​
Login / Signup
Abir Awad
Publication Activity (10 Years)
Years Active: 2012-2023
Publications (10 Years): 9
Top Topics
Encryption Algorithm
Chaotic Maps
Cloud Storage
Security Issues
Top Venues
UCC
CoRR
SECRYPT
IEEE Trans. Cloud Comput.
</>
Publications
</>
Mirna Awad
,
Aris Leivadeas
,
Abir Awad
Multi-resource predictive workload consolidation approach in virtualized environments.
Comput. Networks
237 (2023)
Kieran Flanagan
,
Enda Fallon
,
Paul Jacob
,
Abir Awad
,
Paul Connolly
2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data.
CCNC
(2019)
Abir Awad
,
Adrian Matthews
,
Yuansong Qiao
,
Brian Lee
Chaotic Searchable Encryption for Mobile Cloud Storage.
IEEE Trans. Cloud Comput.
6 (2) (2018)
Gururaj Maddodi
,
Abir Awad
,
Dounia Awad
,
Mirna Awad
,
Brian Lee
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding.
Multim. Tools Appl.
77 (19) (2018)
Kieran Flanagan
,
Enda Fallon
,
Paul Connolly
,
Abir Awad
NetFlow Anomaly Detection Though Parallel Cluster Density Analysis in Continuous Time-Series.
WWIC
(2017)
Abir Awad
,
Brian Lee
A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management.
SECRYPT
(2016)
Abir Awad
,
Sara Kadry
,
Guraraj Maddodi
,
Saul Gill
,
Brian Lee
Data Leakage Detection Using System Call Provenance.
INCoS
(2016)
Kieran Flanagan
,
Enda Fallon
,
Abir Awad
,
Paul Connolly
S. A. V. I. O. R: Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis.
UKSim
(2016)
Abir Awad
,
Sara Kadry
,
Brian Lee
,
Gururaj Maddodi
,
Eoin O'Meara
Integrity Assurance in the Cloud by Combined PBA and Provenance.
NGMAST
(2016)
Brian Lee
,
Abir Awad
,
Mirna Awad
Towards Secure Provenance in the Cloud: A Survey.
UCC
(2015)
Farhan Ahmad
,
Muhammad Kazim
,
Asma Adnane
,
Abir Awad
Vehicular Cloud Networks: Architecture, Applications and Security Issues.
UCC
(2015)
Abir Awad
A New Chaos-Based Cryptosystem for Secure Transmitted Images.
CoRR
(2015)
Abir Awad
,
Sara Kadry
,
Brian Lee
,
Shuaijun Zhang
Property Based Attestation for a Secure Cloud Monitoring System.
UCC
(2014)
Abir Awad
,
Ali Miri
A new image encryption algorithm based on a chaotic DNA substitution method.
ICC
(2012)