Abir Awad

According to our database1, Abir Awad authored at least 14 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-resource predictive workload consolidation approach in virtualized environments.
Comput. Networks, December, 2023

2019
2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Chaotic Searchable Encryption for Mobile Cloud Storage.
IEEE Trans. Cloud Comput., 2018

A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding.
Multim. Tools Appl., 2018

2017
NetFlow Anomaly Detection Though Parallel Cluster Density Analysis in Continuous Time-Series.
Proceedings of the Wired/Wireless Internet Communications, 2017

2016
S. A. V. I. O. R: Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis.
Proceedings of the UKSim-AMSS 18th International Conference on Computer Modelling and Simulation, 2016

A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Integrity Assurance in the Cloud by Combined PBA and Provenance.
Proceedings of the 10th International Conference on Next Generation Mobile Applications, 2016

Data Leakage Detection Using System Call Provenance.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2015
A New Chaos-Based Cryptosystem for Secure Transmitted Images.
CoRR, 2015

Towards Secure Provenance in the Cloud: A Survey.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Vehicular Cloud Networks: Architecture, Applications and Security Issues.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

2014
Property Based Attestation for a Secure Cloud Monitoring System.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

2012
A new image encryption algorithm based on a chaotic DNA substitution method.
Proceedings of IEEE International Conference on Communications, 2012


  Loading...