No profile picture available

Dr Abir Awad

  • 01202 965776
  • aawad at bournemouth dot ac dot uk
  • Principal Academic in Cyber Security
  • Poole House P318, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top

Journal Articles

  • Maddodi, G., Awad, A., Awad, D., Awad, M. and Lee, B., 2018. A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding. Multimedia Tools and Applications, 77 (19), 24701-24725.
  • Awad, A., Matthews, A., Qiao, Y. and Lee, B., 2018. Chaotic Searchable Encryption for Mobile Cloud Storage. IEEE Transactions on Cloud Computing, 6 (2), 440-452.
  • Awad, A. and Saadane, A., 2010. New chaotic permutation methods for image encryption. IAENG International Journal of Computer Science, 37 (4).
  • Awad, A. and Awad, D., 2010. Efficient image chaotic encryption algorithm with no propagation error. ETRI Journal, 32 (5), 774-783.


  • Flanagan, K., Fallon, E., Jacob, P., Awad, A. and Connolly, P., 2019. 2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data.
  • Flanagan, K., Fallon, E., Connolly, P. and Awad, A., 2017. Network anomaly detection in time series using distance based outlier detection with cluster density analysis. 116-121.
  • Flanagan, K., Fallon, E., Awad, A. and Connolly, P., 2017. Self-configuring NetFlow anomaly detection using cluster density analysis. 421-427.
  • Flanagan, K., Fallon, E., Connolly, P. and Awad, A., 2017. NetFlow anomaly detection though parallel cluster density analysis in continuous time-series. 221-232.
  • Awad, A., Kadry, S., Lee, B., Maddodi, G. and O'Meara, E., 2016. Integrity assurance in the cloud by combined PBA and provenance. 127-132.
  • Flanagan, K., Fallon, E., Awad, A. and Connolly, P., 2016. Security analytics on asset vulnerability for information abstraction and risk analysis. 9-15.
  • Awad, A., Kadry, S., Maddodi, G., Gill, S. and Lee, B., 2016. Data leakage detection using system call provenance. 486-491.
  • Awad, A. and Lee, B., 2016. A metaphone based chaotic searchable encryption algorithm for border management. 397-402.
  • Lee, B., Awad, A. and Awad, M., 2015. Towards Secure Provenance in the Cloud: A Survey. 577-582.
  • Ahmad, F., Kazim, M., Adnane, A. and Awad, A., 2015. Vehicular Cloud Networks: Architecture, Applications and Security Issues. 571-576.
  • Awad, A., Kadry, S., Lee, B. and Zhang, S., 2014. Property based attestation for a secure cloud monitoring system. 934-940.
  • Awad, A., Matthews, A. and Lee, B., 2014. Secure cloud storage and search scheme for mobile devices. 144-150.
  • Rostom, R., Bakhache, B., Salami, H. and Awad, A., 2014. Quantum cryptography and chaos for the transmission of security keys in 802.11 networks. 350-356.
  • Awad, A. and Miri, A., 2012. A new image encryption algorithm based on a chaotic DNA substitution method. 1011-1015.
  • Awad, A. and Saadane, A., 2010. Efficient chaotic permutations for image encryption algorithms. 748-753.
The data on this page was last updated at 04:09 on January 25, 2020.