Dr Abir Awad
- u_aawad at bournemouth dot ac dot uk
- Principal Academic In Cyber Security
- Keywords:
- PhD Supervisor
Back to top
Biography
Dr. Abir Awad is currently a principal academic in cyber security within the computing department at Bournemouth University. She has more than 18 years’ international experience. She worked in different institutions in UK, Ireland, Canada and France and co-chaired the International Workshop on Trust in Cloud Computing (IWTCC ).
She received her PhD in cryptography in 2009 from Polytech’ Nantes, University of Nantes (Nantes, France). Her main research focuses on the areas of cyber security, cloud security and Trust
Journal Articles
- Awad, M., Leivadeas, A., Awad, A., 2023. Multi-resource predictive workload consolidation approach in virtualized environments. Computer Networks, 237.
- Awad, A., 2020. A new chaos-based cryptosystem for secure transmitted images. IEEE Transactions on Computers.
- Maddodi, G., Awad, A., Awad, D., Awad, M., Lee, B., 2018. A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding. Multimedia Tools and Applications, 77 (19).
- Awad, A., Matthews, A., Qiao, Y., Lee, B., 2018. Chaotic Searchable Encryption for Mobile Cloud Storage. IEEE Transactions on Cloud Computing, 6 (2).
- Awad, A., Saadane, A., 2010. New chaotic permutation methods for image encryption. Iaeng International Journal of Computer Science, 37 (4).
- Awad, A., Awad, D., 2010. Efficient image chaotic encryption algorithm with no propagation error. ETRI Journal, 32 (5).
- Awad, A., 2008. Comparative Study of 1-D Chaotic Generators for Digital Data Encryption. IAENG International Journal of Computer Science.
Books
- AWAD, A.. Cryptographie, Chaos et Images.
Conferences
- Flanagan, K., Fallon, E., Jacob, P., Awad, A., Connolly, P., 2019. 2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data. 2019 16th IEEE Annual Consumer Communications and Networking Conference Ccnc 2019.
- Flanagan, K., Fallon, E., Connolly, P., Awad, A., 2017. Network anomaly detection in time series using distance based outlier detection with cluster density analysis. 2017 Internet Technologies and Applications Ita 2017 Proceedings of the 7th International Conference.
- Flanagan, K., Fallon, E., Awad, A., Connolly, P., 2017. Self-configuring NetFlow anomaly detection using cluster density analysis. International Conference on Advanced Communication Technology Icact.
- Flanagan, K., Fallon, E., Connolly, P., Awad, A., 2017. NetFlow anomaly detection though parallel cluster density analysis in continuous time-series. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 10372 LNCS.
- Awad, A., Kadry, S., Lee, B., Maddodi, G., O'Meara, E., 2016. Integrity assurance in the cloud by combined PBA and provenance. International Conference on Next Generation Mobile Applications Services and Technologies.
- Flanagan, K., Fallon, E., Awad, A., Connolly, P., 2016. Security analytics on asset vulnerability for information abstraction and risk analysis. Proceedings 2016 Uksim Amss 18th International Conference on Computer Modelling and Simulation Uksim 2016.
- Awad, A., Kadry, S., Maddodi, G., Gill, S., Lee, B., 2016. Data leakage detection using system call provenance. Proceedings 2016 International Conference on Intelligent Networking and Collaborative Systems IEEE Incos 2016.
- Awad, A., Lee, B., 2016. A metaphone based chaotic searchable encryption algorithm for border management. Icete 2016 Proceedings of the 13th International Joint Conference on E Business and Telecommunications, 4.
- Lee, B., Awad, A., Awad, M., 2015. Towards Secure Provenance in the Cloud: A Survey. Proceedings 2015 IEEE ACM 8th International Conference on Utility and Cloud Computing Ucc 2015.
- Ahmad, F., Kazim, M., Adnane, A., Awad, A., 2015. Vehicular Cloud Networks: Architecture, Applications and Security Issues. Proceedings 2015 IEEE ACM 8th International Conference on Utility and Cloud Computing Ucc 2015.
- Awad, A., Kadry, S., Lee, B., Zhang, S., 2014. Property based attestation for a secure cloud monitoring system. Proceedings 2014 IEEE ACM 7th International Conference on Utility and Cloud Computing Ucc 2014.
- Awad, A., Matthews, A., Lee, B., 2014. Secure cloud storage and search scheme for mobile devices. Proceedings of the Mediterranean Electrotechnical Conference MELECON.
- Rostom, R., Bakhache, B., Salami, H., Awad, A., 2014. Quantum cryptography and chaos for the transmission of security keys in 802.11 networks. Proceedings of the Mediterranean Electrotechnical Conference MELECON.
- Awad, A., Miri, A., 2012. A new image encryption algorithm based on a chaotic DNA substitution method. IEEE International Conference on Communications.
- Awad, A., Saadane, A., 2010. Efficient chaotic permutations for image encryption algorithms. Wce 2010 World Congress on Engineering 2010, 1.
- Awad, A., 2010. Chaos-Based Cryptosystem for Secure Transmitted Images. In: TEMU 14/07/2010 Greece.
- Awad, A., 2006. Optimum Chaotic Quantized Sequences for Chip-Synchronous DS-CDMA. In: MCSEAI 07/12/2006 Morocco.
Social Media Links
The data on this page was last updated at 05:00 on February 18, 2026.