Dr. Nashwa Abdelbaki

Program Director for Ph.D. and Program Director for Big Data Professional Diploma

Faculty Office Ext.

1751

Faculty Building

UB 1

Office Number

203

Biography

Dr. Nashwa Abdelbaki joined NU in September 2008. Her research interest mainly focuses on Multimedia networking, cloud computing, and cybersecurity. Dr. Abdelbaki published over 60 scientific refereed conference and journal papers and book chapters. She has also served as program committee member in several international scientific journals and conferences.

She led the NU MSc Information Security Program since its inauguration in 2008 to 2021. During the period 2018 to 2020, she was, additionally, the Director of the ITCS Academic Bachelor and Master Programs.

Supported by her German DAAD Scholarship, Dr. Abdelbaki received her Doctor of Engineering (Dr.-Ing.) degree with grade 1.0, in the field of multimedia networking from Faculty of Engineering, Ulm University, Germany. She received her M.Sc. degree from Faculty of Engineering, Ain Shams University in Cairo, and B.Sc. from Faculty of Engineering, Cairo University, Egypt.

Nashwa Abdelbaki is an IT expert with over 35 years of experience at the national as well as regional and international levels. She is an early Internet pioneer, bringing Internet connectivity to Egypt in the late 80s and early 1990s. She helped build Egypt's national networks both locally and regionally and took technical lead of the Egyptian Universities Network (EUN) and the central registry of the Egyptian Top-Level Domain .EG. She is an active member of organizing several international IT conferences and networking workshops. She was one of the four members submitted the first proposal to establish AfriNIC in 1997. She served as an ICANN ccNSO Council member (2007-2010) and was a member of the African Top-Level Domain (AFTLD) Executive Committee.

Recent Publications

Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs

Understanding both of job-seekers and employers behavior in addition to analyzing the text of job-seekers and job profiles are two important missions for the e-recruitment industry. They are important tasks for matching job-seekers with jobs to find the top relevant suggestions for each job-seeker. Recommender systems, information retrieval and text mining are originally targeted to assist users

Artificial Intelligence

Enhanced approach to detect malicious VB script files based on data mining techniques

capabilities of File-based malware but also, increases the evasion techniques by deploying different easy methods of script obfuscation techniques. Moreover, according to McAfee Labs Threat Report, Script-based malwares were used to hit healthcare sector in 2017. Healthcare accounted for more than 26 percent of the 52 million new cyber incidents in the second quarter of 2017. In this paper, new

HTTP application layer DDoS attack mitigation using resources monitor

Denial of Service attacks are one of the most annoying day to day challenges for any security expert and IT professional. This is according to the attack nature. It can be run against any kind of network resources, whether exposed to the Internet or internally in a corporate network, regardless of the type of service it provides and its role in the network. There is no one complete solution or

Browsers fingerprinting motives, methods, and countermeasures

With the continuous and aggressive competition in advertising businesses, uncontrollably desires have emerged to identify and classify consumers. It is proven that companies must have a clear definition of its target market. Based on this we have seen different ways to identify, analyze, and track consumers, either voluntarily or without their consent. Browser fingerprinting techniques have

Software and Communications

Stock exchange threat modeling, EGX as a case study

Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure

Artificial Intelligence
Innovation, Entrepreneurship and Competitiveness

Gesture recognition for improved user experience in augmented biology lab

The Learning process in education systems is one of the most important issues that affect all societies. Advances in technology have influenced how people communicate and learn. Gaming Techniques (GT) and Augmented Reality (AR) technologies provide new opportunities for a learning process. They transform the student’s role from passive to active in the learning process. It can provide a realistic

Artificial Intelligence
Healthcare

Hybrid Information Filtering Engine for Personalized Job Recommender System

The recommendation system, also known as recommender system or recommendation engine/platform, is considered as an interdisciplinary field. It uses the techniques of more than one field. Recommender system inherits approaches from all of machine learning, data mining, information retrieval, information filtering and human-computer interaction. In this paper, we propose our value-added architecture

Artificial Intelligence

Comparison study of digital forensics analysis techniques

Recently, digital forensics analysis got a great attention in IT security. This is especially after cyber incidents are getting new form of organized crime which introduced Advanced Persistent Threats (APT), and hacking Kill Chain definitions. The threat intense rises when it is affecting the healthcare organization where it will be life-threatening. Handling such incidents is a great challenge

Healthcare
Software and Communications

A survey on smart cities’ IoT

The rise of the Internet of Things (IoT) has led to a numerous and diverse amount of products and real life implementations for smart cities in the last few years. With the many opportunities and challenges, the academic and industrial field has come up with many hardware and middleware platforms. We categorise these different IoT applications and solutions into different domains and present an

Circuit Theory and Applications
Software and Communications
Research Tracks
  • Enhancing School Education and Student Learning Gamification
  • Virtual Labs
  • Humanoid Robots
  • Information Security
  • Cyber Security
  • Cloud Computing
  • Networking
  • Augmented Reality