Dr. Nashwa Abdelbaki

Program Director for Ph.D. and Program Director for Big Data Professional Diploma

Faculty Office Ext.

1751

Faculty Building

UB 1

Office Number

203

Biography

Dr. Nashwa Abdelbaki joined NU in September 2008. Her research interest mainly focuses on Multimedia networking, cloud computing, and cybersecurity. Dr. Abdelbaki published over 60 scientific refereed conference and journal papers and book chapters. She has also served as program committee member in several international scientific journals and conferences.

She led the NU MSc Information Security Program since its inauguration in 2008 to 2021. During the period 2018 to 2020, she was, additionally, the Director of the ITCS Academic Bachelor and Master Programs.

Supported by her German DAAD Scholarship, Dr. Abdelbaki received her Doctor of Engineering (Dr.-Ing.) degree with grade 1.0, in the field of multimedia networking from Faculty of Engineering, Ulm University, Germany. She received her M.Sc. degree from Faculty of Engineering, Ain Shams University in Cairo, and B.Sc. from Faculty of Engineering, Cairo University, Egypt.

Nashwa Abdelbaki is an IT expert with over 35 years of experience at the national as well as regional and international levels. She is an early Internet pioneer, bringing Internet connectivity to Egypt in the late 80s and early 1990s. She helped build Egypt's national networks both locally and regionally and took technical lead of the Egyptian Universities Network (EUN) and the central registry of the Egyptian Top-Level Domain .EG. She is an active member of organizing several international IT conferences and networking workshops. She was one of the four members submitted the first proposal to establish AfriNIC in 1997. She served as an ICANN ccNSO Council member (2007-2010) and was a member of the African Top-Level Domain (AFTLD) Executive Committee.

Recent Publications

Convergence study of IPv6 tunneling techniques

IPv4 address exhaustion pushed IETF to create IPv6, the improved substitute of IPv4. The Internet complexity and its enormous size prolong the transition from IPv4 to IPv6 process. This means that both versions will necessarily co-exist. Meanwhile, tunneling appears as a solution trend. The tunneling is a transition technique that is considered temporary till all ISPs would support IPv6. At this

Artificial Intelligence
Software and Communications

Towards cloud customers self-monitoring and availability-monitoring

As an attractive IT environment, Cloud Computing represents a good enough paradigm which governments, national entities, small/medium/large organizations and companies want to migrate to. In fact, outsourcing IT related services to Cloud technology, needs monitoring and controlling mechanisms. However, Cloud Customers cannot fully rely on the Cloud Providers measurements, reports and figures. In

Artificial Intelligence

Towards efficient and secure cloud

Cloud computing is becoming more and more popular. It is increasing in popularity with companies as it enables them to share various resources in a cost effective way. Cloud computing has lots of advantages, however some issues need to be handled before organizations and individuals have the confidence to rely on it. Security and privacy are at the forefront of these important issues. In this

Artificial Intelligence

VoIP performance evaluation over IPv4-6 and manually configured tunnels

IPv4 address space is exhausted. Internet Engineering Task Force (IETF) developed IPv6 -the upgrade of IPv4- to satisfy the continual increase of the IP address needs. The Internet is so ramified and enormous that the complete transition from IPv4 to IPv6 is slow. Therefore, their coexistence is inevitable. Manually configured tunnels are an important solution to allow this co-existence that

Artificial Intelligence

Performance evaluation and comparison of the top market virtualization hypervisors

The virtualization of IT infrastructure enables the consolidation and pooling of IT resources so that they can be shared over diverse applications to offset the limitation of shrinking resources and growing business needs. It provides a logical abstraction of physical computing resources and creates computing environments that are not restricted by physical configuration or implementation

Artificial Intelligence

Towards IT-Legal Framework for Cloud Computing

As the common understanding of Cloud Computing is continuously evolving, the terminology and concepts used to define it often need clarifying. Therefore, Cloud customers and Cloud Providers are used to dispute about Service Level Agreements, Service Level Objectives and Quality of Service. Simultaneously, SLAs/SLOs/QoS represent other related technical problems such as Security, Privacy

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Creating an innovative generic virtual learning lab

The use of multimedia technology and gamification has offered an alternative way of delivering information in education. Interactive Multimedia has the potential to revolutionize the way we work, learn and communicate. With gamification and interactive multimedia, the learning process becomes active, not passive and it ensures that users are doing, not simply watching. Also the Laboratory has a

Artificial Intelligence

Misfeasor classification and detection models using machine learning techniques

Misfeasors (or insiders) are considered among the most difficult intruders to detect due to their knowledge and authorization within the organization. Machine learning techniques have been widely used for intrusion detection but only little work has addressed the use of machine learning for detecting and classifying different types of insiders. The aim of this study is to exploit different

Artificial Intelligence
Research Tracks
  • Enhancing School Education and Student Learning Gamification
  • Virtual Labs
  • Humanoid Robots
  • Information Security
  • Cyber Security
  • Cloud Computing
  • Networking
  • Augmented Reality