A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding G Maddodi, A Awad, D Awad, M Awad, B Lee Multimedia tools and applications 77, 24701-24725, 2018 | 57 | 2018 |
Vehicular cloud networks: Architecture, applications and security issues F Ahmad, M Kazim, A Adnane, A Awad 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015 | 51 | 2015 |
Efficient image chaotic encryption algorithm with no propagation error A Awad, D Awad ETRI journal 32 (5), 774-783, 2010 | 43 | 2010 |
Chaotic searchable encryption for mobile cloud storage A Awad, A Matthews, Y Qiao, B Lee IEEE Transactions on Cloud Computing 6 (2), 440-452, 2015 | 41 | 2015 |
Comparative study of 1-d chaotic generators for digital data encryption. A Awad, S El Assad, W Qianxue, C Vladeanu, B Bakhache IAENG International Journal of Computer Science 35 (4), 2008 | 37 | 2008 |
Towards secure provenance in the cloud: a survey B Lee, A Awad, M Awad 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015 | 27 | 2015 |
New chaotic permutation methods for image encryption A Awad, A Saadane IAENG International Journal of Computer Science 37 (4), 402-410, 2010 | 23 | 2010 |
Efficient chaotic permutations for image encryption algorithms A Awad, A Saadane Proceedings of the World Congress on Engineering 1, 2010 | 20 | 2010 |
Network anomaly detection in time series using distance based outlier detection with cluster density analysis K Flanagan, E Fallon, P Connolly, A Awad 2017 Internet Technologies and Applications (ITA), 116-121, 2017 | 19 | 2017 |
A new image encryption algorithm based on a chaotic DNA substitution method A Awad, A Miri 2012 IEEE International Conference on Communications (ICC), 1011-1015, 2012 | 19 | 2012 |
A robust cryptosystem based chaos for secure data A Awad, S El Assad, D Caragata 4th International Symposium on Image/Video Communications over Fixed and …, 2008 | 19 | 2008 |
Data leakage detection using system call provenance A Awad, S Kadry, G Maddodi, S Gill, B Lee 2016 International Conference on Intelligent Networking and Collaborative …, 2016 | 15 | 2016 |
A new chaos-based cryptosystem for secure transmitted images A Awad arXiv preprint arXiv:1503.00366, 2015 | 14* | 2015 |
Property Based Attestation for a Secure Cloud Monitoring System A Awad, S Kadry, B Lee, S Zhang Utility and Cloud Computing (UCC), 2014 IEEE/ACM 7th International …, 2014 | 12 | 2014 |
Self-configuring NetFlow anomaly detection using cluster density analysis K Flanagan, E Fallon, A Awad, P Connolly 2017 19th International Conference on Advanced Communication Technology …, 2017 | 8 | 2017 |
2d2n: A dynamic degenerative neural network for classification of images of live network data K Flanagan, E Fallon, P Jacob, A Awad, P Connolly 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2019 | 6 | 2019 |
Integrity assurance in the cloud by combined PBA and provenance A Awad, S Kadry, B Lee, G Maddodi, E O'Meara 2016 10th International Conference on Next Generation Mobile Applications …, 2016 | 6 | 2016 |
Secure cloud storage and search scheme for mobile devices A Awad, A Matthews, B Lee MELECON 2014-2014 17th IEEE Mediterranean Electrotechnical Conference, 144-150, 2014 | 6 | 2014 |
Quantum cryptography and chaos for the transmission of security keys in 802.11 networks R Rostom, B Bakhache, H Salami, A Awad MELECON 2014-2014 17th IEEE Mediterranean Electrotechnical Conference, 350-356, 2014 | 5 | 2014 |
NetFlow anomaly detection though parallel cluster density analysis in continuous time-series K Flanagan, E Fallon, P Connolly, A Awad Wired/Wireless Internet Communications: 15th IFIP WG 6.2 International …, 2017 | 4 | 2017 |