Dr. Nashwa Abdelbaki

Program Director for Ph.D. and Program Director for Big Data Professional Diploma

Faculty Office Ext.

1751

Faculty Building

UB 1

Office Number

203

Biography

Dr. Nashwa Abdelbaki joined NU in September 2008. Her research interest mainly focuses on Multimedia networking, cloud computing, and cybersecurity. Dr. Abdelbaki published over 65 scientific refereed conference and journal papers and book chapters. She has also served as program committee member in several international scientific journals and conferences.

She led the NU MSc Information Security Program since its inauguration in 2008 to 2021. During the period 2018 to 2020, she was, additionally, the Director of the ITCS Academic Bachelor and Master Programs.

Supported by her German DAAD Scholarship, Dr. Abdelbaki received her Doctor of Engineering (Dr.-Ing.) degree with grade 1.0, in the field of multimedia networking from Faculty of Engineering, Ulm University, Germany. She received her M.Sc. degree from Faculty of Engineering, Ain Shams University in Cairo, and B.Sc. from Faculty of Engineering, Cairo University, Egypt.

Nashwa Abdelbaki is an IT expert with over 35 years of experience at the national as well as regional and international levels. She is an early Internet pioneer, bringing Internet connectivity to Egypt in the late 80s and early 1990s. She helped build Egypt's national networks both locally and regionally and took technical lead of the Egyptian Universities Network (EUN) and the central registry of the Egyptian Top-Level Domain .EG.

Recent Publications

HTTP application layer DDoS attack mitigation using resources monitor

Denial of Service attacks are one of the most annoying day to day challenges for any security expert and IT professional. This is according to the attack nature. It can be run against any kind of network resources, whether exposed to the Internet or internally in a corporate network, regardless of the type of service it provides and its role in the network. There is no one complete solution or

Enhanced approach to detect malicious VB script files based on data mining techniques

capabilities of File-based malware but also, increases the evasion techniques by deploying different easy methods of script obfuscation techniques. Moreover, according to McAfee Labs Threat Report, Script-based malwares were used to hit healthcare sector in 2017. Healthcare accounted for more than 26 percent of the 52 million new cyber incidents in the second quarter of 2017. In this paper, new

Comparison study of digital forensics analysis techniques

Recently, digital forensics analysis got a great attention in IT security. This is especially after cyber incidents are getting new form of organized crime which introduced Advanced Persistent Threats (APT), and hacking Kill Chain definitions. The threat intense rises when it is affecting the healthcare organization where it will be life-threatening. Handling such incidents is a great challenge

Healthcare
Software and Communications

Gesture recognition for improved user experience in augmented biology lab

The Learning process in education systems is one of the most important issues that affect all societies. Advances in technology have influenced how people communicate and learn. Gaming Techniques (GT) and Augmented Reality (AR) technologies provide new opportunities for a learning process. They transform the student’s role from passive to active in the learning process. It can provide a realistic

Artificial Intelligence
Healthcare

Stock exchange threat modeling, EGX as a case study

Cyber crime is a growing threat affecting all business sectors. Stock Exchanges, a financial services sector, are not far from it. Trading stocks via Internet exposes the process to cyber threats that might take advantage of a system defect to breach security and cause possible harm. Online Trading websites are protected by various security systems. Digital Certificate, which is based on Secure

Artificial Intelligence
Innovation, Entrepreneurship and Competitiveness

A new static-based framework for ransomware detection

Recently, ransomware attacks are on the rise hitting critical infrastructures and organizations globally. Ransomware uses advanced encryption techniques to encrypt important files on the targeted computer, then it requests payment to decrypt the encrypted files again. Therefore, the detection and prevention of ransomware attacks represent major challenges for security researchers. This research

Artificial Intelligence

Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs

Understanding both of job-seekers and employers behavior in addition to analyzing the text of job-seekers and job profiles are two important missions for the e-recruitment industry. They are important tasks for matching job-seekers with jobs to find the top relevant suggestions for each job-seeker. Recommender systems, information retrieval and text mining are originally targeted to assist users

Artificial Intelligence

Browsers fingerprinting motives, methods, and countermeasures

With the continuous and aggressive competition in advertising businesses, uncontrollably desires have emerged to identify and classify consumers. It is proven that companies must have a clear definition of its target market. Based on this we have seen different ways to identify, analyze, and track consumers, either voluntarily or without their consent. Browser fingerprinting techniques have

Software and Communications

A survey on smart cities’ IoT

The rise of the Internet of Things (IoT) has led to a numerous and diverse amount of products and real life implementations for smart cities in the last few years. With the many opportunities and challenges, the academic and industrial field has come up with many hardware and middleware platforms. We categorise these different IoT applications and solutions into different domains and present an

Circuit Theory and Applications
Software and Communications
Research Tracks
  • Enhancing School Education and Student Learning Gamification
  • Virtual Labs
  • Humanoid Robots
  • Information Security
  • Cyber Security
  • Cloud Computing
  • Networking
  • Augmented Reality