default search action
Abdelkader Ouda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Priya Bansal, Abdelkader Ouda:
Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics. Comput. 13(4): 103 (2024) - [j6]Aisha Edrah, Abdelkader Ouda:
Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System. Comput. 13(7): 159 (2024) - [j5]Sarah Azzabi, Zakiya Alfughi, Abdelkader Ouda:
Data Lakes: A Survey of Concepts and Architectures. Comput. 13(7): 183 (2024) - [j4]Yazan Aref, Abdelkader Ouda:
HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security. Future Internet 16(5): 148 (2024) - [j3]Jiayi Zhang, Abdelkader Ouda, Raafat Aburukba:
Authentication and Key Agreement Protocol in Hybrid Edge-Fog-Cloud Computing Enhanced by 5G Networks. Future Internet 16(6): 209 (2024) - [j2]Iman I. M. Abu Sulayman, Peter Voege, Abdelkader Ouda:
Algorithm-Based Data Generation (ADG) Engine for Dual-Mode User Behavioral Data Analytics. Inf. 15(3): 146 (2024) - 2023
- [c17]Sanket Vilas Salunke, Abdelkader Ouda:
Ensemble Learning to Enhance Continuous User Authentication For Real World Environments. BlackSeaCom 2023: 102-108 - [c16]Yazan Aref, Abdelkader Ouda:
Autonomous Vehicle Cyber-Attacks Classification Framework. COMSNETS 2023: 373-377 - [c15]Yazan Aref, Abdelkader Ouda:
Still Computers Networking is Less Secure Than It should be, Causes and Solution. ISNCC 2023: 1-8 - 2022
- [c14]Sergio A. Salinas, Mohamed Ahmed T. A. Elgalhud, Luke Tambakis, Sanket Vilas Salunke, Kshitija Patel, Hamada H. Ghenniwa, Abdelkader Ouda, Kenneth A. McIsaac, Katarina Grolinger, Ana Luisa Trejos:
Comparison of Machine Learning Techniques for Activities of Daily Living Classification with Electromyographic Data. ICORR 2022: 1-6 - [c13]Wafaa Anani, Abdelkader Ouda:
Wireless Meter Bus: Secure Remote Metering within the IoT Smart Grid. ISNCC 2022: 1-6 - [c12]Priya Bansal, Abdelkader Ouda:
Study on Integration of FastAPI and Machine Learning for Continuous Authentication of Behavioral Biometrics. ISNCC 2022: 1-6 - [c11]Sanket Vilas Salunke, Abdelkader Ouda, Jonathan Gagne:
Transfer Learning for Behavioral Biometrics-based Continuous User Authentication. ISNCC 2022: 1-6 - [c10]Iman I. M. Abu Sulayman, Abdelkader Ouda:
Real-Time Data Generation and Anomaly Detection for Security User Profiles. ISNCC 2022: 1-6 - [c9]Peter Voege, Abdelkader Ouda:
An Innovative Multi-Factor Authentication Approach. ISNCC 2022: 1-6 - 2021
- [c8]Iman I. M. Abu Sulayman, Rongji He, Marlin Manka, Andrew Ning, Abdelkader Ouda:
LiFi/WiFi Authentication and Handover Protocols: Survey, Evaluation, and Recommendation. ISNCC 2021: 1-6 - [c7]Peter Voege, Abdelkader Ouda:
A Study on Natural Language Chatbot-based Authentication Systems. ISNCC 2021: 1-4 - 2020
- [c6]Iman I. M. Abu Sulayman, Abdelkader Ouda:
Designing Security User Profiles via Anomaly Detection for User Authentication. ISNCC 2020: 1-6 - [c5]Iman I. M. Abu Sulayman, Abdelkader Ouda:
Human Trait Analysis via Machine Learning Techniques for User Authentication. ISNCC 2020: 1-10
2010 – 2019
- 2019
- [c4]Wafaa Anani, Abdelkader Ouda, Ali Hamou:
A Survey Of Wireless Communications for IoT Echo-Systems. CCECE 2019: 1-6 - [c3]Osama Ali-Ozkan, Abdelkader Ouda:
Key-based Reversible Data Masking for Business Intelligence Healthcare Analytics Platforms. ISNCC 2019: 1-6 - 2018
- [c2]Iman I. M. Abu Sulayman, Abdelkader Ouda:
Data Analytics Methods for Anomaly Detection: Evolution and Recommendations. ICSPIS 2018: 1-4 - 2017
- [c1]Wafaa Anani, Abdelkader Ouda:
The importance of human dynamics in the future user authentication. CCECE 2017: 1-5 - [i4]Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz:
Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks. CoRR abs/1711.08528 (2017) - [i3]Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz:
Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack. CoRR abs/1711.09985 (2017) - 2015
- [j1]Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz:
A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks. J. Inf. Secur. Appl. 20: 90-98 (2015) - [i2]Abdalha Ali, Muasaad Alrasheedi, Abdelkader Ouda, Luiz Fernando Capretz:
A study of the interface usability issues of mobile learning applications for smart phones from the users perspective. CoRR abs/1501.01875 (2015) - [i1]Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz:
Cloud-based DDoS Attacks and Defenses. CoRR abs/1511.08839 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint