Resource allocation in a network-based cloud computing environment: design challenges MA Sharkh, M Jammal, A Shami, A Ouda IEEE Communications Magazine 51 (11), 46-52, 2013 | 232 | 2013 |
Cloud-based DDoS attacks and defenses M Darwish, A Ouda, LF Capretz International Conference on Information Society (i-Society 2013), 67-71, 2013 | 106 | 2013 |
A study of the interface usability issues of mobile learning applications for smart phones from the users perspective A Ali, M Alrasheedi, A Ouda, LF Capretz arXiv preprint arXiv:1501.01875, 2015 | 98 | 2015 |
A conceptual framework for measuring the quality aspect of mobile learning LF Capretz, A Ali, A Ouda Bulletin of the IEEE Technical Committee on Learning Technologies 14 (4), 31, 2012 | 61 | 2012 |
A resource scheduling model for cloud computing data centers MA Sharkh, A Ouda, A Shami 2013 9th International Wireless Communications and Mobile Computing …, 2013 | 46 | 2013 |
A Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against Denial of Service (DoS) Attacks M Darwish, A Ouda, LF Capretz | 42 | 2014 |
A survey of wireless communications for IoT echo-systems W Anani, A Ouda, A Hamou 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE …, 2019 | 40 | 2019 |
Localization and security enhancement of block-based image authentication AH Ouda, MR El-Sakka IEEE International Conference on Image Processing 2005 1, I-673, 2005 | 37 | 2005 |
Optimal and suboptimal resource allocation techniques in cloud computing data centers M Abu Sharkh, A Shami, A Ouda Journal of Cloud Computing 6, 1-17, 2017 | 34 | 2017 |
Evaluation of an OAuth 2.0 protocol implementation for web server applications M Darwish, A Ouda 2015 International Conference and Workshop on Computing and Communication …, 2015 | 28 | 2015 |
A framework for next generation user authentication A Ouda 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 1-4, 2016 | 23 | 2016 |
A classification module in data masking framework for business intelligence platform in healthcare O Ali, A Ouda 2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016 | 22 | 2016 |
Security protocols in service-oriented architecture AH Ouda, DS Allison, MAM Capretz 2010 6th World Congress on Services, 185-186, 2010 | 22 | 2010 |
Study on integration of FastAPI and machine learning for continuous authentication of behavioral biometrics P Bansal, A Ouda 2022 International Symposium on Networks, Computers and Communications …, 2022 | 18 | 2022 |
Innovative data authentication model A Ibrahim, A Ouda 2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016 | 14 | 2016 |
A hybrid-based filtering approach for user authentication A Ibrahim, A Ouda 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering …, 2017 | 13 | 2017 |
The importance of human dynamics in the future user authentication W Anani, A Ouda 2017 IEEE 30th Canadian conference on electrical and computer engineering …, 2017 | 13 | 2017 |
A practical version of Wong's watermarking technique AH Ouda, MR El-Sakka 2004 International Conference on Image Processing, 2004. ICIP'04. 4, 2615-2618, 2004 | 11 | 2004 |
User modeling via anomaly detection techniques for user authentication IIMA Sulayman, A Ouda 2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019 | 10 | 2019 |
Simulating high availability scenarios in cloud data centers: a closer look MA Sharkh, A Shami, P Öhlén, A Ouda, A Kanso 2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015 | 10 | 2015 |