Trust-based security for wireless ad hoc and sensor networks A Boukerch, L Xu, K El-Khatib Computer Communications 30 (11-12), 2413-2427, 2007 | 426 | 2007 |
Human activity recognition using inertial sensors in a smartphone: An overview W Sousa Lima, E Souto, K El-Khatib, R Jalali, J Gama Sensors 19 (14), 3213, 2019 | 252 | 2019 |
SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks A Boukerche, K El-Khatib, L Xu, L Korba 29th Annual IEEE International Conference on Local Computer Networks, 618-624, 2004 | 246 | 2004 |
Privacy and security in e-learning K El-Khatib, L Korba, Y Xu, G Yee International Journal of Distance Education Technologies (IJDET) 1 (4), 1-19, 2003 | 161 | 2003 |
Smart city architecture for community level services through the internet of things R Jalali, K El-Khatib, C McGregor 2015 18th International Conference on Intelligence in Next Generation …, 2015 | 137 | 2015 |
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks A Boukerche, K El-Khatib, L Xu, L Korba computer communications 28 (10), 1193-1203, 2005 | 114 | 2005 |
A novel solution for achieving anonymity in wireless ad hoc networks A Boukerche, K El-Khatib, L Xu, L Korba Proceedings of the 1st ACM international workshop on Performance evaluation …, 2004 | 109 | 2004 |
Impact of feature reduction on the efficiency of wireless intrusion detection systems K El-Khatib IEEE TRANSACTIONS on parallel and distributed systems 21 (8), 1143-1149, 2009 | 100 | 2009 |
Secure dynamic distributed routing algorithm for ad hoc wireless networks K El-Khatib, L Korba, R Song, G Yee 2003 International Conference on Parallel Processing Workshops, 2003 …, 2003 | 87 | 2003 |
A survey of privacy enhancing technologies for smart cities J Curzon, A Almehmadi, K El-Khatib Pervasive and Mobile Computing 55, 76-95, 2019 | 86 | 2019 |
Biometric identification system based on electrocardiogram data Y Gahi, M Lamrani, A Zoglat, M Guennoun, B Kapralos, K El-Khatib 2008 New Technologies, Mobility and Security, 1-5, 2008 | 85 | 2008 |
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol G Hayes, K El-Khatib 2013 third international conference on communications and information …, 2013 | 79 | 2013 |
A secure database system using homomorphic encryption schemes Y Gahi, M Guennoun, K El-Khatib arXiv preprint arXiv:1512.03498, 2015 | 73 | 2015 |
Private key agreement and secure communication for heterogeneous sensor networks SMM Rahman, K El-Khatib Journal of Parallel and Distributed Computing 70 (8), 858-870, 2010 | 67 | 2010 |
Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles J Whelan, T Sangarapillai, O Minawi, A Almehmadi, K El-Khatib Proceedings of the 16th ACM symposium on QoS and security for wireless and …, 2020 | 65 | 2020 |
Device and method for providing intent-based access control AM Almehmadi, ELK Khalil US Patent 9,703,952, 2017 | 64 | 2017 |
Using clustering for target tracking in vehicular ad hoc networks S Khakpour, RW Pazzi, K El-Khatib Vehicular communications 9, 83-96, 2017 | 64 | 2017 |
A QoE sensitive architecture for advanced collaborative environments AS Patrick, J Singer, B Corrie, S Noël, K El Khatib, B Emond, ... First International Conference on Quality of Service in Heterogeneous Wired …, 2004 | 60 | 2004 |
Continuous authentication by electrocardiogram data M Guennoun, N Abbad, J Talom, SMM Rahman, K El-Khatib 2009 IEEE Toronto International Conference Science and Technology for …, 2009 | 59 | 2009 |
A comparative analysis of the impact of features on human activity recognition with smartphone sensors W Sousa, E Souto, J Rodrigres, P Sadarc, R Jalali, K El-Khatib Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web, 397-404, 2017 | 57 | 2017 |