Abdelkader Ouda
Abdelkader Ouda
Western University - Canada
Verified email at - Homepage
Cited by
Cited by
Resource allocation in a network-based cloud computing environment: design challenges
MA Sharkh, M Jammal, A Shami, A Ouda
IEEE Communications Magazine 51 (11), 46-52, 2013
Cloud-based DDoS attacks and defenses
M Darwish, A Ouda, LF Capretz
International Conference on Information Society (i-Society 2013), 67-71, 2013
A conceptual framework for measuring the quality aspect of mobile learning
LF Capretz, A Ali, A Ouda
Bulletin of the IEEE Technical Committee on Learning Technologies 14 (4), 31, 2012
A resource scheduling model for cloud computing data centers
MA Sharkh, A Ouda, A Shami
2013 9th International Wireless Communications and Mobile Computing …, 2013
A Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against Denial of Service (DoS) Attacks
M Darwish, A Ouda, LF Capretz
Localization and security enhancement of block-based image authentication
AH Ouda, MR El-Sakka
IEEE International Conference on Image Processing 2005 1, I-673, 2005
A survey of wireless communications for IoT echo-systems
W Anani, A Ouda, A Hamou
2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE …, 2019
Optimal and suboptimal resource allocation techniques in cloud computing data centers
M Abu Sharkh, A Shami, A Ouda
Journal of Cloud Computing 6 (1), 1-17, 2017
A framework for next generation user authentication
A Ouda
2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 1-4, 2016
Evaluation of an OAuth 2.0 protocol implementation for web server applications
M Darwish, A Ouda
2015 International Conference and Workshop on Computing and Communication …, 2015
A classification module in data masking framework for business intelligence platform in healthcare
O Ali, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
Security protocols in service-oriented architecture
AH Ouda, DS Allison, MAM Capretz
2010 6th World Congress on Services, 185-186, 2010
A hybrid-based filtering approach for user authentication
A Ibrahim, A Ouda
2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering …, 2017
Innovative data authentication model
A Ibrahim, A Ouda
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
The importance of human dynamics in the future user authentication
W Anani, A Ouda
2017 IEEE 30th Canadian conference on electrical and computer engineering …, 2017
Simulating high availability scenarios in cloud data centers: a closer look
MA Sharkh, A Shami, P Öhlén, A Ouda, A Kanso
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
A practical version of Wong's watermarking technique
AH Ouda, MR El-Sakka
2004 International Conference on Image Processing, 2004. ICIP'04. 4, 2615-2618, 2004
User Modeling via Anomaly Detection Techniques for User Authentication
IIMA Sulayman, A Ouda
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
Data analytics methods for anomaly detection: Evolution and recommendations
IIMA Sulayman, A Ouda
2018 International Conference on Signal Processing and Information Security …, 2018
Wireless security: securing mobile UMTS communications from interoperation of GSM
E Southern, A Ouda, A Shami
Security and Communication Networks 6 (4), 498-508, 2013
The system can't perform the operation now. Try again later.
Articles 1–20