Seguir
Abdelkader Ouda
Abdelkader Ouda
Western University - Canada
Dirección de correo verificada de uwo.ca - Página principal
Título
Citado por
Citado por
Año
Resource allocation in a network-based cloud computing environment: design challenges
MA Sharkh, M Jammal, A Shami, A Ouda
IEEE Communications Magazine 51 (11), 46-52, 2013
2332013
Cloud-based DDoS attacks and defenses
M Darwish, A Ouda, LF Capretz
International Conference on Information Society (i-Society 2013), 67-71, 2013
1042013
A study of the interface usability issues of mobile learning applications for smart phones from the users perspective
A Ali, M Alrasheedi, A Ouda, LF Capretz
arXiv preprint arXiv:1501.01875, 2015
962015
A conceptual framework for measuring the quality aspect of mobile learning
LF Capretz, A Ali, A Ouda
Bulletin of the IEEE Technical Committee on Learning Technologies 14 (4), 31, 2012
592012
A resource scheduling model for cloud computing data centers
MA Sharkh, A Ouda, A Shami
2013 9th International Wireless Communications and Mobile Computing …, 2013
462013
A Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against Denial of Service (DoS) Attacks
M Darwish, A Ouda, LF Capretz
402014
A survey of wireless communications for IoT echo-systems
W Anani, A Ouda, A Hamou
2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE …, 2019
372019
Localization and security enhancement of block-based image authentication
AH Ouda, MR El-Sakka
IEEE International Conference on Image Processing 2005 1, I-673, 2005
372005
Optimal and suboptimal resource allocation techniques in cloud computing data centers
M Abu Sharkh, A Shami, A Ouda
Journal of Cloud Computing 6, 1-17, 2017
342017
Evaluation of an OAuth 2.0 protocol implementation for web server applications
M Darwish, A Ouda
2015 International Conference and Workshop on Computing and Communication …, 2015
282015
A framework for next generation user authentication
A Ouda
2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 1-4, 2016
222016
Security protocols in service-oriented architecture
AH Ouda, DS Allison, MAM Capretz
2010 6th World Congress on Services, 185-186, 2010
222010
A classification module in data masking framework for business intelligence platform in healthcare
O Ali, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
212016
Study on integration of fastapi and machine learning for continuous authentication of behavioral biometrics
P Bansal, A Ouda
2022 International Symposium on Networks, Computers and Communications …, 2022
162022
Innovative data authentication model
A Ibrahim, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
142016
A hybrid-based filtering approach for user authentication
A Ibrahim, A Ouda
2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering …, 2017
132017
The importance of human dynamics in the future user authentication
W Anani, A Ouda
2017 IEEE 30th Canadian conference on electrical and computer engineering …, 2017
132017
A practical version of Wong's watermarking technique
AH Ouda, MR El-Sakka
2004 International Conference on Image Processing, 2004. ICIP'04. 4, 2615-2618, 2004
112004
User modeling via anomaly detection techniques for user authentication
IIMA Sulayman, A Ouda
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
102019
Simulating high availability scenarios in cloud data centers: a closer look
MA Sharkh, A Shami, P Öhlén, A Ouda, A Kanso
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
102015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20