Ali Ismail Awad

Orcid: 0000-0002-3800-0757

According to our database1, Ali Ismail Awad authored at least 55 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions.
ACM Comput. Surv., May, 2024

Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions.
IEEE Trans. Ind. Informatics, February, 2024

2023
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review.
J. Netw. Comput. Appl., November, 2023

ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning.
Internet Things, October, 2023

Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach.
Comput. Electr. Eng., May, 2023

Efficient Approach for Anomaly Detection in IoT Using System Calls.
Sensors, January, 2023

An Intelligent Two-Layer Intrusion Detection System for the Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review.
CoRR, 2023

2022
Automatic mapping of configuration options in software using static analysis.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
Sensors, 2022

Intelligent authentication of 5G healthcare devices: A survey.
Internet Things, 2022

Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models.
Future Internet, 2022

Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision.
Future Gener. Comput. Syst., 2022

AdStop: Efficient flow-based mobile adware detection using machine learning.
Comput. Secur., 2022

PAIRED: An Explainable Lightweight Android Malware Detection System.
IEEE Access, 2022

2021
A Novel Image Steganography Method for Industrial Internet of Things Security.
IEEE Trans. Ind. Informatics, 2021

Enabling Technologies for Energy Cloud.
J. Parallel Distributed Comput., 2021

Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions.
Comput. Secur., 2021

Secure and Privacy-aware Blockchain-based Remote Patient Monitoring System for Internet of Healthcare Things.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021

2020
A Guiding Framework for Vetting the Internet of Things.
J. Inf. Secur. Appl., 2020

Editorial on Innovative Network Systems and Applications together with the Conference on Information Systems Innovations for Community Services.
Concurr. Comput. Pract. Exp., 2020

Outlook on Security and Privacy in IoHT: Key Challenges and Future Vision.
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2020

2019
Special issue on security of IoT-enabled infrastructures in smart cities.
Ad Hoc Networks, 2019

An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques.
IEEE Access, 2019

Parallel Deep CNN Structure for Glioma Detection and Classification via Brain MRI Images.
Proceedings of the 31st International Conference on Microelectronics, 2019

TPUAR-Net: Two Parallel U-Net with Asymmetric Residual-Based Deep Convolutional Neural Network for Brain Tumor Segmentation.
Proceedings of the Image Analysis and Recognition - 16th International Conference, 2019

2018
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
Sensors, 2018

Intrusion detection systems for IoT-based smart environments: a survey.
J. Cloud Comput., 2018

Security risk assessment within hybrid data centers: A case study of delay sensitive applications.
J. Inf. Secur. Appl., 2018

Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks.
EURASIP J. Image Video Process., 2018

Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges.
IEEE Access, 2018

2017
Toward online education for fingerprint recognition: A proof-of-concept web platform.
Inf. Secur. J. A Glob. Perspect., 2017

2016
A Distributed Security Mechanism for Resource-Constrained IoT Devices.
Informatica (Slovenia), 2016

From classical methods to animal biometrics: A review on cattle identification and tracking.
Comput. Electron. Agric., 2016

Classification of Brain Tumor MRIs Using a Kernel Support Vector Machine.
Proceedings of the Building Sustainable Health Ecosystems, 2016

Flow-based features for a robust intrusion detection system targeting mobile traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Design and implementation of a computer-aided diagnosis system for brain tumor classification.
Proceedings of the 28th International Conference on Microelectronics, 2016

2015
Biometrics Applications in e-Health Security: A Preliminary Survey.
Proceedings of the Health Information Science - 4th International Conference, 2015

Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Impact of Some Biometric Modalities on Forensic Science.
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014

Erratum: Impact of Some Biometric Modalities on Forensic Science.
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014

Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU.
Proceedings of the Soft Computing Applications, 2014

Business and Government Organizations' Adoption of Cloud Computing.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2014, 2014

2013
Fingerprint Local Invariant Feature Extraction on GPU with CUDA.
Informatica (Slovenia), 2013

A Cattle Identification Approach Using Live Captured Muzzle Print Images.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

A Robust Cattle Identification Scheme Using Muzzle Print Images.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
Evaluation of Acceleration Algorithm for Biometric Identification.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Evaluation of a Fingerprint Identification Algorithm with SIFT Features.
Proceedings of the IIAI International Conference on Advanced Applied Informatics, 2012

Advanced Encryption Standard Algorithm: Issues and Implementation Aspects.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

Machine Learning Techniques for Fingerprint Identification: A Short Review.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

2011
FingRF: A Generalized Fingerprints Research Framework.
Proceedings of the Signal Processing and Information Technology, 2011

Fingerprint Singularity Detection: A Comparative Study.
Proceedings of the Software Engineering and Computer Systems, 2011

An Application for Singular Point Location in Fingerprint Classification.
Proceedings of the Digital Information Processing and Communications, 2011

2008
Accurate real-time monitoring of bottlenecks and performance of packet trace collection.
Proceedings of the LCN 2008, 2008

Maximizing packet loss monitoring accuracy for reliable trace collections.
Proceedings of the 16th IEEE Workshop on Local and Metropolitan Area Networks, 2008


  Loading...