BibTeX records: Ali Ismail Awad

download as .bib file

@article{DBLP:journals/csur/KebandeA24,
  author       = {Victor R. Kebande and
                  Ali Ismail Awad},
  title        = {Industrial Internet of Things Ecosystems Security and Digital Forensics:
                  Achievements, Open Challenges, and Future Directions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {56},
  number       = {5},
  pages        = {131:1--131:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3635030},
  doi          = {10.1145/3635030},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KebandeA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/TedeschiNAN24,
  author       = {Pietro Tedeschi and
                  Fatima Ali Al Nuaimi and
                  Ali Ismail Awad and
                  Enrico Natalizio},
  title        = {Privacy-Aware Remote Identification for Unmanned Aerial Vehicles:
                  Current Solutions, Potential Threats, and Future Directions},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {2},
  pages        = {1069--1080},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3280325},
  doi          = {10.1109/TII.2023.3280325},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/TedeschiNAN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/AwadSKA23,
  author       = {Ali Ismail Awad and
                  Mostafa Shokry and
                  Ashraf A. M. Khalaf and
                  Mahmoud Khaled Abd{-}Ellah},
  title        = {Assessment of potential security risks in advanced metering infrastructure
                  using the {OCTAVE} Allegro approach},
  journal      = {Comput. Electr. Eng.},
  volume       = {108},
  pages        = {108667},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108667},
  doi          = {10.1016/J.COMPELECENG.2023.108667},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/AwadSKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/AlaniAB23,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad and
                  Ezedin Barka},
  title        = {{ARP-PROBE:} An {ARP} spoofing detector for Internet of Things networks
                  using explainable deep learning},
  journal      = {Internet Things},
  volume       = {23},
  pages        = {100861},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100861},
  doi          = {10.1016/J.IOT.2023.100861},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/AlaniAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KheddarHA23,
  author       = {Hamza Kheddar and
                  Yassine Himeur and
                  Ali Ismail Awad},
  title        = {Deep transfer learning for intrusion detection in industrial control
                  networks: {A} comprehensive review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {220},
  pages        = {103760},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2023.103760},
  doi          = {10.1016/J.JNCA.2023.103760},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KheddarHA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShamimABA23,
  author       = {Nouman Shamim and
                  Muhammad Asim and
                  Thar Baker and
                  Ali Ismail Awad},
  title        = {Efficient Approach for Anomaly Detection in IoT Using System Calls},
  journal      = {Sensors},
  volume       = {23},
  number       = {2},
  pages        = {652},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23020652},
  doi          = {10.3390/S23020652},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ShamimABA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/AlaniA23,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad},
  title        = {An Intelligent Two-Layer Intrusion Detection System for the Internet
                  of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {1},
  pages        = {683--692},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3192035},
  doi          = {10.1109/TII.2022.3192035},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/AlaniA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-10550,
  author       = {Hamza Kheddar and
                  Yassine Himeur and
                  Ali Ismail Awad},
  title        = {Deep Transfer Learning Applications in Intrusion Detection Systems:
                  {A} Comprehensive Review},
  journal      = {CoRR},
  volume       = {abs/2304.10550},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.10550},
  doi          = {10.48550/ARXIV.2304.10550},
  eprinttype    = {arXiv},
  eprint       = {2304.10550},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-10550.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlaniA22,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad},
  title        = {{PAIRED:} An Explainable Lightweight Android Malware Detection System},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {73214--73228},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3189645},
  doi          = {10.1109/ACCESS.2022.3189645},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlaniA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlaniA22,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad},
  title        = {AdStop: Efficient flow-based mobile adware detection using machine
                  learning},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102718},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102718},
  doi          = {10.1016/J.COSE.2022.102718},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlaniA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ShokryAAK22,
  author       = {Mostafa Shokry and
                  Ali Ismail Awad and
                  Mahmoud Khaled Abd{-}Ellah and
                  Ashraf A. M. Khalaf},
  title        = {Systematic survey of advanced metering infrastructure security: Vulnerabilities,
                  attacks, countermeasures, and future vision},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {136},
  pages        = {358--377},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.06.013},
  doi          = {10.1016/J.FUTURE.2022.06.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ShokryAAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/RoyAAEA22,
  author       = {Sanjiban Sekhar Roy and
                  Ali Ismail Awad and
                  Lamesgen Adugnaw Amare and
                  Mabrie Tesfaye Erkihun and
                  Mohd Anas},
  title        = {Multimodel Phishing {URL} Detection Using LSTM, Bidirectional LSTM,
                  and {GRU} Models},
  journal      = {Future Internet},
  volume       = {14},
  number       = {11},
  pages        = {340},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14110340},
  doi          = {10.3390/FI14110340},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/RoyAAEA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/SodhroABN22,
  author       = {Ali Hassan Sodhro and
                  Ali Ismail Awad and
                  Jaap van de Beek and
                  George Nikolakopoulos},
  title        = {Intelligent authentication of 5G healthcare devices: {A} survey},
  journal      = {Internet Things},
  volume       = {20},
  pages        = {100610},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.iot.2022.100610},
  doi          = {10.1016/J.IOT.2022.100610},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/SodhroABN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/WangBZAWZ22,
  author       = {Junyong Wang and
                  Thar Baker and
                  Yingnan Zhou and
                  Ali Ismail Awad and
                  Bin Wang and
                  Yongsheng Zhu},
  title        = {Automatic mapping of configuration options in software using static
                  analysis},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {10 Part {B}},
  pages        = {10044--10055},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2022.10.004},
  doi          = {10.1016/J.JKSUCI.2022.10.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/WangBZAWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FarooqATBA22,
  author       = {Umer Farooq and
                  Muhammad Asim and
                  Noshina Tariq and
                  Thar Baker and
                  Ali Ismail Awad},
  title        = {Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks
                  and Augmenting {RPL} Security},
  journal      = {Sensors},
  volume       = {22},
  number       = {12},
  pages        = {4539},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22124539},
  doi          = {10.3390/S22124539},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FarooqATBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisi/ShokryAAK22,
  author       = {Mostafa Shokry and
                  Ali Ismail Awad and
                  Mahmoud Khaled Abd{-}Ellah and
                  Ashraf A. M. Khalaf},
  editor       = {Aboul Ella Hassanien and
                  V{\'{a}}clav Sn{\'{a}}sel and
                  Mincong Tang and
                  Tien{-}Wen Sung and
                  Kuo{-}Chi Chang},
  title        = {{CORAS} Model for Security Risk Assessment in Advanced Metering Infrastructure
                  Systems},
  booktitle    = {Proceedings of the 8th International Conference on Advanced Intelligent
                  Systems and Informatics, {AISI} 2022, Cairo, Egypt, 20-22 November,
                  2022},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {152},
  pages        = {449--459},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20601-6\_39},
  doi          = {10.1007/978-3-031-20601-6\_39},
  timestamp    = {Thu, 18 Apr 2024 08:28:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aisi/ShokryAAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MamdouhAKH21,
  author       = {Moustafa Mamdouh and
                  Ali Ismail Awad and
                  Ashraf A. M. Khalaf and
                  Hesham F. A. Hamed},
  title        = {Authentication and Identity Management of IoHT Devices: Achievements,
                  Challenges, and Future Directions},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102491},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102491},
  doi          = {10.1016/J.COSE.2021.102491},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MamdouhAKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/BakerGAWF21,
  author       = {Thar Baker and
                  Zehua Guo and
                  Ali Ismail Awad and
                  Shangguang Wang and
                  Benjamin C. M. Fung},
  title        = {Enabling Technologies for Energy Cloud},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {152},
  pages        = {108--110},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jpdc.2021.02.020},
  doi          = {10.1016/J.JPDC.2021.02.020},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/BakerGAWF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HassaballahHAM21,
  author       = {M. Hassaballah and
                  Mohamed Abdel Hameed and
                  Ali Ismail Awad and
                  Khan Muhammad},
  title        = {A Novel Image Steganography Method for Industrial Internet of Things
                  Security},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {11},
  pages        = {7743--7751},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2021.3053595},
  doi          = {10.1109/TII.2021.3053595},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/HassaballahHAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/ZaabarCAAA21,
  author       = {Bessem Zaabar and
                  Omar Cheikhrouhou and
                  Meryem Ammi and
                  Ali Ismail Awad and
                  Mohamed Abid},
  title        = {Secure and Privacy-aware Blockchain-based Remote Patient Monitoring
                  System for Internet of Healthcare Things},
  booktitle    = {17th International Conference on Wireless and Mobile Computing, Networking
                  and Communications, WiMob 2021, Bologna, Italy, October 11-13, 2021},
  pages        = {200--205},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WiMob52687.2021.9606362},
  doi          = {10.1109/WIMOB52687.2021.9606362},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/ZaabarCAAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HodonFFA20,
  author       = {Michal Hodon and
                  Janusz Furtak and
                  G{\"{u}}nter Fahrnberger and
                  Ali Ismail Awad},
  title        = {Editorial on Innovative Network Systems and Applications together
                  with the Conference on Information Systems Innovations for Community
                  Services},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {13},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5698},
  doi          = {10.1002/CPE.5698},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/HodonFFA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MasmoudiMSAB20,
  author       = {Fatma Masmoudi and
                  Zakaria Maamar and
                  Mohamed Sellami and
                  Ali Ismail Awad and
                  Vanilson Arruda Bur{\'{e}}gio},
  title        = {A Guiding Framework for Vetting the Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102644},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102644},
  doi          = {10.1016/J.JISA.2020.102644},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MasmoudiMSAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aicv2/MamdouhAHK20,
  author       = {Moustafa Mamdouh and
                  Ali Ismail Awad and
                  Hesham F. A. Hamed and
                  Ashraf A. M. Khalaf},
  editor       = {Aboul Ella Hassanien and
                  Ahmad Taher Azar and
                  Tarek Gaber and
                  Diego Oliva and
                  Mohamed Fahmy Tolba},
  title        = {Outlook on Security and Privacy in IoHT: Key Challenges and Future
                  Vision},
  booktitle    = {Proceedings of the International Conference on Artificial Intelligence
                  and Computer Vision, {AICV} 2020, Cairo, Egypt, 8-10 April, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1153},
  pages        = {721--730},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44289-7\_67},
  doi          = {10.1007/978-3-030-44289-7\_67},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aicv2/MamdouhAHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HameedHAA19,
  author       = {Mohamed Abdel Hameed and
                  M. Hassaballah and
                  Saleh K. H. Aly and
                  Ali Ismail Awad},
  title        = {An Adaptive Image Steganography Method Based on Histogram of Oriented
                  Gradient and {PVD-LSB} Techniques},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {185189--185204},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2960254},
  doi          = {10.1109/ACCESS.2019.2960254},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HameedHAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AwadFHT19,
  author       = {Ali Ismail Awad and
                  Steven Furnell and
                  Abbas M. Hassan and
                  Theo Tryfonas},
  title        = {Special issue on security of IoT-enabled infrastructures in smart
                  cities},
  journal      = {Ad Hoc Networks},
  volume       = {92},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.adhoc.2019.02.007},
  doi          = {10.1016/J.ADHOC.2019.02.007},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AwadFHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciar/Abd-EllahKAH19,
  author       = {Mahmoud Khaled Abd{-}Ellah and
                  Ashraf A. M. Khalaf and
                  Ali Ismail Awad and
                  Hesham F. A. Hamed},
  editor       = {Fakhri Karray and
                  Aur{\'{e}}lio Campilho and
                  Alfred C. H. Yu},
  title        = {TPUAR-Net: Two Parallel U-Net with Asymmetric Residual-Based Deep
                  Convolutional Neural Network for Brain Tumor Segmentation},
  booktitle    = {Image Analysis and Recognition - 16th International Conference, {ICIAR}
                  2019, Waterloo, ON, Canada, August 27-29, 2019, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11663},
  pages        = {106--116},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27272-2\_9},
  doi          = {10.1007/978-3-030-27272-2\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciar/Abd-EllahKAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icm2/Abd-EllahAHK19,
  author       = {Mahmoud Khaled Abd{-}Ellah and
                  Ali Ismail Awad and
                  Hesham F. A. Hamed and
                  Ashraf A. M. Khalaf},
  title        = {Parallel Deep {CNN} Structure for Glioma Detection and Classification
                  via Brain {MRI} Images},
  booktitle    = {31st International Conference on Microelectronics, {ICM} 2019, Cairo,
                  Egypt, December 15-18, 2019},
  pages        = {304--307},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICM48031.2019.9021872},
  doi          = {10.1109/ICM48031.2019.9021872},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icm2/Abd-EllahAHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HassanA18,
  author       = {Abbas M. Hassan and
                  Ali Ismail Awad},
  title        = {Urban Transition in the Era of the Internet of Things: Social Implications
                  and Privacy Challenges},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {36428--36440},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2838339},
  doi          = {10.1109/ACCESS.2018.2838339},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HassanA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejivp/Abd-EllahAKH18,
  author       = {Mahmoud Khaled Abd{-}Ellah and
                  Ali Ismail Awad and
                  Ashraf A. M. Khalaf and
                  Hesham F. A. Hamed},
  title        = {Two-phase multi-model automatic brain tumour diagnosis system from
                  magnetic resonance images using convolutional neural networks},
  journal      = {{EURASIP} J. Image Video Process.},
  volume       = {2018},
  pages        = {97},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13640-018-0332-4},
  doi          = {10.1186/S13640-018-0332-4},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejivp/Abd-EllahAKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MunodawafaA18,
  author       = {Fortune Munodawafa and
                  Ali Ismail Awad},
  title        = {Security risk assessment within hybrid data centers: {A} case study
                  of delay sensitive applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {43},
  pages        = {61--72},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.10.008},
  doi          = {10.1016/J.JISA.2018.10.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MunodawafaA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/ElrawyAH18,
  author       = {Mohammed Faisal Elrawy and
                  Ali Ismail Awad and
                  Hesham F. A. Hamed},
  title        = {Intrusion detection systems for IoT-based smart environments: a survey},
  journal      = {J. Cloud Comput.},
  volume       = {7},
  pages        = {21},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13677-018-0123-6},
  doi          = {10.1186/S13677-018-0123-6},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/ElrawyAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AliA18,
  author       = {Bako Ali and
                  Ali Ismail Awad},
  title        = {Cyber and Physical Security Vulnerability Assessment for IoT-Based
                  Smart Homes},
  journal      = {Sensors},
  volume       = {18},
  number       = {3},
  pages        = {817},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18030817},
  doi          = {10.3390/S18030817},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AliA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/OkohMA17,
  author       = {Ebenezer Okoh and
                  Makame Hamza Makame and
                  Ali Ismail Awad},
  title        = {Toward online education for fingerprint recognition: {A} proof-of-concept
                  web platform},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {26},
  number       = {4},
  pages        = {186--197},
  year         = {2017},
  url          = {https://doi.org/10.1080/19393555.2017.1329462},
  doi          = {10.1080/19393555.2017.1329462},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/OkohMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cea/Awad16,
  author       = {Ali Ismail Awad},
  title        = {From classical methods to animal biometrics: {A} review on cattle
                  identification and tracking},
  journal      = {Comput. Electron. Agric.},
  volume       = {123},
  pages        = {423--435},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.compag.2016.03.014},
  doi          = {10.1016/J.COMPAG.2016.03.014},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cea/Awad16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/KingA16,
  author       = {James King and
                  Ali Ismail Awad},
  title        = {A Distributed Security Mechanism for Resource-Constrained IoT Devices},
  journal      = {Informatica (Slovenia)},
  volume       = {40},
  number       = {1},
  year         = {2016},
  url          = {http://www.informatica.si/index.php/informatica/article/view/1046},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/KingA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icm2/Abd-EllahAKH16,
  author       = {Mahmoud Khaled Abd{-}Ellah and
                  Ali Ismail Awad and
                  Ashraf A. M. Khalaf and
                  Hesham F. A. Hamed},
  title        = {Design and implementation of a computer-aided diagnosis system for
                  brain tumor classification},
  booktitle    = {28th International Conference on Microelectronics, {ICM} 2016, Giza,
                  Egypt, December 17-20, 2016},
  pages        = {73--76},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICM.2016.7847911},
  doi          = {10.1109/ICM.2016.7847911},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icm2/Abd-EllahAKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/ElrawyAH16,
  author       = {Mohammed Faisal Elrawy and
                  Ali Ismail Awad and
                  Hesham F. A. Hamed},
  title        = {Flow-based features for a robust intrusion detection system targeting
                  mobile traffic},
  booktitle    = {23rd International Conference on Telecommunications, {ICT} 2016, Thessaloniki,
                  Greece, May 16-18, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICT.2016.7500483},
  doi          = {10.1109/ICT.2016.7500483},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/ElrawyAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wis2/Abd-EllahAKH16,
  author       = {Mahmoud Khaled Abd{-}Ellah and
                  Ali Ismail Awad and
                  Ashraf A. M. Khalaf and
                  Hesham F. A. Hamed},
  editor       = {Hongxiu Li and
                  Pirkko Nyk{\"{a}}nen and
                  Reima Suomi and
                  Nilmini Wickramasinghe and
                  Gunilla Wid{\'{e}}n and
                  Ming Zhan},
  title        = {Classification of Brain Tumor MRIs Using a Kernel Support Vector Machine},
  booktitle    = {Building Sustainable Health Ecosystems - 6th International Conference
                  on Well-Being in the Information Society, {WIS} 2016, Tampere, Finland,
                  September 16-18, 2016, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {636},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44672-1\_13},
  doi          = {10.1007/978-3-319-44672-1\_13},
  timestamp    = {Sat, 30 Sep 2023 09:59:11 +0200},
  biburl       = {https://dblp.org/rec/conf/wis2/Abd-EllahAKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/IqbalTAP15,
  author       = {Sarfraz Iqbal and
                  Devinder Thapa and
                  Ali Ismail Awad and
                  Tero P{\"{a}}iv{\"{a}}rinta},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Conceptual Model of Online Pedagogical Information Security Laboratory:
                  Toward an Ensemble Artifact},
  booktitle    = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
                  Kauai, Hawaii, USA, January 5-8, 2015},
  pages        = {43--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HICSS.2015.16},
  doi          = {10.1109/HICSS.2015.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/IqbalTAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his2/OkohA15,
  author       = {Ebenezer Okoh and
                  Ali Ismail Awad},
  editor       = {Xiao{-}Xia Yin and
                  Kendall Ho and
                  Daniel Zeng and
                  Uwe Aickelin and
                  Rui Zhou and
                  Hua Wang},
  title        = {Biometrics Applications in e-Health Security: {A} Preliminary Survey},
  booktitle    = {Health Information Science - 4th International Conference, {HIS} 2015,
                  Melbourne, Australia, May 28-30, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9085},
  pages        = {92--103},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19156-0\_10},
  doi          = {10.1007/978-3-319-19156-0\_10},
  timestamp    = {Wed, 17 May 2023 08:47:11 +0200},
  biburl       = {https://dblp.org/rec/conf/his2/OkohA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideal/CharifA14,
  author       = {Bilal Charif and
                  Ali Ismail Awad},
  editor       = {Emilio Corchado and
                  Jos{\'{e}} Antonio Lozano and
                  H{\'{e}}ctor Quinti{\'{a}}n and
                  Hujun Yin},
  title        = {Business and Government Organizations' Adoption of Cloud Computing},
  booktitle    = {Intelligent Data Engineering and Automated Learning - {IDEAL} 2014
                  - 15th International Conference, Salamanca, Spain, September 10-12,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8669},
  pages        = {492--501},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10840-7\_59},
  doi          = {10.1007/978-3-319-10840-7\_59},
  timestamp    = {Wed, 28 Jun 2023 16:19:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ideal/CharifA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofa/Awad14,
  author       = {Ali Ismail Awad},
  editor       = {Valentina Emilia Balas and
                  Lakhmi C. Jain and
                  Branko D. Kovacevic},
  title        = {Fast Fingerprint Orientation Field Estimation Incorporating General
                  Purpose {GPU}},
  booktitle    = {Soft Computing Applications - Proceedings of the 6th International
                  Workshop Soft Computing Applications, {SOFA} 2014, Volume 2, Timisoara,
                  Romania, 24-26 July 2014},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {357},
  pages        = {891--902},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-18416-6\_70},
  doi          = {10.1007/978-3-319-18416-6\_70},
  timestamp    = {Sun, 25 Jun 2023 16:12:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sofa/Awad14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/AwadH14,
  author       = {Ali Ismail Awad and
                  Aboul Ella Hassanien},
  editor       = {Azah Kamilah Muda and
                  Yun{-}Huoy Choo and
                  Ajith Abraham and
                  Sargur N. Srihari},
  title        = {Erratum: Impact of Some Biometric Modalities on Forensic Science},
  booktitle    = {Computational Intelligence in Digital Forensics: Forensic Investigation
                  and Applications},
  series       = {Studies in Computational Intelligence},
  volume       = {555},
  pages        = {1},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05885-6\_19},
  doi          = {10.1007/978-3-319-05885-6\_19},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/AwadH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/AwadH14a,
  author       = {Ali Ismail Awad and
                  Aboul Ella Hassanien},
  editor       = {Azah Kamilah Muda and
                  Yun{-}Huoy Choo and
                  Ajith Abraham and
                  Sargur N. Srihari},
  title        = {Impact of Some Biometric Modalities on Forensic Science},
  booktitle    = {Computational Intelligence in Digital Forensics: Forensic Investigation
                  and Applications},
  series       = {Studies in Computational Intelligence},
  volume       = {555},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05885-6\_3},
  doi          = {10.1007/978-3-319-05885-6\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/AwadH14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isrl/70,
  editor       = {Aboul Ella Hassanien and
                  Tai{-}Hoon Kim and
                  Janusz Kacprzyk and
                  Ali Ismail Awad},
  title        = {Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations},
  series       = {Intelligent Systems Reference Library},
  volume       = {70},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43616-5},
  doi          = {10.1007/978-3-662-43616-5},
  isbn         = {978-3-662-43615-8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isrl/70.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/Awad13,
  author       = {Ali Ismail Awad},
  title        = {Fingerprint Local Invariant Feature Extraction on {GPU} with {CUDA}},
  journal      = {Informatica (Slovenia)},
  volume       = {37},
  number       = {3},
  pages        = {279--284},
  year         = {2013},
  url          = {http://www.informatica.si/index.php/informatica/article/view/456},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/Awad13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/AwadZMNFH13,
  author       = {Ali Ismail Awad and
                  Hossam M. Zawbaa and
                  Hamdi A. Mahmoud and
                  Eman Hany Hassan Abdel Nabi and
                  Rabie Hassan Fayed and
                  Aboul Ella Hassanien},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {A Robust Cattle Identification Scheme Using Muzzle Print Images},
  booktitle    = {Proceedings of the 2013 Federated Conference on Computer Science and
                  Information Systems, Krak{\'{o}}w, Poland, September 8-11, 2013},
  pages        = {529--534},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6644052/},
  timestamp    = {Mon, 09 Aug 2021 14:54:05 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/AwadZMNFH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secnet/AwadHZ13,
  author       = {Ali Ismail Awad and
                  Aboul Ella Hassanien and
                  Hossam M. Zawbaa},
  editor       = {Ali Ismail Awad and
                  Aboul Ella Hassanien and
                  Kensuke Baba},
  title        = {A Cattle Identification Approach Using Live Captured Muzzle Print
                  Images},
  booktitle    = {Advances in Security of Information and Communication Networks - First
                  International Conference, SecNet 2013, Cairo, Egypt, September 3-5,
                  2013. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {381},
  pages        = {143--152},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40597-6\_12},
  doi          = {10.1007/978-3-642-40597-6\_12},
  timestamp    = {Wed, 19 May 2021 08:32:23 +0200},
  biburl       = {https://dblp.org/rec/conf/secnet/AwadHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secnet/2013,
  editor       = {Ali Ismail Awad and
                  Aboul Ella Hassanien and
                  Kensuke Baba},
  title        = {Advances in Security of Information and Communication Networks - First
                  International Conference, SecNet 2013, Cairo, Egypt, September 3-5,
                  2013. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {381},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40597-6},
  doi          = {10.1007/978-3-642-40597-6},
  isbn         = {978-3-642-40596-9},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secnet/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amlta/FathyTHA12,
  author       = {Ahmed Fathy and
                  Ibrahim F. Tarrad and
                  Hesham F. A. Hamed and
                  Ali Ismail Awad},
  editor       = {Aboul Ella Hassanien and
                  Abdel{-}Badeeh M. Salem and
                  Rabie A. Ramadan and
                  Tai{-}Hoon Kim},
  title        = {Advanced Encryption Standard Algorithm: Issues and Implementation
                  Aspects},
  booktitle    = {Advanced Machine Learning Technologies and Applications - First International
                  Conference, {AMLTA} 2012, Cairo, Egypt, December 8-10, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {322},
  pages        = {516--523},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35326-0\_51},
  doi          = {10.1007/978-3-642-35326-0\_51},
  timestamp    = {Tue, 29 Dec 2020 18:42:26 +0100},
  biburl       = {https://dblp.org/rec/conf/amlta/FathyTHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amlta/Awad12,
  author       = {Ali Ismail Awad},
  editor       = {Aboul Ella Hassanien and
                  Abdel{-}Badeeh M. Salem and
                  Rabie A. Ramadan and
                  Tai{-}Hoon Kim},
  title        = {Machine Learning Techniques for Fingerprint Identification: {A} Short
                  Review},
  booktitle    = {Advanced Machine Learning Technologies and Applications - First International
                  Conference, {AMLTA} 2012, Cairo, Egypt, December 8-10, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {322},
  pages        = {524--531},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35326-0\_52},
  doi          = {10.1007/978-3-642-35326-0\_52},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amlta/Awad12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/AwadB12,
  author       = {Ali Ismail Awad and
                  Kensuke Baba},
  title        = {Evaluation of a Fingerprint Identification Algorithm with {SIFT} Features},
  booktitle    = {{IIAI} International Conference on Advanced Applied Informatics, {IIAI-AAI}
                  2012, Fukuoka, Japan, September 20-22, 2012},
  pages        = {129--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IIAI-AAI.2012.34},
  doi          = {10.1109/IIAI-AAI.2012.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/AwadB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndt/EgawaAB12,
  author       = {Serina Egawa and
                  Ali Ismail Awad and
                  Kensuke Baba},
  editor       = {Rachid Benlamri},
  title        = {Evaluation of Acceleration Algorithm for Biometric Identification},
  booktitle    = {Networked Digital Technologies - 4th International Conference, {NDT}
                  2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {294},
  pages        = {231--242},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30567-2\_19},
  doi          = {10.1007/978-3-642-30567-2\_19},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndt/EgawaAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdipc/AwadB11,
  author       = {Ali Ismail Awad and
                  Kensuke Baba},
  editor       = {V{\'{a}}clav Sn{\'{a}}sel and
                  Jan Platos and
                  Eyas El{-}Qawasmeh},
  title        = {An Application for Singular Point Location in Fingerprint Classification},
  booktitle    = {Digital Information Processing and Communications - International
                  Conference , {ICDIPC} 2011, Ostrava, Czech Republic, July 7-9, 2011,
                  Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {188},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22389-1\_24},
  doi          = {10.1007/978-3-642-22389-1\_24},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdipc/AwadB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsecs/AwadB11,
  author       = {Ali Ismail Awad and
                  Kensuke Baba},
  editor       = {Jasni Mohamad Zain and
                  Wan Maseri Binti Wan Mohd and
                  Eyas El{-}Qawasmeh},
  title        = {Fingerprint Singularity Detection: {A} Comparative Study},
  booktitle    = {Software Engineering and Computer Systems - Second International Conference,
                  {ICSECS} 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings,
                  Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {179},
  pages        = {122--132},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22170-5\_11},
  doi          = {10.1007/978-3-642-22170-5\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsecs/AwadB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spit/AwadB11,
  author       = {Ali Ismail Awad and
                  Kensuke Baba},
  editor       = {Vinu V. Das and
                  Ezendu Ariwa and
                  Syarifah Bahiyah Rahayu},
  title        = {FingRF: {A} Generalized Fingerprints Research Framework},
  booktitle    = {Signal Processing and Information Technology - First International
                  Joint Conference: International Conference on Advances in Signal Processing
                  and Information Technology / International Conference on Recent Trends
                  in Information Processing and Computing, {SPIT/IPC} 2011, Amsterdam,
                  The Netherlands, December 1-2, 2011, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {62},
  pages        = {1--6},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32573-1\_1},
  doi          = {10.1007/978-3-642-32573-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spit/AwadB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lanman/Rubio-LoyolaSA08,
  author       = {Javier Rubio{-}Loyola and
                  Dolors Sala and
                  Ali Ismail Awad},
  editor       = {Stein Gjessing and
                  Virgil Dobrota and
                  Maria Papadopouli and
                  Jacobus E. van der Merwe},
  title        = {Maximizing packet loss monitoring accuracy for reliable trace collections},
  booktitle    = {16th {IEEE} Workshop on Local and Metropolitan Area Networks, {LANMAN}
                  2008, Chij-Napoca, Transylvania, Romania, September 3-6, 2008},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/LANMAN.2008.4675845},
  doi          = {10.1109/LANMAN.2008.4675845},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lanman/Rubio-LoyolaSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/Rubio-LoyolaSA08,
  author       = {Javier Rubio{-}Loyola and
                  Dolors Sala and
                  Ali Ismail Awad},
  title        = {Accurate real-time monitoring of bottlenecks and performance of packet
                  trace collection},
  booktitle    = {{LCN} 2008, The 33rd {IEEE} Conference on Local Computer Networks,
                  The Conference on Leading Edge and Practical Computer Networking,
                  Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008,
                  Proceedings},
  pages        = {884--891},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/LCN.2008.4664298},
  doi          = {10.1109/LCN.2008.4664298},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/Rubio-LoyolaSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics