Ali Ismail Awad
Luleå tekniska Universitet
H-index: 30
Europe-Sweden
Top articles of Ali Ismail Awad
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Automatic brain-tumor diagnosis using cascaded deep convolutional neural networks with symmetric U-Net and asymmetric residual-blocks | Scientific Reports | Mahmoud Khaled Abd-Ellah Ali Ismail Awad Ashraf AM Khalaf Amira Mofreh Ibraheem | 2024/4/25 |
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning | Computers & Security | Muneeb Hassan Khan Abdul Rehman Javed Zafar Iqbal Muhammad Asim Ali Ismail Awad | 2024/4/1 |
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions | Victor R Kebande Ali Ismail Awad | 2024/1/12 | |
AI-powered biometrics for Internet of Things security: A review and future vision | Ali Ismail Awad Aiswarya Babu Ezedin Barka Khaled Shuaib | 2024/5/1 | |
IMPACT OF COVID-19 ON SECURITY VULNERABILITIES OF LEARNING MANAGEMENT SYSTEMS: A STUDY TOWARDS SECURITY AND SUSTAINABILITY ENHANCEMENT | Souheil Abdel-Latif Akacha | 2023 | |
Privacy-aware remote identification for unmanned aerial vehicles: current solutions, potential threats, and future directions | IEEE Transactions on Industrial Informatics | Pietro Tedeschi Fatima Ali Al Nuaimi Ali Ismail Awad Enrico Natalizio | 2023/6/5 |
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review | Hamza Kheddar Yassine Himeur Ali Ismail Awad | 2023/11/1 | |
Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach | Computers and Electrical Engineering | Ali Ismail Awad Mostafa Shokry Ashraf AM Khalaf Mahmoud Khaled Abd-Ellah | 2023/5/1 |
ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning | Internet of Things | Mohammed M Alani Ali Ismail Awad Ezedin Barka | 2023/10/1 |
Cybersecurity Risk Assessment in Advanced Metering Infrastructure | Mostafa Shokry Abd El Salam Ali Ismail Awad Mahmoud Khaled Abd-Ellah Ashraf AM Khalaf | 2023/12/6 | |
Acknowledgment to the Reviewers of Applied Sciences in 2022 | Applied Sciences Editorial Office | 2023/1/20 | |
Enhancing Security and Sustainability of e-Learning Software Systems: A Comprehensive Vulnerability Analysis and Recommendations for Stakeholders | Sustainability | Souheil Abdel-Latif Akacha Ali Ismail Awad | 2023/9/24 |
Efficient approach for anomaly detection in IoT using system calls | Sensors | Nouman Shamim Muhammad Asim Thar Baker Ali Ismail Awad | 2023 |
Evaluating Potential Security Risks of Advanced Metering Infrastructure Using EBIOS Risk Assessment Method | Mostafa Shokry Ali Ismail Awad Mahmoud Khaled Abd-Ellah Ashraf AM Khalaf | 2023/7/18 | |
Preface—Internet of Things Security and Privacy: Practical and Management Perspectives | Ali Ismail Awad Atif Ahmad Kim Kwang Raymond Choo Saqib Hakak | 2023/12/6 | |
When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method | Sustainability | Mostafa Shokry Ali Ismail Awad Mahmoud Khaled Abd-Ellah Ashraf AM Khalaf | 2023/6/20 |
Internet of Things Security and Privacy: Practical and Management Perspectives | Ali Ismail Awad Atif Ahmad Kim-Kwang Raymond Choo Saqib Hakak | 2023/12/6 | |
An intelligent two-layer intrusion detection system for the internet of things | IEEE Transactions on Industrial Informatics | Mohammed M Alani Ali Ismail Awad | 2022/7/18 |
Paired: An explainable lightweight android malware detection system | IEEE Access | Mohammed M Alani Ali Ismail Awad | 2022/7/11 |
CORAS model for security risk assessment in advanced metering infrastructure systems | Mostafa Shokry Ali Ismail Awad Mahmoud Khaled Abd-Ellah Ashraf AM Khalaf | 2022/11/18 |