Abdelshakour Abuzneid

Abdelshakour Abuzneid
University of Bridgeport · School of Engineering

Ph.D.

About

80
Publications
30,159
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
788
Citations
Citations since 2016
44 Research Items
735 Citations
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
Additional affiliations
January 2005 - present
University of Bridgeport
Position
  • Director of Systems and Engineering Labs
January 1997 - present
University of Bridgeport
Position
  • Professor (Associate)

Publications

Publications (80)
Article
Radio frequency identification (RFID) is the fastest growing technology in the world today. Thus, wireless communication between tags and readers became an integral part of retail products, library books, personal identifications, and healthcare. The RFID system can provide security features to the data transferred along the network to maintain dat...
Article
Full-text available
According to the Center for Disease Control and Prevention (CDC), the average human life expectancy is 78.8 years. Specifically, 3.2 million deaths are reported yearly due to heart disease, cancer, Alzheimer’s disease, diabetes, and COVID-19. Diagnosing the disease is mandatory in the current way of living to avoid unfortunate deaths and maintain a...
Article
Full-text available
Cardiovascular diseases have been reported to be the leading cause of mortality across the globe. Among such diseases, Myocardial Infarction (MI), also known as “heart attack”, is of main interest among researchers, as its early diagnosis can prevent life threatening cardiac conditions and potentially save human lives. Analyzing the Electrocardiogr...
Article
Full-text available
Recent technology advances in CMOS image sensors (CIS) enable their utilization in the most demanding of surveillance fields, especially visual surveillance and intrusion detection in intelligent surveillance systems, aerial surveillance in war zones, Earth environmental surveillance by satellites in space monitoring, agricultural monitoring using...
Article
Full-text available
Electrocardiogram (ECG) gives essential information about different cardiac conditions of the human heart. Its analysis has been the main objective among the research community to detect and prevent life threatening cardiac circumstances. Traditional signal processing methods, machine learning and its subbranches, such as deep learning, are popular...
Article
Telemedicine could be a key to control the world-wide disruptive and spreading novel coronavirus disease (COVID-19) pandemic. The COVID-19 virus directly targets the lungs, leading to pneumonia-like symptoms and shortness of breath with life-threatening consequences. Despite the fact that self-quarantine and social distancing are indispensable duri...
Article
Full-text available
Despite the successful contributions in the field of network intrusion detection using machine learning algorithms and deep networks to learn the boundaries between normal traffic and network attacks, it is still challenging to detect various attacks with high performance. In this paper, we propose a novel mathematical model for further development...
Article
Full-text available
Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID sys...
Conference Paper
Full-text available
Air pollution has been one of rising issues that are affecting people's health around the world. The amount of air contaminants is enough to cause serious health diseases such as stroke, cancer, and respiratory infections which, in the long term, leads to premature deaths. To alleviate this risk, it comes first to allow people to know the dangerous...
Conference Paper
Full-text available
Radio frequency identification (RFID) is the fastest growing and widely emerging technology in the world today. Thus, wireless communication between single/multiple tags and readers became an integral part of retail products, library books, passports, driver licenses, medical devices, and so on. The RFID system can provide security features to the...
Poster
Full-text available
Faculty Research Day, University of Bridgeport Faculty Competitive Poster
Article
Full-text available
The security of networked systems has become a critical universal issue that influences individuals, enterprises and governments. The rate of attacks against networked systems has increased dramatically, and the tactics used by the attackers are continuing to evolve. Intrusion detection is one of the solutions against these attacks. A common and ef...
Article
Recently, cybersecurity threats have increased dramatically and the techniques used by the attackers continue to evolve and become ingenious during the attack. Moreover, the complexity and frequent occurrence of imbalanced class distributions in most datasets indicate the need for extra research efforts. The objective of this paper is to utilize va...
Conference Paper
Full-text available
Medication errors are now rapidly increasing that result in a serious impact on patients Safety. A lot of automated techniques have come up using the Radio-Frequency Identification (RFID) Technology that has now been successfully implemented in hospitals and healthcare institutions. The data that is being transmitted is highly sensitive and has to...
Article
Full-text available
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID comm...
Conference Paper
Full-text available
Abstract: Abstract: There are many articles presented in the literature on teaching e-Learning courses. However, teaching a course in computer science and engineering where it involves hardware is a bit innovative. This work presents a complete Distance Learning (DL) course to teach Internet of Things (IoT). We propose a course that can fit both un...
Article
Full-text available
Source anonymity in wireless sensor networks (WSNs) becomes a real concern in several applications such as tracking and monitoring. A global adversary that has sophisticated resources, high computation and full view of the network is an obvious threat to such applications. The network and applications need to be protected and secured to provide the...
Article
Full-text available
Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and pri...
Poster
Full-text available
The Electronic Product Code Generation 2 (EPC GEN2) protocol does not have any technique to authenticate the Reader before it gives access to the Tag's memory. In this paper, we use security implementation and mutual authentication between tag and reader of three different lightweight ciphers. We used Hummingbird (HB), PRESENT, and Extended Tiny En...
Poster
Full-text available
The growing demand to organize resourceful ways of identification has made "Radio Frequency Identification (RFID)" technology universal. One of the key problems in RFID is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed, an...
Conference Paper
The security of Wireless Sensor Networks (WSNs) is vital in several applications such as the tracking and monitoring of endangered species such as pandas in a national park or soldiers in a battlefield. This kind of applications requires the anonymity of the source, known as Source Location Privacy (SLP). The main aim is to prevent an adversary fro...
Poster
Full-text available
Many of Wireless Sensor Networks (WSNs) applications such as tracking and monitoring endangered species, and/or military applications in areas of interest require anonymity of the origin known as Source Location Privacy (SLP). The aim is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic on the networ...
Poster
Full-text available
Source Anonymity in WSNs against Global Adversary
Conference Paper
Image processing frameworks are focusing towards the use of computer vision techniques in human PC collaboration and feeling investigation through a space mapping between the constant feeling and an arrangement of discrete feeling classes. While accomplishing great execution, the most productive component space and characterization system for Face...
Article
Full-text available
Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in th...
Conference Paper
Many of Wireless Sensor Networks (WSNs) applications such as tracking and monitoring endangered species, and/or military applications in areas of interest require anonymity of the origin known as Source Location Privacy (SLP). The aim is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic on the networ...
Article
Full-text available
Image processing frameworks are focusing towards the use of computer vision techniques in human PC collaboration and feeling investigation through a space mapping between the constant feeling and an arrangement of discrete feeling classes. While accomplishing great execution, the most productive component space and characterization system for Face...
Article
Full-text available
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In...
Conference Paper
Full-text available
There have been a plethora of researches focusing on providing privacy for the base station in Wireless Sensor Networks. One of the proposed solutions is using dummy data sources, introducing dummy traffic to obfuscate real traffic. This makes the adversary no longer able to see difference between real and fake traffic. In this solution every node...
Conference Paper
Full-text available
Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the sys...
Conference Paper
Full-text available
crucial methods are introduced to deploy the majority networks to acquire the required data. Because of the defect of only the single data encryption and the use of famous encryption algorithm, which was not improved in traditional methods of the registration process, a combined encryption algorithm is proposed in this thesis[1- 4]. This proposed a...
Conference Paper
Full-text available
The recent discovery of Internet Protocol Version 6 (IPv6) network attacks have been an interesting topic in the world of network security. Due to the fact IPv6 is still in the transition of being the main internet protocol, a lot research has been done however the implementation of it may take longer than most people thought. When it comes to bein...
Conference Paper
Full-text available
Packet filtering firewall is to view the data flows through packet header, which determines the fate of the entire package. It may decide to discard (DROP) this package, or may accept (ACCEPT) package (let the packet through), may also perform other more complex actions. The traditional packet filtering firewall will match the new client request wi...
Conference Paper
Full-text available
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is an executable file in the windows operating system. These executable files will have certain static and runtime characteristics. Multiple windows system process will be called whenever a Trojan horse tries to execute any operation on the system. In th...
Conference Paper
crucial methods are introduced to deploy the majority networks to acquire the required data. Because of the defect of only the single data encryption and the use of famous encryption algorithm, which was not improved in traditional methods of the registration process, a combined encryption algorithm is proposed in this thesis[1-4]. This proposed al...
Conference Paper
Full-text available
Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a phenomenon and represent it in a form of data. There are many applications for WSNs such as object tracking and monitoring where the objects need protection. Providing an efficient location privacy solution would be challenging to achieve due to the...
Article
Full-text available
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In add...
Conference Paper
Full-text available
Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such as motion, temperature, and humidity. Sensors represent what they sense in data format. Providing an efficient end-to-end privacy solution would be a challenging task due to the open nature of the WSN. The key schemes needed for end-to-end location priv...
Conference Paper
Full-text available
Wireless sensor network (WSN) is built of hosts called sensors which can sense a phenomenon such as motion, temperature, and humidity. Sensors represent what they sense in data format. Providing an efficient end-to-end privacy solution would be a challenging task due to the open nature of the WSN. The key schemes needed for end-to-end location priv...
Chapter
When Wireless sensor Networks are composed of a huge number of sensor nodes with limited energy resources, designing an energy efficient protocol will become a critical key issue that needs to be dealt with in order to expand the life span of the entire network. This paper proposes adding security features to the TEEN (Threshold sensitive Energy Ef...
Article
Full-text available
Wireless Sensor Networks, referred to as WSNs, are made up of various types of sensor nodes. Recentdevelopments in micro electro-mechanical technology have given rise to new integrated circuitry,microprocessor hardware and nano technology, wireless technology, and advanced networking routingprotocols. Hospitals and health service facilities, the ar...
Article
Full-text available
Wireless Capsule Endoscopy (WCE) is device to detect abnormalities in colon,esophagus,small intestinal and stomach, to distinguish bleeding in WCE images from non bleeding is a hard job by human reviewing and very time consuming. Consequently, automation for classifying bleeding frames not only will expedite the process but will reduce the burden o...
Chapter
This paper evaluates error reduction in wireless communication networks. We have reviewed selective acknowledgement schemes to provide reliable end-to-end communication on wireless-link. TCP (Transport control protocol) has poor performance over wireless-link. Due to high error rate, page response time (sec), and retransmission count over wireless-...
Conference Paper
The use of sensor networks is increasing day by day; which offer more research topics to be discuss and modified; one of these topics is the power consumption that has to be reduced as possible, where the resources are limited; another topic is the security level that should be offer by such kind of networks. Clustered networks have been proposed i...
Conference Paper
-This work aims at providing a proof of concept for multiplexing in Bluetooth by using traditional Time Division and Frequency Division multiplexing overlays upon frequency hopping spread spectrum (Bluetooth Modulation) by means of a functional simulation. This overlaid multiplexing technique can simplify the point to multi-point connections, espec...
Chapter
DES, an old but very useful algorithm of encryption, has been endangered to be replaced in the latest years by the more advanced and competent algorithms as we can exemplify: Triple DES and AES (Advanced Encryption Standard) both from the same category - block oriented encryption algorithms. Obviously, the more advanced the technology is, the requi...
Article
Full-text available
The use of sensor networks is increasing day by day; which offer more research topics to be discuss and modified; one of these topics is the power consumption that has to be reduced as possible, where the resources are limited; another topic is the security level that should be offer by such kind of networks. Clustered networks have been proposed i...
Conference Paper
Full-text available
After September eleven the idea of Public Safety became a key policy goal for every governmental, education and commercial institute. Currently, most of the buildings are equipped with infrastructure for internal and external communication and networking. By being able to utilize the existing infrastructure of wireless / wired network in a building...
Conference Paper
As the field of the wired networking communications developed, so did the mechanisms for the reliable delivery of messages from one user to another. With the advance of the wireless communications, these mechanisms had to be adjusted, or sometimes developed anew. Vehicular ad hoc networks present themselves as a specific example, where the mechanis...
Conference Paper
The Border Gateway Protocol (BGP) is the path vector protocol that routes inter-domain traffic, connecting Autonomous Systems (AS’s) together to form the decentralized backbone of the Internet. In the event of a network failure, BGP can take minutes to converge under default settings. With the route withdrawal rate limit (WRATE) change in the new B...
Conference Paper
The calamities occurs unfortunately in the neighbourhood, which deteriorates the communication infrastructure completely. To recover completely from this disaster the wireless communication infrastructure should be replaced immediately, so that it can be in mobility everywhere and at the same time be connected to the headquarters base station as we...