Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
geoffrey e hinton
Claudia Calabrese
Hao Mao
Peter Malec
Mohammad Amayreh
Chen Ma
Chang Chih-Chun
M. Vlaskovic
Radu Timofte
Kuanrui Yin
Home
/
Author
/
ABDELKADER H. OUDA
Author Info
Open Visualization
Name
Affiliation
Papers
ABDELKADER H. OUDA
university of western ontario
16
Collaborators
Citations
PageRank
16
93
9.26
Referers
Referees
References
238
284
119
Search Limit
100
284
Publications (16 rows)
Collaborators (16 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Designing Security User Profiles via Anomaly Detection for User Authentication
2
0.46
2020
Human Trait Analysis via Machine Learning Techniques for User Authentication
2
0.46
2020
A Survey Of Wireless Communications for IoT Echo-Systems
1
0.35
2019
Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack.
0
0.34
2017
Optimal and suboptimal resource allocation techniques in cloud computing data centers
1
0.37
2017
Simulating High Availability Scenarios in Cloud Data Centers: A Closer Look.
3
0.37
2015
A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks
2
0.37
2015
Wireless security: securing mobile UMTS communications from interoperation of GSM.
1
0.36
2013
A resource scheduling model for cloud computing data centers.
12
0.92
2013
Resource Allocation in a Network-Based Cloud Computing Environment: Design Challenges.
54
2.34
2013
Solutions to security issues with legacy integration of GSM into UMTS
2
0.43
2011
Security Protocols in Service-Oriented Architecture
3
0.60
2010
Localization and security enhancement of block-based image authentication
7
0.72
2005
A step towards practical steganography systems
1
0.35
2005
A practical version of Wong's watermarking technique
2
0.49
2004
A New Correlation-Based Scheme For Image Authentication
0
0.34
2001
1