Ahmed Awad E. Ahmed

Ahmed Awad E. Ahmed is a Senior Scientist at the Electrical and Computer Engineering Department, University of Victoria. He is a member of the Security and Object Technology (ISOT) Research Laboratory at the University of Victoria and the principal investigator of Biotracker, a new intrusion detection system based on biometrics (http://www.isot.ece.uvic.ca/projects/biotracker). Dr. Ahmed worked as a Software Design Engineer, Project Manager, and Quality Assurance/Security Consultant in a number of leading firms. He is currently the CTO of Plurilock Security Solutions Inc. Dr. Ahmed received his Ph.D. in Electrical and Computer Engineering from the University of Victoria, Victoria, BC, Canada in 2008. His Ph.D. dissertation introduces new trends in security monitoring through human computer interaction devices. Dr. Ahmed completed his BSc and MSc degrees at the Electrical and Computer Engineering Department, Ain Shams University, Cairo, Egypt in 1992, and 1997 respectively.

Publications

Performance Metrics and Models for Continuous Authentication Systems
Ahmed A.E. Ahmed, Issa Traoré. © 2014. 17 pages.
Continuous Authentication (CA) systems represent a new class of security systems that are increasingly the focus of much attention in the research literature. CA departs from the...
Introduction to Continuous Authentication
Issa Traoré, Ahmed Awad E. Ahmed. © 2013. 21 pages.
Continuous Authentication (CA) systems represent a new generation of security mechanisms that continuously monitor user behavior and use this as basis to re-authenticate...
Continuous Authentication Using Biometrics: Data, Models, and Metrics
Issa Traore, Ahmed Awad E. Ahmed. © 2012. 294 pages.
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment....
Introduction to Continuous Authentication
Issa Traoré, Ahmed Awad E. Ahmed. © 2012. 22 pages.
Continuous Authentication (CA) systems represent a new generation of security mechanisms that continuously monitor user behavior and use this as basis to re-authenticate...
Performance Metrics and Models for Continuous Authentication Systems
Ahmed Awad E. Ahmed, Issa Traoré. © 2012. 17 pages.
Continuous Authentication (CA) systems represent a new class of security systems that are increasingly the focus of much attention in the research literature. CA departs from the...
Mouse Dynamics Biometric Technology
Ahmed Awad E. Ahmed, Issa Traore. © 2010. 17 pages.
In this chapter the Authors introduce the concepts behind the mouse dynamics biometric technology, present a generic architecture of the detector used to collect and process...
Employee Surveillance Based on Free Text Detection of Keystroke Dynamics
Ahmed Awad E. Ahmed. © 2009. 17 pages.
In recent years, many studies have highlighted the unprecedented growth in security threats from multiple and varied sources faced by corporate, as well as governmental...