Abir Awad
Abir Awad
Postdoctoral researcher, Cloud Security, Irish Centre for Cloud Computing and Commerce (IC4)
Verified email at research.ait.ie
Title
Cited by
Cited by
Year
Vehicular cloud networks: Architecture, applications and security issues
F Ahmad, M Kazim, A Adnane, A Awad
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
382015
Efficient image chaotic encryption algorithm with no propagation error
A Awad, D Awad
ETRI journal 32 (5), 774-783, 2010
372010
Comparative study of 1-d chaotic generators for digital data encryption.
A Awad, S El Assad, W Qianxue, C Vladeanu, B Bakhache
IAENG International Journal of Computer Science 35 (4), 2008
322008
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding
G Maddodi, A Awad, D Awad, M Awad, B Lee
Multimedia Tools and Applications 77 (19), 24701-24725, 2018
232018
Chaotic searchable encryption for mobile cloud storage
A Awad, A Matthews, Y Qiao, B Lee
IEEE Transactions on Cloud Computing 6 (2), 440-452, 2015
202015
New chaotic permutation methods for image encryption
A Awad, A Saadane
IAENG International Journal of Computer Science 37 (4), 402-410, 2010
202010
A new image encryption algorithm based on a chaotic DNA substitution method
A Awad, A Miri
2012 IEEE International Conference on Communications (ICC), 1011-1015, 2012
192012
Efficient chaotic permutations for image encryption algorithms
A Awad, A Saadane
Proceedings of the World Congress on Engineering 1, 2010
192010
A robust cryptosystem based chaos for secure data
A Awad, S El Assad, D Caragata
4th International Symposium on Image/Video Communications over Fixed and …, 2008
192008
Towards secure provenance in the cloud: a survey
B Lee, A Awad, M Awad
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
182015
A new chaos-based cryptosystem for secure transmitted images
A Awad
arXiv preprint arXiv:1503.00366, 2015
12*2015
Property Based Attestation for a Secure Cloud Monitoring System
A Awad, S Kadry, B Lee, S Zhang
Utility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International …, 2014
112014
Network anomaly detection in time series using distance based outlier detection with cluster density analysis
K Flanagan, E Fallon, P Connolly, A Awad
2017 Internet Technologies and Applications (ITA), 116-121, 2017
82017
Data leakage detection using system call provenance
A Awad, S Kadry, G Maddodi, S Gill, B Lee
2016 International Conference on Intelligent Networking and Collaborative …, 2016
72016
Secure cloud storage and search scheme for mobile devices
A Awad, A Matthews, B Lee
MELECON 2014-2014 17th IEEE Mediterranean Electrotechnical Conference, 144-150, 2014
62014
Quantum cryptography and chaos for the transmission of security keys in 802.11 networks
R Rostom, B Bakhache, H Salami, A Awad
MELECON 2014-2014 17th IEEE Mediterranean Electrotechnical Conference, 350-356, 2014
62014
Self-configuring NetFlow anomaly detection using cluster density analysis
K Flanagan, E Fallon, A Awad, P Connolly
2017 19th International Conference on Advanced Communication Technology …, 2017
52017
2d2n: A dynamic degenerative neural network for classification of images of live network data
K Flanagan, E Fallon, P Jacob, A Awad, P Connolly
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2019
42019
Integrity assurance in the cloud by combined PBA and provenance
A Awad, S Kadry, B Lee, G Maddodi, E O'Meara
2016 10th International Conference on Next Generation Mobile Applications …, 2016
42016
Chaos-based cryptosystem for secure transmitted images
A Awad, K Ahmad, S El Assad, D Caragata
International Conference on Telecommunications and Multimedia, TEMU 2010 …, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20