Ashraf A. M. Khalaf and Hesham F. A. Hamed}, title = {Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions}, journal = {Comput. Secur.}, volume = {111}, pages = {102491}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102491}, doi = {10.1016/J.COSE.2021.102491}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MamdouhAKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/BakerGAWF21, author = {Thar Baker and Zehua Guo and Ali Ismail Awad and Shangguang Wang and Benjamin C. M. Fung}, title = {Enabling Technologies for Energy Cloud}, journal = {J. Parallel Distributed Comput.}, volume = {152}, pages = {108--110}, year = {2021}, url = {https://doi.org/10.1016/j.jpdc.2021.02.020}, doi = {10.1016/J.JPDC.2021.02.020}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/BakerGAWF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/HassaballahHAM21, author = {M. Hassaballah and Mohamed Abdel Hameed and Ali Ismail Awad and Khan Muhammad}, title = {A Novel Image Steganography Method for Industrial Internet of Things Security}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {11}, pages = {7743--7751}, year = {2021}, url = {https://doi.org/10.1109/TII.2021.3053595}, doi = {10.1109/TII.2021.3053595}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/HassaballahHAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/ZaabarCAAA21, author = {Bessem Zaabar and Omar Cheikhrouhou and Meryem Ammi and Ali Ismail Awad and Mohamed Abid}, title = {Secure and Privacy-aware Blockchain-based Remote Patient Monitoring System for Internet of Healthcare Things}, booktitle = {17th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2021, Bologna, Italy, October 11-13, 2021}, pages = {200--205}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WiMob52687.2021.9606362}, doi = {10.1109/WIMOB52687.2021.9606362}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/ZaabarCAAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HodonFFA20, author = {Michal Hodon and Janusz Furtak and G{\"{u}}nter Fahrnberger and Ali Ismail Awad}, title = {Editorial on Innovative Network Systems and Applications together with the Conference on Information Systems Innovations for Community Services}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {13}, year = {2020}, url = {https://doi.org/10.1002/cpe.5698}, doi = {10.1002/CPE.5698}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/HodonFFA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MasmoudiMSAB20, author = {Fatma Masmoudi and Zakaria Maamar and Mohamed Sellami and Ali Ismail Awad and Vanilson Arruda Bur{\'{e}}gio}, title = {A Guiding Framework for Vetting the Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102644}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102644}, doi = {10.1016/J.JISA.2020.102644}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MasmoudiMSAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aicv2/MamdouhAHK20, author = {Moustafa Mamdouh and Ali Ismail Awad and Hesham F. A. Hamed and Ashraf A. M. Khalaf}, editor = {Aboul Ella Hassanien and Ahmad Taher Azar and Tarek Gaber and Diego Oliva and Mohamed Fahmy Tolba}, title = {Outlook on Security and Privacy in IoHT: Key Challenges and Future Vision}, booktitle = {Proceedings of the International Conference on Artificial Intelligence and Computer Vision, {AICV} 2020, Cairo, Egypt, 8-10 April, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1153}, pages = {721--730}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44289-7\_67}, doi = {10.1007/978-3-030-44289-7\_67}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aicv2/MamdouhAHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HameedHAA19, author = {Mohamed Abdel Hameed and M. Hassaballah and Saleh K. H. Aly and Ali Ismail Awad}, title = {An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and {PVD-LSB} Techniques}, journal = {{IEEE} Access}, volume = {7}, pages = {185189--185204}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2960254}, doi = {10.1109/ACCESS.2019.2960254}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HameedHAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AwadFHT19, author = {Ali Ismail Awad and Steven Furnell and Abbas M. Hassan and Theo Tryfonas}, title = {Special issue on security of IoT-enabled infrastructures in smart cities}, journal = {Ad Hoc Networks}, volume = {92}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2019.02.007}, doi = {10.1016/J.ADHOC.2019.02.007}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AwadFHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciar/Abd-EllahKAH19, author = {Mahmoud Khaled Abd{-}Ellah and Ashraf A. M. Khalaf and Ali Ismail Awad and Hesham F. A. Hamed}, editor = {Fakhri Karray and Aur{\'{e}}lio Campilho and Alfred C. H. Yu}, title = {TPUAR-Net: Two Parallel U-Net with Asymmetric Residual-Based Deep Convolutional Neural Network for Brain Tumor Segmentation}, booktitle = {Image Analysis and Recognition - 16th International Conference, {ICIAR} 2019, Waterloo, ON, Canada, August 27-29, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11663}, pages = {106--116}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27272-2\_9}, doi = {10.1007/978-3-030-27272-2\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciar/Abd-EllahKAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icm2/Abd-EllahAHK19, author = {Mahmoud Khaled Abd{-}Ellah and Ali Ismail Awad and Hesham F. A. Hamed and Ashraf A. M. Khalaf}, title = {Parallel Deep {CNN} Structure for Glioma Detection and Classification via Brain {MRI} Images}, booktitle = {31st International Conference on Microelectronics, {ICM} 2019, Cairo, Egypt, December 15-18, 2019}, pages = {304--307}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICM48031.2019.9021872}, doi = {10.1109/ICM48031.2019.9021872}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icm2/Abd-EllahAHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HassanA18, author = {Abbas M. Hassan and Ali Ismail Awad}, title = {Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges}, journal = {{IEEE} Access}, volume = {6}, pages = {36428--36440}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2838339}, doi = {10.1109/ACCESS.2018.2838339}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HassanA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejivp/Abd-EllahAKH18, author = {Mahmoud Khaled Abd{-}Ellah and Ali Ismail Awad and Ashraf A. M. Khalaf and Hesham F. A. Hamed}, title = {Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks}, journal = {{EURASIP} J. Image Video Process.}, volume = {2018}, pages = {97}, year = {2018}, url = {https://doi.org/10.1186/s13640-018-0332-4}, doi = {10.1186/S13640-018-0332-4}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejivp/Abd-EllahAKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MunodawafaA18, author = {Fortune Munodawafa and Ali Ismail Awad}, title = {Security risk assessment within hybrid data centers: {A} case study of delay sensitive applications}, journal = {J. Inf. Secur. Appl.}, volume = {43}, pages = {61--72}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.10.008}, doi = {10.1016/J.JISA.2018.10.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MunodawafaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/ElrawyAH18, author = {Mohammed Faisal Elrawy and Ali Ismail Awad and Hesham F. A. Hamed}, title = {Intrusion detection systems for IoT-based smart environments: a survey}, journal = {J. Cloud Comput.}, volume = {7}, pages = {21}, year = {2018}, url = {https://doi.org/10.1186/s13677-018-0123-6}, doi = {10.1186/S13677-018-0123-6}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/ElrawyAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AliA18, author = {Bako Ali and Ali Ismail Awad}, title = {Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes}, journal = {Sensors}, volume = {18}, number = {3}, pages = {817}, year = {2018}, url = {https://doi.org/10.3390/s18030817}, doi = {10.3390/S18030817}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AliA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/OkohMA17, author = {Ebenezer Okoh and Makame Hamza Makame and Ali Ismail Awad}, title = {Toward online education for fingerprint recognition: {A} proof-of-concept web platform}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {26}, number = {4}, pages = {186--197}, year = {2017}, url = {https://doi.org/10.1080/19393555.2017.1329462}, doi = {10.1080/19393555.2017.1329462}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/OkohMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cea/Awad16, author = {Ali Ismail Awad}, title = {From classical methods to animal biometrics: {A} review on cattle identification and tracking}, journal = {Comput. Electron. Agric.}, volume = {123}, pages = {423--435}, year = {2016}, url = {https://doi.org/10.1016/j.compag.2016.03.014}, doi = {10.1016/J.COMPAG.2016.03.014}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cea/Awad16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/KingA16, author = {James King and Ali Ismail Awad}, title = {A Distributed Security Mechanism for Resource-Constrained IoT Devices}, journal = {Informatica (Slovenia)}, volume = {40}, number = {1}, year = {2016}, url = {http://www.informatica.si/index.php/informatica/article/view/1046}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/KingA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icm2/Abd-EllahAKH16, author = {Mahmoud Khaled Abd{-}Ellah and Ali Ismail Awad and Ashraf A. M. Khalaf and Hesham F. A. Hamed}, title = {Design and implementation of a computer-aided diagnosis system for brain tumor classification}, booktitle = {28th International Conference on Microelectronics, {ICM} 2016, Giza, Egypt, December 17-20, 2016}, pages = {73--76}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICM.2016.7847911}, doi = {10.1109/ICM.2016.7847911}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icm2/Abd-EllahAKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/ElrawyAH16, author = {Mohammed Faisal Elrawy and Ali Ismail Awad and Hesham F. A. Hamed}, title = {Flow-based features for a robust intrusion detection system targeting mobile traffic}, booktitle = {23rd International Conference on Telecommunications, {ICT} 2016, Thessaloniki, Greece, May 16-18, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICT.2016.7500483}, doi = {10.1109/ICT.2016.7500483}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/ElrawyAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wis2/Abd-EllahAKH16, author = {Mahmoud Khaled Abd{-}Ellah and Ali Ismail Awad and Ashraf A. M. Khalaf and Hesham F. A. Hamed}, editor = {Hongxiu Li and Pirkko Nyk{\"{a}}nen and Reima Suomi and Nilmini Wickramasinghe and Gunilla Wid{\'{e}}n and Ming Zhan}, title = {Classification of Brain Tumor MRIs Using a Kernel Support Vector Machine}, booktitle = {Building Sustainable Health Ecosystems - 6th International Conference on Well-Being in the Information Society, {WIS} 2016, Tampere, Finland, September 16-18, 2016, Proceedings}, series = {Communications in Computer and Information Science}, volume = {636}, pages = {151--160}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44672-1\_13}, doi = {10.1007/978-3-319-44672-1\_13}, timestamp = {Sat, 30 Sep 2023 09:59:11 +0200}, biburl = {https://dblp.org/rec/conf/wis2/Abd-EllahAKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/IqbalTAP15, author = {Sarfraz Iqbal and Devinder Thapa and Ali Ismail Awad and Tero P{\"{a}}iv{\"{a}}rinta}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact}, booktitle = {48th Hawaii International Conference on System Sciences, {HICSS} 2015, Kauai, Hawaii, USA, January 5-8, 2015}, pages = {43--52}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HICSS.2015.16}, doi = {10.1109/HICSS.2015.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/IqbalTAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his2/OkohA15, author = {Ebenezer Okoh and Ali Ismail Awad}, editor = {Xiao{-}Xia Yin and Kendall Ho and Daniel Zeng and Uwe Aickelin and Rui Zhou and Hua Wang}, title = {Biometrics Applications in e-Health Security: {A} Preliminary Survey}, booktitle = {Health Information Science - 4th International Conference, {HIS} 2015, Melbourne, Australia, May 28-30, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9085}, pages = {92--103}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19156-0\_10}, doi = {10.1007/978-3-319-19156-0\_10}, timestamp = {Wed, 17 May 2023 08:47:11 +0200}, biburl = {https://dblp.org/rec/conf/his2/OkohA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideal/CharifA14, author = {Bilal Charif and Ali Ismail Awad}, editor = {Emilio Corchado and Jos{\'{e}} Antonio Lozano and H{\'{e}}ctor Quinti{\'{a}}n and Hujun Yin}, title = {Business and Government Organizations' Adoption of Cloud Computing}, booktitle = {Intelligent Data Engineering and Automated Learning - {IDEAL} 2014 - 15th International Conference, Salamanca, Spain, September 10-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8669}, pages = {492--501}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10840-7\_59}, doi = {10.1007/978-3-319-10840-7\_59}, timestamp = {Wed, 28 Jun 2023 16:19:42 +0200}, biburl = {https://dblp.org/rec/conf/ideal/CharifA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofa/Awad14, author = {Ali Ismail Awad}, editor = {Valentina Emilia Balas and Lakhmi C. Jain and Branko D. Kovacevic}, title = {Fast Fingerprint Orientation Field Estimation Incorporating General Purpose {GPU}}, booktitle = {Soft Computing Applications - Proceedings of the 6th International Workshop Soft Computing Applications, {SOFA} 2014, Volume 2, Timisoara, Romania, 24-26 July 2014}, series = {Advances in Intelligent Systems and Computing}, volume = {357}, pages = {891--902}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-18416-6\_70}, doi = {10.1007/978-3-319-18416-6\_70}, timestamp = {Sun, 25 Jun 2023 16:12:37 +0200}, biburl = {https://dblp.org/rec/conf/sofa/Awad14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/AwadH14, author = {Ali Ismail Awad and Aboul Ella Hassanien}, editor = {Azah Kamilah Muda and Yun{-}Huoy Choo and Ajith Abraham and Sargur N. Srihari}, title = {Erratum: Impact of Some Biometric Modalities on Forensic Science}, booktitle = {Computational Intelligence in Digital Forensics: Forensic Investigation and Applications}, series = {Studies in Computational Intelligence}, volume = {555}, pages = {1}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05885-6\_19}, doi = {10.1007/978-3-319-05885-6\_19}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/AwadH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/AwadH14a, author = {Ali Ismail Awad and Aboul Ella Hassanien}, editor = {Azah Kamilah Muda and Yun{-}Huoy Choo and Ajith Abraham and Sargur N. Srihari}, title = {Impact of Some Biometric Modalities on Forensic Science}, booktitle = {Computational Intelligence in Digital Forensics: Forensic Investigation and Applications}, series = {Studies in Computational Intelligence}, volume = {555}, pages = {47--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05885-6\_3}, doi = {10.1007/978-3-319-05885-6\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/AwadH14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isrl/70, editor = {Aboul Ella Hassanien and Tai{-}Hoon Kim and Janusz Kacprzyk and Ali Ismail Awad}, title = {Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations}, series = {Intelligent Systems Reference Library}, volume = {70}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43616-5}, doi = {10.1007/978-3-662-43616-5}, isbn = {978-3-662-43615-8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isrl/70.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/Awad13, author = {Ali Ismail Awad}, title = {Fingerprint Local Invariant Feature Extraction on {GPU} with {CUDA}}, journal = {Informatica (Slovenia)}, volume = {37}, number = {3}, pages = {279--284}, year = {2013}, url = {http://www.informatica.si/index.php/informatica/article/view/456}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/Awad13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/AwadZMNFH13, author = {Ali Ismail Awad and Hossam M. Zawbaa and Hamdi A. Mahmoud and Eman Hany Hassan Abdel Nabi and Rabie Hassan Fayed and Aboul Ella Hassanien}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {A Robust Cattle Identification Scheme Using Muzzle Print Images}, booktitle = {Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, Krak{\'{o}}w, Poland, September 8-11, 2013}, pages = {529--534}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6644052/}, timestamp = {Mon, 09 Aug 2021 14:54:05 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/AwadZMNFH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secnet/AwadHZ13, author = {Ali Ismail Awad and Aboul Ella Hassanien and Hossam M. Zawbaa}, editor = {Ali Ismail Awad and Aboul Ella Hassanien and Kensuke Baba}, title = {A Cattle Identification Approach Using Live Captured Muzzle Print Images}, booktitle = {Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings}, series = {Communications in Computer and Information Science}, volume = {381}, pages = {143--152}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40597-6\_12}, doi = {10.1007/978-3-642-40597-6\_12}, timestamp = {Wed, 19 May 2021 08:32:23 +0200}, biburl = {https://dblp.org/rec/conf/secnet/AwadHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secnet/2013, editor = {Ali Ismail Awad and Aboul Ella Hassanien and Kensuke Baba}, title = {Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings}, series = {Communications in Computer and Information Science}, volume = {381}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40597-6}, doi = {10.1007/978-3-642-40597-6}, isbn = {978-3-642-40596-9}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secnet/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amlta/FathyTHA12, author = {Ahmed Fathy and Ibrahim F. Tarrad and Hesham F. A. Hamed and Ali Ismail Awad}, editor = {Aboul Ella Hassanien and Abdel{-}Badeeh M. Salem and Rabie A. Ramadan and Tai{-}Hoon Kim}, title = {Advanced Encryption Standard Algorithm: Issues and Implementation Aspects}, booktitle = {Advanced Machine Learning Technologies and Applications - First International Conference, {AMLTA} 2012, Cairo, Egypt, December 8-10, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {322}, pages = {516--523}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35326-0\_51}, doi = {10.1007/978-3-642-35326-0\_51}, timestamp = {Tue, 29 Dec 2020 18:42:26 +0100}, biburl = {https://dblp.org/rec/conf/amlta/FathyTHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amlta/Awad12, author = {Ali Ismail Awad}, editor = {Aboul Ella Hassanien and Abdel{-}Badeeh M. Salem and Rabie A. Ramadan and Tai{-}Hoon Kim}, title = {Machine Learning Techniques for Fingerprint Identification: {A} Short Review}, booktitle = {Advanced Machine Learning Technologies and Applications - First International Conference, {AMLTA} 2012, Cairo, Egypt, December 8-10, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {322}, pages = {524--531}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35326-0\_52}, doi = {10.1007/978-3-642-35326-0\_52}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amlta/Awad12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/AwadB12, author = {Ali Ismail Awad and Kensuke Baba}, title = {Evaluation of a Fingerprint Identification Algorithm with {SIFT} Features}, booktitle = {{IIAI} International Conference on Advanced Applied Informatics, {IIAI-AAI} 2012, Fukuoka, Japan, September 20-22, 2012}, pages = {129--132}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IIAI-AAI.2012.34}, doi = {10.1109/IIAI-AAI.2012.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/AwadB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndt/EgawaAB12, author = {Serina Egawa and Ali Ismail Awad and Kensuke Baba}, editor = {Rachid Benlamri}, title = {Evaluation of Acceleration Algorithm for Biometric Identification}, booktitle = {Networked Digital Technologies - 4th International Conference, {NDT} 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {294}, pages = {231--242}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30567-2\_19}, doi = {10.1007/978-3-642-30567-2\_19}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndt/EgawaAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdipc/AwadB11, author = {Ali Ismail Awad and Kensuke Baba}, editor = {V{\'{a}}clav Sn{\'{a}}sel and Jan Platos and Eyas El{-}Qawasmeh}, title = {An Application for Singular Point Location in Fingerprint Classification}, booktitle = {Digital Information Processing and Communications - International Conference , {ICDIPC} 2011, Ostrava, Czech Republic, July 7-9, 2011, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {188}, pages = {262--276}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22389-1\_24}, doi = {10.1007/978-3-642-22389-1\_24}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdipc/AwadB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsecs/AwadB11, author = {Ali Ismail Awad and Kensuke Baba}, editor = {Jasni Mohamad Zain and Wan Maseri Binti Wan Mohd and Eyas El{-}Qawasmeh}, title = {Fingerprint Singularity Detection: {A} Comparative Study}, booktitle = {Software Engineering and Computer Systems - Second International Conference, {ICSECS} 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {179}, pages = {122--132}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22170-5\_11}, doi = {10.1007/978-3-642-22170-5\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsecs/AwadB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spit/AwadB11, author = {Ali Ismail Awad and Kensuke Baba}, editor = {Vinu V. Das and Ezendu Ariwa and Syarifah Bahiyah Rahayu}, title = {FingRF: {A} Generalized Fingerprints Research Framework}, booktitle = {Signal Processing and Information Technology - First International Joint Conference: International Conference on Advances in Signal Processing and Information Technology / International Conference on Recent Trends in Information Processing and Computing, {SPIT/IPC} 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {62}, pages = {1--6}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32573-1\_1}, doi = {10.1007/978-3-642-32573-1\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spit/AwadB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lanman/Rubio-LoyolaSA08, author = {Javier Rubio{-}Loyola and Dolors Sala and Ali Ismail Awad}, editor = {Stein Gjessing and Virgil Dobrota and Maria Papadopouli and Jacobus E. van der Merwe}, title = {Maximizing packet loss monitoring accuracy for reliable trace collections}, booktitle = {16th {IEEE} Workshop on Local and Metropolitan Area Networks, {LANMAN} 2008, Chij-Napoca, Transylvania, Romania, September 3-6, 2008}, pages = {61--66}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/LANMAN.2008.4675845}, doi = {10.1109/LANMAN.2008.4675845}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/lanman/Rubio-LoyolaSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/Rubio-LoyolaSA08, author = {Javier Rubio{-}Loyola and Dolors Sala and Ali Ismail Awad}, title = {Accurate real-time monitoring of bottlenecks and performance of packet trace collection}, booktitle = {{LCN} 2008, The 33rd {IEEE} Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings}, pages = {884--891}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/LCN.2008.4664298}, doi = {10.1109/LCN.2008.4664298}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/Rubio-LoyolaSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.