Follow
Abdelkader Ouda
Abdelkader Ouda
Western University - Canada
Verified email at uwo.ca - Homepage
Title
Cited by
Cited by
Year
Resource allocation in a network-based cloud computing environment: design challenges
MA Sharkh, M Jammal, A Shami, A Ouda
IEEE Communications Magazine 51 (11), 46-52, 2013
2322013
Cloud-based DDoS attacks and defenses
M Darwish, A Ouda, LF Capretz
International Conference on Information Society (i-Society 2013), 67-71, 2013
1032013
A study of the interface usability issues of mobile learning applications for smart phones from the users perspective
A Ali, M Alrasheedi, A Ouda, LF Capretz
arXiv preprint arXiv:1501.01875, 2015
962015
A conceptual framework for measuring the quality aspect of mobile learning
LF Capretz, A Ali, A Ouda
Bulletin of the IEEE Technical Committee on Learning Technologies 14 (4), 31, 2012
592012
A resource scheduling model for cloud computing data centers
MA Sharkh, A Ouda, A Shami
2013 9th International Wireless Communications and Mobile Computing …, 2013
462013
A Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against Denial of Service (DoS) Attacks
M Darwish, A Ouda, LF Capretz
402014
A survey of wireless communications for IoT echo-systems
W Anani, A Ouda, A Hamou
2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE …, 2019
372019
Localization and security enhancement of block-based image authentication
AH Ouda, MR El-Sakka
IEEE International Conference on Image Processing 2005 1, I-673, 2005
372005
Optimal and suboptimal resource allocation techniques in cloud computing data centers
M Abu Sharkh, A Shami, A Ouda
Journal of Cloud Computing 6, 1-17, 2017
342017
Evaluation of an OAuth 2.0 protocol implementation for web server applications
M Darwish, A Ouda
2015 International Conference and Workshop on Computing and Communication …, 2015
272015
A framework for next generation user authentication
A Ouda
2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 1-4, 2016
222016
Security protocols in service-oriented architecture
AH Ouda, DS Allison, MAM Capretz
2010 6th World Congress on Services, 185-186, 2010
222010
A classification module in data masking framework for business intelligence platform in healthcare
O Ali, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
212016
Study on integration of fastapi and machine learning for continuous authentication of behavioral biometrics
P Bansal, A Ouda
2022 International Symposium on Networks, Computers and Communications …, 2022
152022
Innovative data authentication model
A Ibrahim, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
142016
A hybrid-based filtering approach for user authentication
A Ibrahim, A Ouda
2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering …, 2017
132017
The importance of human dynamics in the future user authentication
W Anani, A Ouda
2017 IEEE 30th Canadian conference on electrical and computer engineering …, 2017
132017
A practical version of Wong's watermarking technique
AH Ouda, MR El-Sakka
2004 International Conference on Image Processing, 2004. ICIP'04. 4, 2615-2618, 2004
112004
User modeling via anomaly detection techniques for user authentication
IIMA Sulayman, A Ouda
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
102019
Simulating high availability scenarios in cloud data centers: a closer look
MA Sharkh, A Shami, P Öhlén, A Ouda, A Kanso
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20