Ali Ismail Awad

According to our database1, Ali Ismail Awad authored at least 33 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Editorial on Innovative Network Systems and Applications together with the Conference on Information Systems Innovations for Community Services.
Concurr. Comput. Pract. Exp., 2020

Outlook on Security and Privacy in IoHT: Key Challenges and Future Vision.
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2020

2019
Special issue on security of IoT-enabled infrastructures in smart cities.
Ad Hoc Networks, 2019

An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques.
IEEE Access, 2019

Parallel Deep CNN Structure for Glioma Detection and Classification via Brain MRI Images.
Proceedings of the 31st International Conference on Microelectronics, 2019

TPUAR-Net: Two Parallel U-Net with Asymmetric Residual-Based Deep Convolutional Neural Network for Brain Tumor Segmentation.
Proceedings of the Image Analysis and Recognition - 16th International Conference, 2019

2018
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
Sensors, 2018

Intrusion detection systems for IoT-based smart environments: a survey.
J. Cloud Computing, 2018

Security risk assessment within hybrid data centers: A case study of delay sensitive applications.
J. Inf. Secur. Appl., 2018

Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks.
EURASIP J. Image and Video Processing, 2018

Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges.
IEEE Access, 2018

2017
Toward online education for fingerprint recognition: A proof-of-concept web platform.
Inf. Secur. J. A Glob. Perspect., 2017

2016
A Distributed Security Mechanism for Resource-Constrained IoT Devices.
Informatica (Slovenia), 2016

From classical methods to animal biometrics: A review on cattle identification and tracking.
Comput. Electron. Agric., 2016

Flow-based features for a robust intrusion detection system targeting mobile traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Design and implementation of a computer-aided diagnosis system for brain tumor classification.
Proceedings of the 28th International Conference on Microelectronics, 2016

2015
Biometrics Applications in e-Health Security: A Preliminary Survey.
Proceedings of the Health Information Science - 4th International Conference, 2015

Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Impact of Some Biometric Modalities on Forensic Science.
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014

Erratum: Impact of Some Biometric Modalities on Forensic Science.
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014

Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU.
Proceedings of the Soft Computing Applications, 2014

Business and Government Organizations' Adoption of Cloud Computing.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2014, 2014

2013
Fingerprint Local Invariant Feature Extraction on GPU with CUDA.
Informatica (Slovenia), 2013

A Robust Cattle Identification Scheme Using Muzzle Print Images.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
Evaluation of Acceleration Algorithm for Biometric Identification.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Evaluation of a Fingerprint Identification Algorithm with SIFT Features.
Proceedings of the IIAI International Conference on Advanced Applied Informatics, 2012

Advanced Encryption Standard Algorithm: Issues and Implementation Aspects.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

Machine Learning Techniques for Fingerprint Identification: A Short Review.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

2011
FingRF: A Generalized Fingerprints Research Framework.
Proceedings of the Signal Processing and Information Technology, 2011

Fingerprint Singularity Detection: A Comparative Study.
Proceedings of the Software Engineering and Computer Systems, 2011

An Application for Singular Point Location in Fingerprint Classification.
Proceedings of the Digital Information Processing and Communications, 2011

2008
Accurate real-time monitoring of bottlenecks and performance of packet trace collection.
Proceedings of the LCN 2008, 2008

Maximizing packet loss monitoring accuracy for reliable trace collections.
Proceedings of the 16th IEEE Workshop on Local and Metropolitan Area Networks, 2008


  Loading...