Ali Ismail Awad
Orcid: 0000-0002-3800-0757
According to our database1,
Ali Ismail Awad
authored at least 62 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions.
ACM Comput. Surv., May, 2024
Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions.
IEEE Trans. Ind. Informatics, February, 2024
J. Inf. Secur. Appl., 2024
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning.
Comput. Secur., 2024
Context-aware embeddings for robust multiclass fraudulent URL detection in online social platforms.
Comput. Electr. Eng., 2024
LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks.
Ad Hoc Networks, 2024
IEEE Access, 2024
A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of Things.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review.
J. Netw. Comput. Appl., November, 2023
ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning.
Internet Things, October, 2023
Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach.
Comput. Electr. Eng., May, 2023
Sensors, January, 2023
IEEE Trans. Ind. Informatics, 2023
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review.
CoRR, 2023
2022
J. King Saud Univ. Comput. Inf. Sci., November, 2022
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
Sensors, 2022
Future Internet, 2022
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision.
Future Gener. Comput. Syst., 2022
Comput. Secur., 2022
IEEE Access, 2022
CORAS Model for Security Risk Assessment in Advanced Metering Infrastructure Systems.
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022
2021
IEEE Trans. Ind. Informatics, 2021
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions.
Comput. Secur., 2021
Secure and Privacy-aware Blockchain-based Remote Patient Monitoring System for Internet of Healthcare Things.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021
2020
Editorial on Innovative Network Systems and Applications together with the Conference on Information Systems Innovations for Community Services.
Concurr. Comput. Pract. Exp., 2020
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2020
2019
Ad Hoc Networks, 2019
An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques.
IEEE Access, 2019
Parallel Deep CNN Structure for Glioma Detection and Classification via Brain MRI Images.
Proceedings of the 31st International Conference on Microelectronics, 2019
TPUAR-Net: Two Parallel U-Net with Asymmetric Residual-Based Deep Convolutional Neural Network for Brain Tumor Segmentation.
Proceedings of the Image Analysis and Recognition - 16th International Conference, 2019
2018
Sensors, 2018
J. Cloud Comput., 2018
Security risk assessment within hybrid data centers: A case study of delay sensitive applications.
J. Inf. Secur. Appl., 2018
Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks.
EURASIP J. Image Video Process., 2018
Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges.
IEEE Access, 2018
2017
Toward online education for fingerprint recognition: A proof-of-concept web platform.
Inf. Secur. J. A Glob. Perspect., 2017
2016
Informatica (Slovenia), 2016
From classical methods to animal biometrics: A review on cattle identification and tracking.
Comput. Electron. Agric., 2016
Proceedings of the Building Sustainable Health Ecosystems, 2016
Flow-based features for a robust intrusion detection system targeting mobile traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016
Design and implementation of a computer-aided diagnosis system for brain tumor classification.
Proceedings of the 28th International Conference on Microelectronics, 2016
2015
Proceedings of the Health Information Science - 4th International Conference, 2015
Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014
Proceedings of the Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 2014
Proceedings of the Soft Computing Applications, 2014
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2014, 2014
2013
Informatica (Slovenia), 2013
Proceedings of the Advances in Security of Information and Communication Networks, 2013
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
2012
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012
Proceedings of the IIAI International Conference on Advanced Applied Informatics, 2012
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012
2011
Proceedings of the Signal Processing and Information Technology, 2011
Proceedings of the Software Engineering and Computer Systems, 2011
Proceedings of the Digital Information Processing and Communications, 2011
2008
Accurate real-time monitoring of bottlenecks and performance of packet trace collection.
Proceedings of the LCN 2008, 2008
Proceedings of the 16th IEEE Workshop on Local and Metropolitan Area Networks, 2008