Abir Awad

Dr Abir Awad

  • Principal Academic In Cyber Security
  • Poole House P318, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top

Biography

Dr. Abir Awad is currently a principal academic in cyber security within the computing department at Bournemouth University. She has more than 18 years’ international experience. She worked in different institutions in UK, Ireland, Canada and France and co-chaired the International Workshop on Trust in Cloud Computing (IWTCC ).

She received her PhD in cryptography in 2009 from Polytech’ Nantes, University of Nantes (Nantes, France). Her main research focuses on the areas of cyber security, cloud security and Trust

Journal Articles

  • Awad, M., Leivadeas, A. and Awad, A., 2023. Multi-resource predictive workload consolidation approach in virtualized environments. Computer Networks, 237.
  • Awad, A., 2020. A new chaos-based cryptosystem for secure transmitted images. IEEE Transactions on Computers.
  • Maddodi, G., Awad, A., Awad, D., Awad, M. and Lee, B., 2018. A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding. Multimedia Tools and Applications, 77 (19), 24701-24725.
  • Awad, A., Matthews, A., Qiao, Y. and Lee, B., 2018. Chaotic Searchable Encryption for Mobile Cloud Storage. IEEE Transactions on Cloud Computing, 6 (2), 440-452.
  • Awad, A. and Saadane, A., 2010. New chaotic permutation methods for image encryption. IAENG International Journal of Computer Science, 37 (4).
  • Awad, A. and Awad, D., 2010. Efficient image chaotic encryption algorithm with no propagation error. ETRI Journal, 32 (5), 774-783.
  • Awad, A., 2008. Comparative Study of 1-D Chaotic Generators for Digital Data Encryption. IAENG International Journal of Computer Science.

Books

Conferences

  • Flanagan, K., Fallon, E., Jacob, P., Awad, A. and Connolly, P., 2019. 2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data. 2019 16th IEEE Annual Consumer Communications and Networking Conference, CCNC 2019.
  • Flanagan, K., Fallon, E., Connolly, P. and Awad, A., 2017. Network anomaly detection in time series using distance based outlier detection with cluster density analysis. 2017 Internet Technologies and Applications, ITA 2017 - Proceedings of the 7th International Conference, 116-121.
  • Flanagan, K., Fallon, E., Awad, A. and Connolly, P., 2017. Self-configuring NetFlow anomaly detection using cluster density analysis. International Conference on Advanced Communication Technology, ICACT, 421-427.
  • Flanagan, K., Fallon, E., Connolly, P. and Awad, A., 2017. NetFlow anomaly detection though parallel cluster density analysis in continuous time-series. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10372 LNCS, 221-232.
  • Awad, A., Kadry, S., Lee, B., Maddodi, G. and O'Meara, E., 2016. Integrity assurance in the cloud by combined PBA and provenance. International Conference on Next Generation Mobile Applications, Services, and Technologies, 127-132.
  • Flanagan, K., Fallon, E., Awad, A. and Connolly, P., 2016. Security analytics on asset vulnerability for information abstraction and risk analysis. Proceedings - 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation, UKSim 2016, 9-15.
  • Awad, A., Kadry, S., Maddodi, G., Gill, S. and Lee, B., 2016. Data leakage detection using system call provenance. Proceedings - 2016 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016, 486-491.
  • Awad, A. and Lee, B., 2016. A metaphone based chaotic searchable encryption algorithm for border management. ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 4, 397-402.
  • Lee, B., Awad, A. and Awad, M., 2015. Towards Secure Provenance in the Cloud: A Survey. Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015, 577-582.
  • Ahmad, F., Kazim, M., Adnane, A. and Awad, A., 2015. Vehicular Cloud Networks: Architecture, Applications and Security Issues. Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015, 571-576.
  • Awad, A., Kadry, S., Lee, B. and Zhang, S., 2014. Property based attestation for a secure cloud monitoring system. Proceedings - 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, UCC 2014, 934-940.
  • Awad, A., Matthews, A. and Lee, B., 2014. Secure cloud storage and search scheme for mobile devices. Proceedings of the Mediterranean Electrotechnical Conference - MELECON, 144-150.
  • Rostom, R., Bakhache, B., Salami, H. and Awad, A., 2014. Quantum cryptography and chaos for the transmission of security keys in 802.11 networks. Proceedings of the Mediterranean Electrotechnical Conference - MELECON, 350-356.
  • Awad, A. and Miri, A., 2012. A new image encryption algorithm based on a chaotic DNA substitution method. IEEE International Conference on Communications, 1011-1015.
  • Awad, A. and Saadane, A., 2010. Efficient chaotic permutations for image encryption algorithms. WCE 2010 - World Congress on Engineering 2010, 1, 748-753.
  • Awad, A., 2010. Chaos-Based Cryptosystem for Secure Transmitted Images. In: TEMU 14-16 July 2010 Greece.
  • Awad, A., 2006. Optimum Chaotic Quantized Sequences for Chip-Synchronous DS-CDMA. In: MCSEAI 7-9 December 2006 Morocco.