No profile picture available

Dr Abir Awad

  • Principal Academic In Cyber Security
  • Poole House P318, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top

Journal Articles

  • Awad, M., Leivadeas, A. and Awad, A., 2023. Multi-resource predictive workload consolidation approach in virtualized environments. Computer Networks, 237.
  • Awad, A., 2020. A new chaos-based cryptosystem for secure transmitted images. IEEE Transactions on Computers.
  • Maddodi, G., Awad, A., Awad, D., Awad, M. and Lee, B., 2018. A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding. Multimedia Tools and Applications, 77 (19), 24701-24725.
  • Awad, A., Matthews, A., Qiao, Y. and Lee, B., 2018. Chaotic Searchable Encryption for Mobile Cloud Storage. IEEE Transactions on Cloud Computing, 6 (2), 440-452.
  • Awad, A. and Saadane, A., 2010. New chaotic permutation methods for image encryption. IAENG International Journal of Computer Science, 37 (4).
  • Awad, A. and Awad, D., 2010. Efficient image chaotic encryption algorithm with no propagation error. ETRI Journal, 32 (5), 774-783.
  • Awad, A., 2008. Comparative Study of 1-D Chaotic Generators for Digital Data Encryption. IAENG International Journal of Computer Science.

Books

Conferences

  • Flanagan, K., Fallon, E., Jacob, P., Awad, A. and Connolly, P., 2019. 2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data. 2019 16th IEEE Annual Consumer Communications and Networking Conference, CCNC 2019.
  • Flanagan, K., Fallon, E., Connolly, P. and Awad, A., 2017. Network anomaly detection in time series using distance based outlier detection with cluster density analysis. 2017 Internet Technologies and Applications, ITA 2017 - Proceedings of the 7th International Conference, 116-121.
  • Flanagan, K., Fallon, E., Awad, A. and Connolly, P., 2017. Self-configuring NetFlow anomaly detection using cluster density analysis. International Conference on Advanced Communication Technology, ICACT, 421-427.
  • Flanagan, K., Fallon, E., Connolly, P. and Awad, A., 2017. NetFlow anomaly detection though parallel cluster density analysis in continuous time-series. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10372 LNCS, 221-232.
  • Awad, A., Kadry, S., Lee, B., Maddodi, G. and O'Meara, E., 2016. Integrity assurance in the cloud by combined PBA and provenance. International Conference on Next Generation Mobile Applications, Services, and Technologies, 127-132.
  • Flanagan, K., Fallon, E., Awad, A. and Connolly, P., 2016. Security analytics on asset vulnerability for information abstraction and risk analysis. Proceedings - 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation, UKSim 2016, 9-15.
  • Awad, A., Kadry, S., Maddodi, G., Gill, S. and Lee, B., 2016. Data leakage detection using system call provenance. Proceedings - 2016 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016, 486-491.
  • Awad, A. and Lee, B., 2016. A metaphone based chaotic searchable encryption algorithm for border management. ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 4, 397-402.
  • Lee, B., Awad, A. and Awad, M., 2015. Towards Secure Provenance in the Cloud: A Survey. Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015, 577-582.
  • Ahmad, F., Kazim, M., Adnane, A. and Awad, A., 2015. Vehicular Cloud Networks: Architecture, Applications and Security Issues. Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015, 571-576.
  • Awad, A., Kadry, S., Lee, B. and Zhang, S., 2014. Property based attestation for a secure cloud monitoring system. Proceedings - 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, UCC 2014, 934-940.
  • Awad, A., Matthews, A. and Lee, B., 2014. Secure cloud storage and search scheme for mobile devices. Proceedings of the Mediterranean Electrotechnical Conference - MELECON, 144-150.
  • Rostom, R., Bakhache, B., Salami, H. and Awad, A., 2014. Quantum cryptography and chaos for the transmission of security keys in 802.11 networks. Proceedings of the Mediterranean Electrotechnical Conference - MELECON, 350-356.
  • Awad, A. and Miri, A., 2012. A new image encryption algorithm based on a chaotic DNA substitution method. IEEE International Conference on Communications, 1011-1015.
  • Awad, A. and Saadane, A., 2010. Efficient chaotic permutations for image encryption algorithms. WCE 2010 - World Congress on Engineering 2010, 1, 748-753.
  • Awad, A., 2010. Chaos-Based Cryptosystem for Secure Transmitted Images. In: TEMU 14-16 July 2010 Greece.
  • Awad, A., 2006. Optimum Chaotic Quantized Sequences for Chip-Synchronous DS-CDMA. In: MCSEAI 7-9 December 2006 Morocco.