Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 47) Show all publications
Munodawafa, F. & Awad, A. I. (2018). Security risk assessment within hybrid data centers: a case study of delay sensitive applications. Journal of Information Security and Applications, 43, 61-72
Open this publication in new window or tab >>Security risk assessment within hybrid data centers: a case study of delay sensitive applications
2018 (English)In: Journal of Information Security and Applications, ISSN 2214-2134, E-ISSN 2214-2126, Vol. 43, p. 61-72Article in journal (Refereed) Published
Abstract [en]

Data centers are considered a critical form of infrastructure in today’s information society. They are at the core of the cloud computing and services revolution, which has changed the business models on how organizations deal with IT infrastructure costs. The hybrid data center architecture incorporates both legacy and fully virtualized infrastructures. On the one hand, the composite infrastructure has improved resource utilization and consolidation by adding flexibility and scalability factors, making the data center more cost effective and more agile. On the other hand, the hybrid infrastructure has imposed a new set of security challenges that need to be brought into focus. The lack of resource availability can be a great risk for delay sensitive applications such as voice over IP (VoIP) and online gaming when cloud computing is the deployment model. This study addresses the emerging risk problem by conducting a comprehensive security risk assessment using the NIST national vulnerability database (NVD) combined with EBIOS risk analysis and evaluation methodology. This study focuses on resource availability problem emanating from delay variations and queuing mechanisms in virtualized systems and its impact on delay sensitive applications. The study argues for the existence of availability risk within the hybrid data center infrastructure, which can deteriorate the performance of delay sensitive applications. Security remedial and countermeasures to the identified security risks are suggested in an extended discussion at the end of the study.

Place, publisher, year, edition, pages
Elsevier, 2018
Keywords
Data centers, Virtualization, Security risk assessment, Infrastructure flexibility and scalability, Network resources availability, Delay sensitive applications
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-71366 (URN)10.1016/j.jisa.2018.10.008 (DOI)2-s2.0-85055587072 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-10-29 (svasva)

Available from: 2018-10-29 Created: 2018-10-29 Last updated: 2018-11-06Bibliographically approved
Khaled Abd-Ellah, M., Awad, A. I., Khalaf, A. A. M. & Hamed, H. F. A. (2018). Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks. EURASIP Journal on Image and Video Processing, 2018, Article ID 97.
Open this publication in new window or tab >>Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks
2018 (English)In: EURASIP Journal on Image and Video Processing, ISSN 1687-5176, E-ISSN 1687-5281, Vol. 2018, article id 97Article in journal (Refereed) Published
Abstract [en]

Brain tumour is a serious disease, and the number of people who are dying due to brain tumours is increasing. Manual tumour diagnosis from magnetic resonance images (MRIs) is a time consuming process and is insufficient for accurately detecting, localizing, and classifying the tumour type. This research proposes a novel two-phase multi-model automatic diagnosis system for brain tumour detection and localization. In the first phase, the system structure consists of preprocessing, feature extraction using a convolutional neural network (CNN), and feature classification using the error-correcting output codes support vector machine (ECOC-SVM) approach. The purpose of the first system phase is to detect brain tumour by classifying the MRIs into normal and abnormal images. The aim of the second system phase is to localize the tumour within the abnormal MRIs using a fully designed five-layer region-based convolutional neural network (R-CNN). The performance of the first phase was assessed using three CNN models, namely, AlexNet, Visual Geometry Group (VGG)-16, and VGG-19, and a maximum detection accuracy of 99.55% was achieved with AlexNet using 349 images extracted from the standard Reference Image Database to Evaluate Response (RIDER) Neuro MRI database. The brain tumour localization phase was evaluated using 804 3D MRIs from the Brain Tumor Segmentation (BraTS) 2013 database, and a DICE score of 0.87 was achieved. The empirical work proved the outstanding performance of the proposed deep learning-based system in tumour detection compared to other non-deep-learning approaches in the literature. The obtained results also demonstrate the superiority of the proposed system concerning both tumour detection and localization.

Place, publisher, year, edition, pages
Springer, 2018
Keywords
Brain tumour diagnosis, MRI segmentation, Tumour detection and localization, Convolutional neural networks (CNNs)
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-71054 (URN)10.1186/s13640-018-0332-4 (DOI)000446234200001 ()2-s2.0-85054149973 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-10-01 (svasva)

Available from: 2018-10-01 Created: 2018-10-01 Last updated: 2018-10-22Bibliographically approved
Hassan, A. M. & Awad, A. I. (2018). Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges. IEEE Access, 6, 36428-36440
Open this publication in new window or tab >>Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges
2018 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 36428-36440Article in journal (Refereed) Published
Abstract [en]

The Internet of Things (IoT) could become an important aspect of urban life in the next decade. In the IoT paradigm, various information and communication technologies (ICTs) are used in concert to substantially reduce urban problems. Smart cities and ubiquitous cities will adopt ICTs in the urban development process; however, IoT-based cities will experience considerably stronger effects than those that adopt conventional ICTs. IoT cities allow urban residents and “things”to be connected to the Internet by virtue of the extension of the Internet Protocol from IPv4 to IPv6 and of cutting-edge device and sensor technology. Therefore, the urban transition resulting from the influence of IoT may be a critical issue. The privacy-related vulnerabilities of IoT technologies may negatively affect city residents. Furthermore, disparities in the spread of IoT systems across different countries may allow some countries to subvert the privacy of other countries' citizens. The aim of this paper is to identify the potential prospects and privacy challenges that will emerge from IoT deployment in urban environments. This paper reviews the prospects of and barriers to IoT implementation at the regional, city, and residential scales from the perspectives of security and privacy. The IoT technology will be a continual presence in life in general and in urban life in particular. However, the adoption of the IoT paradigm in cities will be complicated due to the inherent presence of unsecured connections. Moreover, the IoT systems may rob people of some of their humanity, infringing on their privacy, because people are also regarded as “things”in the IoT paradigm. Given the social trepidation surrounding IoT implementation, local and international associations related to IoT privacy, and legislation and international laws, are needed to maintain the personal right to privacy and to satisfy the demands of institutional privacy in urban contexts.

Place, publisher, year, edition, pages
IEEE, 2018
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-69008 (URN)10.1109/ACCESS.2018.2838339 (DOI)000439022000103 ()2-s2.0-85047198293 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-08-06 (rokbeg)

Available from: 2018-05-31 Created: 2018-05-31 Last updated: 2018-08-16Bibliographically approved
Abd-Ellah, M. K., Awad, A. I., Khalaf, A. A. M. & Hamed, H. F. A. (2017). Design and implementation of a computer-aided diagnosis system for brain tumor classification. In: 2016 28th International Conference on Microelectronics (ICM): . Paper presented at 28th International Conference on Microelectronics (ICM), Cairo, Egypt, 17-20 Dec. 2016 (pp. 73-76). , Article ID 7847911.
Open this publication in new window or tab >>Design and implementation of a computer-aided diagnosis system for brain tumor classification
2017 (English)In: 2016 28th International Conference on Microelectronics (ICM), 2017, p. 73-76, article id 7847911Conference paper, Published paper (Refereed)
Abstract [en]

Computer-aided diagnosis (CAD) systems have become very important for the medical diagnosis of brain tumors. The systems improve the diagnostic accuracy and reduce the required time. In this paper, a two-stage CAD system has been developed for automatic detection and classification of brain tumor through magnetic resonance images (MRIs). In the first stage, the system classifies brain tumor MRI into normal and abnormal images. In the second stage, the type of tumor is classified as benign (Noncancerous) or malignant (Cancerous) from the abnormal MRIs. The proposed CAD ensembles the following computational methods: MRI image segmentation by K-means clustering, feature extraction using discrete wavelet transform (DWT), feature reduction by applying principal component analysis (PCA). The two-stage classification has been conducted using a support vector machine (SVM). Performance evaluation of the proposed CAD has achieved promising results using a non-standard MRIs database.

National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-61988 (URN)10.1109/ICM.2016.7847911 (DOI)000399706600019 ()2-s2.0-85014917541 (Scopus ID)978-1-5090-5721-4 (ISBN)
Conference
28th International Conference on Microelectronics (ICM), Cairo, Egypt, 17-20 Dec. 2016
Available from: 2017-02-14 Created: 2017-02-14 Last updated: 2018-03-09Bibliographically approved
Grzenda, M., Furtak, J., Legierski, J. & Awad, A. I. (2017). Network Architectures, Security, and Applications: An Introduction. In: Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski (Ed.), Advances in Network Systems: Architectures, Security, and Applications (pp. 1-10). Berlin: Springer Berlin/Heidelberg
Open this publication in new window or tab >>Network Architectures, Security, and Applications: An Introduction
2017 (English)In: Advances in Network Systems: Architectures, Security, and Applications / [ed] Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski, Berlin: Springer Berlin/Heidelberg, 2017, p. 1-10Chapter in book (Refereed)
Abstract [en]

Owing to the ever growing communication systems, modern networks currently encompass a wide range of solutions and technologies, including wireless and wired networks and provide basis for network systems from multiple partly overlapping domains such as the Internet of Things (IoT), cloud services, and network applications. This appears in numerous active research areas with particular attention paid to the architecture and security of network systems. In parallel, novel applications are developed, in some cases strongly linked to rapidly developing network-based data acquisition and processing frameworks. This chapter presents a general introduction to the topics of network architectures, security, and applications in addition to short descriptions of the chapters included in this volume

Place, publisher, year, edition, pages
Berlin: Springer Berlin/Heidelberg, 2017
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 461
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-61302 (URN)10.1007/978-3-319-44354-6_1 (DOI)2-s2.0-85007502875 (Scopus ID)978-3-319-44352-2 (ISBN)978-3-319-44354-6 (ISBN)
Available from: 2017-01-02 Created: 2017-01-02 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. & Andrzej, B. (Eds.). (2017). Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017). Paper presented at 1st International Conference on Security, Privacy, and Trust (INSERT'17), Prague, Czech Republic, 3-6 September, 2017. Prague, Czech Republic: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017)
2017 (English)Conference proceedings (editor) (Refereed)
Abstract [en]

https://fedcsis.org/2017/insert

Place, publisher, year, edition, pages
Prague, Czech Republic: Institute of Electrical and Electronics Engineers (IEEE), 2017
Series
Annals of Computer Science and Information Systems, ISSN 2300-5963 ; 11
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-63720 (URN)10.15439/978-83-946253-7-5 (DOI)978-83-946253-7-5 (ISBN)
Conference
1st International Conference on Security, Privacy, and Trust (INSERT'17), Prague, Czech Republic, 3-6 September, 2017
Note

2018-02-23: Redaktör för konferensen 1st International Conference on Security, Privacy, and Trust (INSERT'17) som ingår i Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017). (marisr, andbra)

Available from: 2017-06-05 Created: 2017-06-05 Last updated: 2018-03-09Bibliographically approved
Okoh, E., Makame, H. M. & Awad, A. I. (2017). Toward online education for fingerprint recognition: A proof-of-concept web platform. Information Security Journal, 26(4), 186-197
Open this publication in new window or tab >>Toward online education for fingerprint recognition: A proof-of-concept web platform
2017 (English)In: Information Security Journal, ISSN 1939-3555, E-ISSN 1939-3547, Vol. 26, no 4, p. 186-197Article in journal (Refereed) Published
Abstract [en]

Recent advances in information and communication technology (ICT) have pushed education systems into the online paradigm. Although fingerprint recognition has received considerable attention from researchers, the concept of creating online or distance education systems for fingerprint recognition systems is a valid problem that requires further investigation. This article addresses the problem and presents a web platform for online education of a fingerprint recognition system. This study focused on the technical design and implementation of the web platform solely as a proof of concept to illustrate the possibility of creating distance education for fingerprint recognition. The developed platform offers students a way to gain knowledge about the full range of fingerprint recognition system technology. The significance of using a web platform stems from the need to supplement students’ theoretical knowledge with practical hands-on experience with information security in general and with fingerprint recognition in particular. Demonstrations such as fingerprint image enhancement and fingerprint feature extraction are included in the current platform prototype. Plots of fingerprint recognition performance curves such as false match rate (FMR) and false non-match rate (FNMR) as functions of the matching threshold curve, the receiver operating characteristic (ROC) curve, and the detection error trade-off (DET) curve are plotted as part of the platform. From a technical viewpoint, the platform was successfully implemented; however, its educational impact needs further evaluation.

Place, publisher, year, edition, pages
Taylor & Francis, 2017
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-64279 (URN)10.1080/19393555.2017.1329462 (DOI)2-s2.0-85021100806 (Scopus ID)
Note

Validerad;2017;Nivå 2;2017-09-07 (andbra)

Available from: 2017-06-20 Created: 2017-06-20 Last updated: 2018-05-04Bibliographically approved
King, J. & Awad, A. I. (2016). A Distributed Security Mechanism for Resource-Constrained IoT Devices (ed.). Paper presented at . Informatica, 40(1), 133-143
Open this publication in new window or tab >>A Distributed Security Mechanism for Resource-Constrained IoT Devices
2016 (English)In: Informatica, ISSN 0350-5596, E-ISSN 1854-3871, Vol. 40, no 1, p. 133-143Article in journal (Refereed) Published
Abstract [en]

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resource constrained in terms of secure communication. This paper provides a distributed security mechanism that targets Class-0 IoT devices. The research goal is to secure the entire data path in two segments, device-to-gateway and gateway-to-server data communications. The main concern in the provided solution is that lighter security operations with minimal resource requirements are performed in the IoT device, while heavier tasks are performed in the gateway side. The proposed mechanism utilizes a symmetric encryption for data objects combined with the native wireless security to offer a layered security technique between the device and the gateway. In the offered solution, the IoT gateways provide additional protection by securing data using Transport Layer Security (TLS). Real-time experimental evaluations have demonstrated the applicability of the proposed mechanism pertaining to the security assurance and the consumed resources of the target Class-0 IoT devices.

National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-9632 (URN)84b7b131-da76-4410-80c0-9867bb35a477 (Local ID)84b7b131-da76-4410-80c0-9867bb35a477 (Archive number)84b7b131-da76-4410-80c0-9867bb35a477 (OAI)
Note
Validerad; 2016; Nivå 2; 20160317 (ismawa)Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. (2016). Aktivitet: Concurrency and Computation: Practice and Experience (ed.). Paper presented at .
Open this publication in new window or tab >>Aktivitet: Concurrency and Computation: Practice and Experience
2016 (English)Other (Other (popular science, discussion, etc.))
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-36804 (URN)f6d1b853-e19f-4c7c-9d36-2d3e31de1712 (Local ID)f6d1b853-e19f-4c7c-9d36-2d3e31de1712 (Archive number)f6d1b853-e19f-4c7c-9d36-2d3e31de1712 (OAI)
Note
Startdatum: 01/01/2016; Roll: Vetenskaplig granskare; Typ: Fortlöpande redaktionsarbete / peer review - Peer review av manuskriptAvailable from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. (2016). Aktivitet: Health Information Science and Systems (HISS) (ed.). Paper presented at .
Open this publication in new window or tab >>Aktivitet: Health Information Science and Systems (HISS)
2016 (English)Other (Other (popular science, discussion, etc.))
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-36335 (URN)0644bf9a-427f-4d65-9dd0-67e370a95da7 (Local ID)0644bf9a-427f-4d65-9dd0-67e370a95da7 (Archive number)0644bf9a-427f-4d65-9dd0-67e370a95da7 (OAI)
Note
Startdatum: 01/01/2016; Slutdatum: 01/01/2016; Roll: Redaktör; Typ: Fortlöpande redaktionsarbete / peer review - Redaktör för vetenskaplig tidskriftAvailable from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-03-09Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-3800-0757

Search in DiVA

Show all publications