Abdelkader Ouda

Orcid: 0000-0003-3882-1763

According to our database1, Abdelkader Ouda authored at least 28 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System.
Comput., July, 2024

Data Lakes: A Survey of Concepts and Architectures.
Comput., July, 2024

Authentication and Key Agreement Protocol in Hybrid Edge-Fog-Cloud Computing Enhanced by 5G Networks.
Future Internet, June, 2024

HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security.
Future Internet, May, 2024

Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics.
Comput., April, 2024

Algorithm-Based Data Generation (ADG) Engine for Dual-Mode User Behavioral Data Analytics.
Inf., March, 2024

2023
Still Computers Networking is Less Secure Than It should be, Causes and Solution.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Autonomous Vehicle Cyber-Attacks Classification Framework.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Ensemble Learning to Enhance Continuous User Authentication For Real World Environments.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
An Innovative Multi-Factor Authentication Approach.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Real-Time Data Generation and Anomaly Detection for Security User Profiles.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Transfer Learning for Behavioral Biometrics-based Continuous User Authentication.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Study on Integration of FastAPI and Machine Learning for Continuous Authentication of Behavioral Biometrics.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Wireless Meter Bus: Secure Remote Metering within the IoT Smart Grid.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Comparison of Machine Learning Techniques for Activities of Daily Living Classification with Electromyographic Data.
Proceedings of the International Conference on Rehabilitation Robotics, 2022

2021
A Study on Natural Language Chatbot-based Authentication Systems.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

LiFi/WiFi Authentication and Handover Protocols: Survey, Evaluation, and Recommendation.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

2020
Human Trait Analysis via Machine Learning Techniques for User Authentication.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Designing Security User Profiles via Anomaly Detection for User Authentication.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
Key-based Reversible Data Masking for Business Intelligence Healthcare Analytics Platforms.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

A Survey Of Wireless Communications for IoT Echo-Systems.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Data Analytics Methods for Anomaly Detection: Evolution and Recommendations.
Proceedings of the International Conference on Signal Processing and Information Security, 2018

2017
Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack.
CoRR, 2017

Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks.
CoRR, 2017

The importance of human dynamics in the future user authentication.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2015
A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks.
J. Inf. Secur. Appl., 2015

Cloud-based DDoS Attacks and Defenses.
CoRR, 2015

A study of the interface usability issues of mobile learning applications for smart phones from the users perspective.
CoRR, 2015


  Loading...