Search Results - "Awad, Ali Ismail"

Refine Results
  1. 1

    Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes by Ali, Bako, Awad, Ali Ismail

    Published in Sensors (Basel, Switzerland) (08-03-2018)
    “…The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users…”
    Get full text
    Journal Article
  2. 2

    A Novel Image Steganography Method for Industrial Internet of Things Security by Hassaballah, M., Hameed, Mohamed Abdel, Awad, Ali Ismail, Muhammad, Khan

    “…The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private…”
    Get full text
    Journal Article
  3. 3

    An Intelligent Two-Layer Intrusion Detection System for the Internet of Things by Alani, Mohammed M., Awad, Ali Ismail

    “…The Internet of Things (IoT) has become an enabler paradigm for different applications, such as healthcare, education, agriculture, smart homes, and recently,…”
    Get full text
    Journal Article
  4. 4

    Intrusion detection systems for IoT-based smart environments: a survey by Elrawy, Mohamed Faisal, Awad, Ali Ismail, Hamed, Hesham F. A.

    “…One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The Internet of Things (IoT) paradigm has…”
    Get full text
    Journal Article
  5. 5

    Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions by Tedeschi, Pietro, Al Nuaimi, Fatima Ali, Awad, Ali Ismail, Natalizio, Enrico

    “…The Federal Aviation Administration (FAA) recently introduced a new standard, namely, remote identification , to improve accountability for unmanned aerial…”
    Get full text
    Journal Article
  6. 6

    PAIRED: An Explainable Lightweight Android Malware Detection System by Alani, Mohammed M., Awad, Ali Ismail

    Published in IEEE access (2022)
    “…With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android…”
    Get full text
    Journal Article
  7. 7

    Efficient Approach for Anomaly Detection in IoT Using System Calls by Shamim, Nouman, Asim, Muhammad, Baker, Thar, Awad, Ali Ismail

    Published in Sensors (Basel, Switzerland) (06-01-2023)
    “…The Internet of Things (IoT) has shown rapid growth and wide adoption in recent years. However, IoT devices are not designed to address modern security…”
    Get full text
    Journal Article
  8. 8

    An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques by Hameed, Mohamed Abdel, Hassaballah, M., Aly, Saleh, Awad, Ali Ismail

    Published in IEEE access (2019)
    “…Pixel value differencing (PVD) and least significant bit substitution (LSB) are two widely used schemes in image steganography. These two methods do not…”
    Get full text
    Journal Article
  9. 9

    Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security by Farooq, Umer, Asim, Muhammad, Tariq, Noshina, Baker, Thar, Awad, Ali Ismail

    Published in Sensors (Basel, Switzerland) (16-06-2022)
    “…Recently, the Internet of Things (IoT) has emerged as an important way to connect diverse physical devices to the internet. The IoT paves the way for a slew of…”
    Get full text
    Journal Article
  10. 10

    Automatic brain-tumor diagnosis using cascaded deep convolutional neural networks with symmetric U-Net and asymmetric residual-blocks by Abd-Ellah, Mahmoud Khaled, Awad, Ali Ismail, Khalaf, Ashraf A. M., Ibraheem, Amira Mofreh

    Published in Scientific reports (25-04-2024)
    “…The use of various kinds of magnetic resonance imaging (MRI) techniques for examining brain tissue has increased significantly in recent years, and manual…”
    Get full text
    Journal Article
  11. 11

    Bag-of-Visual-Words for Cattle Identification from Muzzle Print Images by Awad, Ali Ismail, Hassaballah, M.

    Published in Applied sciences (15-11-2019)
    “…Cattle, buffalo and cow identification plays an influential role in cattle traceability from birth to slaughter, understanding disease trajectories and…”
    Get full text
    Journal Article
  12. 12

    Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks by Abd-Ellah, Mahmoud Khaled, Awad, Ali Ismail, Khalaf, Ashraf A. M., Hamed, Hesham F. A.

    “…Brain tumour is a serious disease, and the number of people who are dying due to brain tumours is increasing. Manual tumour diagnosis from magnetic resonance…”
    Get full text
    Journal Article
  13. 13

    Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges by Hassan, Abbas M., Awad, Ali Ismail

    Published in IEEE access (01-01-2018)
    “…The Internet of Things (IoT) could become an important aspect of urban life in the next decade. In the IoT paradigm, various information and communication…”
    Get full text
    Journal Article
  14. 14

    A Conversational AI Bot for Efficient Learning: A Prototypical Design by Elragal, Ahmed, Awad, Ali Ismail, Andersson, Ingemar, Nilsson, Jorgen

    Published in IEEE access (2024)
    “…In an ideal world, how individuals learn should align with the methods they are taught. However, this is not always the case, and it is necessary to reconsider…”
    Get full text
    Journal Article
  15. 15

    Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models by Roy, Sanjiban Sekhar, Awad, Ali Ismail, Amare, Lamesgen Adugnaw, Erkihun, Mabrie Tesfaye, Anas, Mohd

    Published in Future internet (01-11-2022)
    “…In today’s world, phishing attacks are gradually increasing, resulting in individuals losing valuables, assets, personal information, etc., to unauthorized…”
    Get full text
    Journal Article
  16. 16

    Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios by Banerji, Nandan, Paul, Chayan, Debnath, Bikash, Das, Biplab, Chhabra, Gurpreet Singh, Mohanta, Bhabendu Kumar, Awad, Ali Ismail

    Published in Future internet (01-10-2024)
    “…In a context-aware Internet of Things (IoT) environment, the functional contexts of devices and users will change over time depending on their service…”
    Get full text
    Journal Article
  17. 17

    Automatic mapping of configuration options in software using static analysis by Wang, Junyong, Baker, Thar, Zhou, Yingnan, Awad, Ali Ismail, Wang, Bin, Zhu, Yongsheng

    “…Configuration errors are some of the main reasons for software failures. Some configuration options may even negatively impact the software’s security, so that…”
    Get full text
    Journal Article
  18. 18

    From classical methods to animal biometrics: A review on cattle identification and tracking by Awad, Ali Ismail

    Published in Computers and electronics in agriculture (01-04-2016)
    “…•A review on the evolution of cattle identification and tracking methods is presented.•Classical methods do not cope with the current cattle identification…”
    Get full text
    Journal Article
  19. 19

    Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review by Kheddar, Hamza, Himeur, Yassine, Awad, Ali Ismail

    Published 01-04-2024
    “…Journal of Network and Computer Applications, Elsevier, 2023 Globally, the external internet is increasingly being connected to industrial control systems. As…”
    Get full text
    Journal Article
  20. 20

    Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review by Kheddar, Hamza, Himeur, Yassine, Awad, Ali Ismail

    “…Globally, the external internet is increasingly being connected to industrial control systems. As a result, there is an immediate need to protect these…”
    Get full text
    Journal Article