Ahmed magdi AwadMajan College · Department of Information Technology
Ahmed magdi Awad
About
10
Publications
928
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
52
Citations
Publications
Publications (10)
Recent works have demonstrated the possibility to craft successful statistical attacks against keystroke dynamic biometric password. Those attacks leverage the possibility to capture several keystroke dynamics samples for a given password string, and then extract and use their distributional properties to craft the attack. These approaches are by d...
Introduction: Analytical quality is an essential requirement for best practice in any medical laboratory. Lack of a harmonized approach for sigma
calculation is considered an obstacle in the objective comparability of analytical performance among laboratories adopting sigma metrics. It is
urgently needed that all laboratory professionals interested...
Hacking incidents have become so commonplace that no organization seems out of reach for hackers. Even the US National Security Agency (NSA) seemed to have been the victim of successful hacks, as witnessed by recent public document dumps related to sensitive cyber warfare tools and technologies used by this organization. No day passes by without ne...
One of the trends observed in the emerging threat landscape is the spread of the threats from conventional networks to specialized platforms, including cloud, mobile, Internet of things (IoT), and critical infrastructure networks such as the electrical and utility grids, power and nuclear plants.
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and...
This book constitutes the refereed proceedings of the First International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2017, held in Vancouver, BC, Canada, in October 2017.
The 12 full papers presented together with 1 short paper were carefully reviewed and selected from 43 submissions. This...