Biography
Dr. Abdelkader Ouda is an accomplished academic and industry professional with over three decades of experience in computer science, software engineering, and information security. He earned his B.Sc. (Hons) and M.Sc. degrees in Computer Science and Pure Mathematics from Ain Shams University, Cairo, Egypt, in 1986 and 1993, respectively. In 2005, he completed his Ph.D. in Computer Science at the University of Western Ontario, Canada. Currently, Dr. Ouda holds the position of Associate Professor in the Department of Electrical and Computer Engineering at Western University, where he has been teaching and conducting research for more than 20 years. As a professional engineer, he brings a wealth of practical knowledge to his academic role.
Research Focus
Dr. Ouda's research interests lie in the field of information security, with particular emphasis on:
He leads the Information and Computer Networks Security (iCNS) Research Laboratory at Western University, overseeing cutting-edge research in these areas.
Industry Experience
Prior to his academic career, Dr. Ouda spent over 14 years in the software industry, gaining extensive experience in various aspects of software development. His professional background includes:
This rich industrial experience allows Dr. Ouda to bridge the gap between academic theory and real-world practice, providing students with valuable insights into the day-to-day work of software engineers—an aspect that can be challenging to convey in a traditional classroom setting. Dr. Ouda's unique combination of academic expertise and industry knowledge makes him a valuable asset to both the research community and his students at Western University.
Education
Ph.D. Degree |
|
---|---|
|
|
|
|
|
|
|
London, Ontario, Canada |
|
|
|
|
|
|
Master's of Computer Science |
|
---|---|
Period: | September 1989 to August 1993 |
Institution: | Ain Shams University |
Discipline: | Pure Mathematics and Computer Science |
Location: | Cairo, Egypt |
Thesis: | On Public-key Encryption |
Supervisor: | Dr. Fayed Faeq Ghaleb |
Research Focus: | Cryptography, Number Theory |
Experience
Dr. Abdelkader Ouda brings over three decades of extensive experience in academia, software engineering, and project management, demonstrating
a strong commitment to advancing education, research, and practical applications in engineering and computing. Currently serving as an Associate
Professor in Electrical and Computer Engineering at Western University since 2019, Dr. Ouda is deeply involved in research, teaching, and service.
He also designed and administers the CEAMS application, a software system that facilitates outcomes-based assessment and continuous program
improvement for Canadian engineering universities, playing a pivotal role in accreditation processes.
Previously, Dr. Ouda held several leadership and advisory roles at Western University. From 2015 to 2021, he served as the Director of the Software
Engineering Program, overseeing curriculum development and program management. Concurrently, he acted as an Academic Counselor from 2011 to 2021,
advising undergraduate students in software engineering on academic planning and success strategies while maintaining a focus on professional
integrity and confidentiality. His tenure as an Assistant Professor from 2006 to 2019 further highlights his dedication to education and research.
Dr. Ouda’s professional experience extends beyond academia into industry-focused software development and project management. As a Project Manager
and IT Specialist Advisor at Western University from 2012 to 2018, he led multiple full-stack development projects, including the Self Start Body
Smart online physiotherapy clinic and a comprehensive student admission system. These projects utilized cutting-edge web technologies such as
Node.js, MongoDB, Angular, and Ember.js, showcasing his expertise in modern software engineering practices. Earlier in his career, he managed
industry-sponsored projects like the Fire-Alert operational management system and collaborated with Uniiverse Collaborative Lifestyle Inc. on
innovative application extensions.
His international experience includes serving as a Software Project Manager for the Naturalization and Residence Department in Al-Ain City, UAE
(1996–1999), where he developed an operational management system integrating client/server architecture across multiple facilities. Prior to this
role, he worked as a Software Engineer at UAE University’s Information Technology Services (1988–1995), contributing to various IT projects in
roles ranging from programmer to senior software analyst.
Dr. Ouda’s career reflects a rich blend of academic leadership, technical expertise, and industry collaboration. His ability to bridge theoretical
research with practical applications has had a lasting impact on both educational institutions and industry partners.
Research
Dr. Abdelkader Ouda’s research spans a diverse array of topics within the fields of cybersecurity, data analytics, machine learning, and advanced computing systems, with a strong focus on innovative solutions for real-world challenges in modern digital environments.
A significant portion of his work addresses security concerns in distributed computing systems. For example, he developed a mutual Authentication and Key Agreement protocol tailored for hybrid edge–fog–cloud architectures enhanced by 5G networks.
This protocol improves security while reducing computational and transmission costs compared to existing alternatives. Similarly, he proposed a lightweight wireless meter-bus (wM-Bus) protocol for IoT devices that leverages the Noise Protocol
Framework to optimize energy efficiency without compromising security, extending device lifetimes significantly.
In the domain of user authentication, Dr. Ouda has explored novel approaches such as smartphone-integrated biometric systems using gait cycle analysis and reinforcement learning-based continuous authentication systems relying on behavioral biometrics like keystroke dynamics.
These systems enhance security by providing real-time or session-long user verification. He also introduced an Autonomous Inquiry-Based Authentication Chatbot that dynamically generates personalized questions based on recent user activity,
adding an adaptive layer to multi-factor authentication.
Dr. Ouda’s contributions to data analytics include the development of an Algorithm-Based Data Generation (ADG) Engine to synthesize behavioral datasets in contexts where real-world data are sparse or unavailable. This engine generates realistic
normal and abnormal data patterns, facilitating anomaly detection and analytics in secure or specialized environments. Additionally, he conducted a performance benchmark comparing PostgreSQL and MySQL databases, demonstrating PostgreSQL's superior
efficiency for continuous authentication systems requiring low latency and robust concurrent processing.
In intra-domain communication security, Dr. Ouda introduced HSM4SSL, a comprehensive solution leveraging hardware security modules (HSMs) to enhance the Secure Socket Layer (SSL) protocol for intra-domain environments.
This approach outperformed existing solutions in terms of request handling and latency while providing robust cryptographic operations.
Beyond security-focused research, Dr. Ouda has contributed to advancements in machine translation and big data management. He optimized machine translation models for translating technical patents from English to Japanese,
achieving high-quality results through domain-specific preprocessing and fine-tuning techniques. He also conducted a thorough review of data-lake architectures, identifying trends and challenges while distinguishing them from data warehouses.
Overall, Dr. Abdelkader Ouda’s research demonstrates a commitment to addressing pressing technological challenges with innovative methodologies that balance efficiency, security, and practicality across a range of applications in modern computing systems.
Teaching

Designing, implementing and testing computer programs using a modern object-oriented language such as C++ to fulfill given specifications for small problems using sound engineering principles and processes. Awareness of the engineering aspects of the process of constructing a computer program.

Designing, implementing and testing computer programs using Java and MATLAB to fulfill given specifications for small problems using sound engineering principles and processes. Awareness of the engineering aspects of the process of constructing a computer program.

Object Oriented Design (OOD) using the Unified Modeling Language. Importance of the design process in the software life cycle. Review of traditional software design methods leading into fundamental OOD principles and practices. Reusability, use of tool sets and standards are stressed. Brief coverage of user-interface design, real-time and distributed systems, architectural design.

Survey of important computer algorithms and related data structures used in object-oriented software engineering. Design, performance analysis and implementation of such algorithms, stressing their practical use and performance certification of large software applications. Understand how to "seal" designs to guarantee performance goals and insure that all error conditions are caught.

An investigation into the theoretical foundations of Software Engineering including automata theory, computability, analysis of algorithms and the application of formal specification methods to software specification.

Theory and construction of operating systems, including real-time and embedded systems aspect from an engineering point of view, stressing performance measurement and metrics. Quality of Service issues leading to certification that an operating system will satisfy hard real-time constraints.

Design, configuration, and maintenance of switches, LANs, and VLANs leading to a thorough understanding of the real-world internetworking. At the completion of this, the student is well-prepared to write the Cisco CCNA Certification Examination.

This course examines and introduces advanced concepts in computer network and data communications. Topics include mobile and wireless data communications, multimedia networking, network management, distributed computing and clusters, and peer to peer network applications.

Design and implementation of a large group project illustrating the design concepts being taught and promoting team interaction in a professional setting.

Project Management and Software Process life cycles. Includes detailed analysis of components of each process. Metrics, tools and related standards associated with those components. Integration into a complete software project planning including software effort, scheduling and cost estimation, software quality management, and software risk management.

System tools (loaders, debuggers, libraries, archivers), survey of programming languages, run-time systems, introduction to parsing (yacc and lex), survey of database technology, Object Oriented languages, special topics.

Requirements includes a feasibility study of the desired systems, elicitations and analysis of user's needs, the creation of a precise description of what the system should and should not do along with any constraints on its operation and implementation, and the validation of this specification by the users.

This course provides an introduction to the topic of security in the context of computer networks. The goals are to provide students with a foundation allowing them to identify, analyze, and solve network-related security problems in information systems with the emphasis on the engineering aspects of information security.

This course concentrates on the challenges involved in the construction of cryptographic protocols to protect modern computer networks, such as p2p Networks, Service Oriented Network (SON), or Wireless Sensor Network (WSN). Specifically, anonymous p2p protocols and ways for shutting down p2p Botnets will be surveyed and discussed with regard to peer-to-peer networks. For Service Oriented Network, topics in building secure web service-based operations will be addressed. The security goals for wireless communication will be considered in terms of WSN authentication and routing protocols.
Publications

Abstract: The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and fog computing offloads IoT processing. Integrating 5G and fog computing can address cloud computing’s deficiencies, but security challenges remain, especially in Authentication and Key Agreement aspects due to the distributed and dynamic nature of fog computing.
Keywords: fog–cloud computing; fog security; authentication protocols; key agreement protocols

Abstract—The escalating demand for secure communication in the Internet of Things (IoT), particularly in energy-sensitive devices such as smart meters, highlights a critical challenge: achieving robust security without excessive energy consumption. While various solutions have been proposed to minimize energy use, many fail to address the unique constraints of the IoT devices effectively. This article introduces an innovative approach by proposing a secure, lightweight wireless meter-bus (wM-Bus) protocol, specifically designed for the stringent resource constraints of the IoT environments.
Index Terms—Advanced metering infrastructure (AMI), cryptography, Internet of Things (IoT), lightweight, noise protocol framework (NPF), protocol, security, smart metering, wireless meter-bus (wM-Bus).

Abstract: With our increasing reliance on technology, there is a growing demand for efficient and seamless access control systems. Smartphone-centric biometric methods offer a diverse range of potential solutions capable of verifying users and providing an additional layer of security to prevent unauthorized access. To ensure the security and accuracy of smartphone-centric biometric identification, it is crucial that the phone reliably identifies its legitimate owner. Once the legitimate holder has been successfully determined, the phone can effortlessly provide real-time identity verification for various applications.
Keywords: access control systems; identity verification; gait cycle analysis; smartphone sensors.

Abstract: This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique behavioral biometric signatures, while a reward-driven RL model is deployed to authenticate users throughout their sessions. The proposed system augments conventional authentication mechanisms, fortifying them with an additional layer of security to create a robust continuous authentication framework compatible with static authentication systems.
Keywords: behavioral biometrics; continuous authentication; keystroke dynamics; Markov decision process (MDP); Q-learning; reinforcement learning (RL); static authentication; user authentication; identification.

Abstract: Despite being the most widely used authentication mechanism, password-based authentication is not very secure, being easily guessed or brute-forced. To address this, many systems which especially value security adopt Multi-Factor Authentication (MFA), in which multiple different authentication mechanisms are used concurrently. JitHDA (Just-in-time human dynamics based authentication engine) is a new authentication mechanism which can add another option to MFA capabilities. JitHDA observes human behaviour and human dynamics to gather up to date information on the user from which authentication questions can be dynamically generated.
Keywords: bmachine learning; authentication; natural language understanding; big data; chatbots.

Abstract: The increasing significance of data analytics in modern information analysis is underpinned by vast amounts of user data. However, it is only feasible to amass sufficient data for various tasks in specific data-gathering contexts that either have limited security information or are associated with older applications. There are numerous scenarios where a domain is too new, too specialized, too secure, or data are too sparsely available to adequately support data analytics endeavors. In such cases, synthetic data generation becomes necessary to facilitate further analysis.
Keywords: data generation; anomaly data; user behavior generation; data analytics.

Abstract: In a world where digitization is rapidly advancing, the security and privacy of intra-domain communication within organizations are of critical concern. The imperative to secure communication channels among physical systems has led to the deployment of various security approaches aimed at fortifying networking protocols. However, these approaches have typically been designed to secure protocols individually, lacking a holistic perspective on the broader challenge of intra-domain communication security. This omission raises fundamental concerns about the safety and integrity of intra-domain environments, where all communication occurs within a single domain.
Keywords: intra-domain; secure socket layer; transport layer security; public-key certificates; hardware security modules.

Abstract: This study highlights the necessity for efficient database management in continuous authentication systems, which rely on large-scale behavioral biometric data such as keystroke patterns. A benchmarking framework was developed to evaluate the PostgreSQL and MySQL databases, minimizing repetitive coding through configurable functions and variables. The methodology involved experiments assessing select and insert queries under primary and complex conditions, simulating real-world scenarios. Our quantified results show PostgreSQL’s superior performance in select operations.
Keywords: benchmark; postgreSQL; mySQL; database; biometrics.

Abstract: This paper addresses the challenges associated with machine translation of patents from English to Japanese. This translation poses unique difficulties due to their legal nature, distinguishing them from general Japanese-to-English translation. Furthermore, the complexities inherent in the Japanese language add an additional layer of intricacy to the development of effective translation models within this specific domain. Our approach encompasses a range of essential steps, including preprocessing, data preparation, expert feedback acquisition, and linguistic analysis.
Keywords: machine translation; technical patents; natural language processing; translation quality; cross-lingual information retrieval; corpus-based translation; domain adaptation; language model fine-tuning; neural machine translation.

Abstract: This paper presents a comprehensive literature review on the evolution of data-lake technology, with a particular focus on data-lake architectures. By systematically examining the existing body of research, we identify and classify the major types of data-lake architectures that have been proposed and implemented over time. The review highlights key trends in the development of data-lake architectures, identifies the primary challenges faced in their implementation, and discusses future directions for research and practice in this rapidly evolving field.
Keywords: big data; hadoop; data lake; data warehouse; data lakehouse; data management; schema; internet of things.
- Iman IM Abu Sulayman and Abdelkader Ouda. Data analytics methods for anomaly detection: Evolution and recommendations. In 2018 International Conference on Signal Processing and Information Security (ICSPIS), pages 1–4. IEEE, 2018.
- Wafaa Anani, Abdelkader Ouda, and Ali Hamou. A survey of wireless communications for IoT echo-systems. In 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), pages 1–6. IEEE, 2019.
- Osama Ali-Ozkan and Abdelkader Ouda. Key-based reversible data masking for business intelligence healthcare analytics platforms. In 2019 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2019.
- Iman IM Abu Sulayman and Abdelkader Ouda. User modeling via anomaly detection techniques for user authentication. In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pages 0169–0176. IEEE, 2019.
- Iman IM Abu Sulayman and Abdelkader Ouda. Human trait analysis via machine learning techniques for user authentication. In 2020 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–10. IEEE, 2020.
- Iman IM Abu Sulayman and Abdelkader Ouda. Designing security user profiles via anomaly detection for user authentication. In 2020 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2020.
- Peter Voege and Abdelkader Ouda. A study on natural language chatbot-based authentication systems. In 2021 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–4. IEEE, 2021.
- Iman IM Abu Sulayman, Rongji He, Marlin Manka, Andrew Ning, and Abdelkader Ouda. Lifi/wifi authentication and handover protocols: Survey, evaluation, and recommendation. In 2021 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2021.
- Wafaa Anani and Abdelkader Ouda. Demystifying wireless technologies for best uses in IoT echo-systems. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), pages 238–245. IEEE, 2022.
- Maimoonah Ahmed, Abdelkader Ouda, and Mohamed Abusharkh. An analysis of the effects of hyperparameters on the performance of simulated autonomous vehicles. In 2022 International Telecommunications Conference (ITC-Egypt), pages 1–5. IEEE, 2022.
- Peter Voege and Abdelkader Ouda. An innovative multi-factor authentication approach. In 2022 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2022.
- Priya Bansal and Abdelkader Ouda. Study on integration of fastapi and machine learning for continuous authentication of behavioral biometrics. In 2022 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2022.
- Sanket Salunke, Abdelkader Ouda, and Jonathan Gagne. Transfer learning for behavioral biometrics-based continuous user authentication. In 2022 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2022.
- Iman IM Abu Sulayman and Abdelkader Ouda. Real-time data generation and anomaly detection for security user profiles. In 2022 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2022.
- Wafaa Anani and Abdelkader Ouda. Wireless meter bus: Secure remote metering within the iot smart grid. In 2022 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6. IEEE, 2022.
- Sergio A Salinas, Mohamed Ahmed TA Elgalhud, Luke Tambakis, Sanket V Salunke, Kshitija Patel, Hamada Ghenniwa, Abdelkader Ouda, Kenneth McIsaac, Katarina Grolinger, and Ana Luisa Trejos. Comparison of machine learning techniques for activities of daily living classification with electromyographic data. In 2022 International Conference on Rehabilitation Robotics (ICORR), pages 1–6. IEEE, 2022.
- Yazan Aref and Abdelkader Ouda. Autonomous vehicle cyber-attacks classification framework. In 2023 15th I nternational Conference on COMmunication Systems & NETworkS (COMSNETS), pages 373–377. IEEE, 2023.
- Sanket Vilas Salunke and Abdelkader Ouda. Ensemble learning to enhance continuous user authentication for real world environments. In 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), pages 102–108. IEEE, 2023.
- Iman I. M. Abu Sulayman, Peter Voege, and Abdelkader Ouda. Algorithm-based data generation (adg) engine for dual-mode user behavioral data analytics. Information, 15(3), 2024.
- Yazan Aref and Abdelkader Ouda. Still computers networking is less secure than it should be, causes and solution. In 2023 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–8. IEEE, 2023.