Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures W Itani, A Kayssi, A Chehab Eighth IEEE International Conference on Dependable, Autonomic and Secure …, 2009 | 441 | 2009 |
SDN Controllers: A Comparative Study O Salman, IH Elhajj, A Kayssi, A Chehab 18th Mediterranean Electrotechnical Conference (MELECON), 1-6, 2016 | 287 | 2016 |
Edge Computing Enabling the Internet of Things O Salman, I Elhajj, A Kayssi, A Chehab IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015 | 245 | 2015 |
IoT Survey: An SDN and Fog Computing Perspective O Salman, I Elhajj, A Chehab, A Kayssi Computer Networks 143, 221-246, 2018 | 241 | 2018 |
Low Cost Arduino/Android-Based Energy-Efficient Home Automation System with Smart Task Scheduling K Baraka, M Ghobril, S Malek, R Kanj, A Kayssi Fifth International Conference on Computational Intelligence, Communication …, 2013 | 227 | 2013 |
A Machine Learning Based Framework for IoT Device Identification and Abnormal Traffic Detection O Salman, IH Elhajj, A Chehab, A Kayssi Transactions on Emerging Telecommunications Technologies, e3743, 2019 | 157 | 2019 |
Identity-Based Authentication Scheme for the Internet of Things O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016 | 141 | 2016 |
Analytical Transient Response of CMOS Inverters AI Kayssi, KA Sakallah, TM Burks IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1992 | 113 | 1992 |
A Review on Machine Learning–Based Approaches for Internet Traffic Classification O Salman, IH Elhajj, A Kayssi, A Chehab Annals of Telecommunications, 1-38, 2020 | 108 | 2020 |
Energy-Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing W Itani, A Kayssi, A Chehab International Conference on Energy Aware Computing, 1-2, 2010 | 108 | 2010 |
Flow-Based Intrusion Detection System for SDN GA Ajaeiya, N Adalian, IH Elhajj, A Kayssi, A Chehab IEEE Symposium on Computers and Communications (ISCC), 787-793, 2017 | 97 | 2017 |
SDN VANETs in 5G: An Architecture for Resilient Security Services A Hussein, IH Elhajj, A Chehab, A Kayssi Fourth International Conference on Software Defined Systems (SDS), 67-74, 2017 | 77 | 2017 |
Fuzzy Reputation-Based Trust Model A Tajeddine, A Kayssi, A Chehab, H Artail Applied Soft Computing 11 (1), 345-355, 2011 | 71 | 2011 |
The Impact of Signal Transition Time on Path Delay Computation AI Kayssi, KA Sakallah, TN Mudge IEEE Transactions on Circuits and Systems II: Analog and Digital Signal …, 1993 | 70 | 1993 |
DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks RZ El Kaissi, A Kayssi, A Chehab, Z Dawy Second International Conference on Innovations in Information Technology, 1-10, 2005 | 69 | 2005 |
A Privacy-Preserving Trust Model for VANETs A Tajeddine, A Kayssi, A Chehab 10th IEEE International Conference on Computer and Information Technology …, 2010 | 68 | 2010 |
Internal Security Attacks on SCADA Systems N Sayegh, A Chehab, IH Elhajj, A Kayssi Third International Conference on Communications and Information Technology …, 2013 | 65 | 2013 |
J2ME Application-Layer End-to-End Security for M-Commerce W Itani, A Kayssi Journal of Network and Computer Applications 27 (1), 13-32, 2004 | 63 | 2004 |
FPGA-Based Internet Protocol Firewall Chip A Kayssi, L Harik, R Ferzli, M Fawaz 7th IEEE International Conference on Electronics, Circuits and Systems …, 2000 | 60 | 2000 |
Trummar - A Trust Model for Mobile Agent Systems Based on Reputation G Derbas, A Kayssi, H Artail, A Chehab IEEE/ACS International Conference on Pervasive Services, 113-120, 2004 | 59 | 2004 |