Image Feature Detectors and Descriptors: Foundations and Applications AI Awad, M Hassaballah Studies in Computational Intelligence. Springer International Publishing …, 2016 | 538* | 2016 |
Intrusion detection systems for IoT-based smart environments: a survey MF Elrawy, AI Awad, HFA Hamed Journal of Cloud Computing 7 (1), 1-20, 2018 | 421 | 2018 |
Cyber and physical security vulnerability assessment for IoT-based smart homes B Ali, AI Awad sensors 18 (3), 817, 2018 | 417 | 2018 |
Deep Learning in Computer Vision: Principles and Applications M Hassaballah, AI Awad CRC Press, 2020 | 306* | 2020 |
Advances in Security of Information and Communication Networks AI Awad, AE Hassanien, K Baba Communications in Computer and Information Science 381, 2013 | 295* | 2013 |
A review on brain tumor diagnosis from MRI images: Practical implications, key achievements, and lessons learned MK Abd-Ellah, AI Awad, AAM Khalaf, HFA Hamed Magnetic Resonance Imaging 61, 300-318, 2019 | 254 | 2019 |
From classical methods to animal biometrics: A review on cattle identification and tracking AI Awad Computers and Electronics in Agriculture 123, 423-435, 2016 | 175 | 2016 |
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations AE Hassanien, TH Kim, J Kacprzyk, AI Awad Springer Berlin Heidelberg, 2014 | 158* | 2014 |
Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks MK Abd-Ellah, AI Awad, AAM Khalaf, HFA Hamed EURASIP Journal on Image and Video Processing 2018 (1), 1-10, 2018 | 143 | 2018 |
A novel image steganography method for industrial internet of things security M Hassaballah, MA Hameed, AI Awad, K Muhammad IEEE Transactions on Industrial Informatics 17 (11), 7743-7751, 2021 | 100 | 2021 |
A Distributed Security Mechanism for Resource-Constrained IoT Devices J King, AI Awad Informatica 40 (1), 133-143, 2016 | 92 | 2016 |
Design and implementation of a computer-aided diagnosis system for brain tumor classification MK Abd-Ellah, AI Awad, AAM Khalaf, HFA Hamed 2016 28th International conference on microelectronics (ICM), 73-76, 2016 | 84 | 2016 |
An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques MA Hameed, M Hassaballah, S Aly, AI Awad IEEE Access 7, 185189-185204, 2019 | 82 | 2019 |
A robust cattle identification scheme using muzzle print images AI Awad, HM Zawbaa, HA Mahmoud, EHHA Nabi, RH Fayed, ... 2013 Federated conference on computer science and information systems, 529-534, 2013 | 82 | 2013 |
Authentication and identity management of IoHT devices: achievements, challenges, and future directions M Mamdouh, AI Awad, AAM Khalaf, HFA Hamed Computers & Security 111, 102491, 2021 | 79 | 2021 |
Security in Cyber-Physical Systems: Foundations and Applications AI Awad, S Furnell, M Paprzycki, SK Sharma Springer International Publishing 339, XV, 315, 2021 | 65* | 2021 |
Urban transition in the era of the internet of things: Social implications and privacy challenges AM Hassan, AI Awad IEEE Access 6, 36428-36440, 2018 | 56 | 2018 |
Advances in network systems: architectures, security, and applications M Grzenda, AI Awad, J Furtak, J Legierski Springer, 2016 | 52* | 2016 |
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications AI Awad, J Abawajy | 51* | 2021 |
Intelligent authentication of 5G healthcare devices: A survey AH Sodhro, AI Awad, J van de Beek, G Nikolakopoulos Internet of Things 20, 100610, 2022 | 50 | 2022 |