Blockchain: Trends and Future Opportunities S Zeadally, J Bou Abdo Internet Technology Letters, e130, 2019 | 71 | 2019 |
A survey on access control mechanisms for cloud computing R El Sibai, N Gemayel, J Bou Abdo, J Demerjian Transactions on Emerging Telecommunications Technologies 31 (2), e3720, 2020 | 61 | 2020 |
Similarity measures for collaborative filtering recommender systems L Al Hassanieh, C Abou Jaoudeh, J Bou Abdo, J Demerjian 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 1-5, 2018 | 55 | 2018 |
Ensured confidentiality authentication and key agreement protocol for EPS J Bou Abdo, H Chaouchi, M Aoude Broadband Networks and Fast Internet (RELABIRA), 2012 Symposium on, 73-77, 2012 | 49* | 2012 |
Security in Emerging 4G Networks J Bou Abdo, H Chaouchi, J Demerjian Next-Generation Wireless Technologies, 243-272, 2013 | 47* | 2013 |
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets S Hajj, R El Sibai, J Bou Abdo, J Demerjian, A Makhoul, C Guyeux Transactions on Emerging Telecommunications Technologies, 4240, 2021 | 44 | 2021 |
Broker-based Cross-Cloud Federation Manager J Bou Abdo, J Demerjian, H Chaouchi, K Barbar, G Pujolle Internet Technology and Secured Transactions (ICITST), 2013 8th …, 2013 | 38* | 2013 |
Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains J Bou Abdo, R El Sibai, J Demerjian Transactions on Emerging Telecommunications Technologies, e4148, 2020 | 37 | 2020 |
Evaluation of mobile cloud architectures J Bou Abdo, J Demerjian Pervasive and Mobile Computing 39, 284-303, 2017 | 35 | 2017 |
Connectivity-aware service provision in vehicular cloud R El Sibaï, T Atéchian, J Bou Abdo, R Tawil, J Demerjian 2015 International Conference on Cloud Technologies and Applications …, 2015 | 32 | 2015 |
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA K Hamandi, J Bou Abdo, IH Elhajj, A Kayssi, A Chehab Computer Communications 98, 20-30, 2017 | 23 | 2017 |
Extended Privacy in Crowdsourced Location‐Based Services Using Mobile Cloud Computing J Bou Abdo, T Bourgeau, J Demerjian, H Chaouchi Mobile Information Systems 2016 (1), 7867206, 2016 | 22 | 2016 |
Exhaustive Study on Medical Sensors N Boudargham, J Bou Abdo, J Demerjian, C Guyeux The Eleventh International Conference on Sensor Technologies and …, 2017 | 21 | 2017 |
EC-AKA2 a revolutionary AKA protocol J Bou Abdo, J Demerjian, H Chaouchi, G Pujolle 2013 International Conference on Computer Applications Technology (ICCAT), 1 - 6, 2013 | 20 | 2013 |
Efficient hybrid emergency aware MAC protocol for wireless body sensor networks N Bou Dargham, A Makhoul, J Bou Abdo, J Demerjian, C Guyeux Sensors 18 (10), 3572, 2018 | 19 | 2018 |
EPS mutual authentication and Crypt-analyzing SPAKA J Bou Abdo, J Demerjian, K Ahmad, H Chaouchi, G Pujolle Computing, Management and Telecommunications (ComManTel), 2013 International …, 2013 | 19* | 2013 |
Investigating Low Level Protocols for Wireless Body Sensor Networks N Boudargham, J Bou Abdo, J Demerjian, C Guyeux, A Makhoul 2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016 | 18 | 2016 |
Multi-utility framework: blockchain exchange platform for sustainable development J Bou Abdo, S Zeadally International Journal of Pervasive Computing and Communications, 2020 | 17* | 2020 |
Converged AI, IoT, and blockchain technologies: a conceptual ethics framework E Nehme, R El Sibai, J Bou Abdo, AR Taylor, J Demerjian AI and Ethics 2 (1), 129-143, 2022 | 16 | 2022 |
Efficient cluster-based routing algorithm for body sensor networks N Boudargham, J Bou Abdo, J Demerjian, C Guyeux, T Atechian 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 1-6, 2018 | 16 | 2018 |