Security analysis of drones systems: Attacks, limitations, and recommendations JP Yaacoub, H Noura, O Salman, A Chehab Internet of Things 11, 100218, 2020 | 564 | 2020 |
Cyber-physical systems security: Limitations, issues and future trends JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli Microprocessors and microsystems 77, 103201, 2020 | 392 | 2020 |
SDN controllers: A comparative study O Salman, IH Elhajj, A Kayssi, A Chehab 2016 18th mediterranean electrotechnical conference (MELECON), 1-6, 2016 | 259 | 2016 |
Edge computing enabling the Internet of Things O Salman, I Elhajj, A Kayssi, A Chehab 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015 | 239 | 2015 |
Securing internet of medical things systems: Limitations, issues and recommendations JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ... Future Generation Computer Systems 105, 581-606, 2020 | 238 | 2020 |
IoT survey: An SDN and fog computing perspective O Salman, I Elhajj, A Chehab, A Kayssi Computer Networks 143, 221-246, 2018 | 230 | 2018 |
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab International Journal of Information Security 21 (1), 115-158, 2022 | 183 | 2022 |
A machine learning based framework for IoT device identification and abnormal traffic detection O Salman, IH Elhajj, A Chehab, A Kayssi Transactions on Emerging Telecommunications Technologies 33 (3), e3743, 2022 | 131 | 2022 |
Identity-based authentication scheme for the Internet of Things O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi 2016 IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016 | 130 | 2016 |
LoRaWAN security survey: Issues, threats and possible mitigation techniques H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab Internet of Things 12, 100303, 2020 | 107 | 2020 |
A review on machine learning–based approaches for Internet traffic classification O Salman, IH Elhajj, A Kayssi, A Chehab Annals of Telecommunications 75 (11), 673-710, 2020 | 97 | 2020 |
DistLog: A distributed logging scheme for IoT forensics HN Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 98, 102061, 2020 | 48 | 2020 |
An architecture for the Internet of Things with decentralized data and centralized control O Salman, I Elhajj, A Kayssi, A Chehab 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 46 | 2015 |
Preserving data security in distributed fog computing H Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 94, 101937, 2019 | 44 | 2019 |
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things 19, 100544, 2022 | 39 | 2022 |
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things and Cyber-Physical Systems 3, 280-308, 2023 | 38 | 2023 |
A multi-level internet traffic classifier using deep learning O Salman, IH Elhajj, A Chehab, A Kayssi 2018 9th International Conference on the Network of the Future (NOF), 68-75, 2018 | 30 | 2018 |
Software defined iot security framework O Salman, I Elhajj, A Chehab, A Kayssi 2017 Fourth International Conference on Software Defined Systems (SDS), 75-80, 2017 | 30 | 2017 |
Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab arXiv preprint arXiv:2103.17028, 2021 | 24 | 2021 |
Analysis of topology based routing protocols for VANETs in different environments O Salman, R Morcel, O Al Zoubi, I Elhajj, A Kayssi, A Chehab 2016 IEEE international multidisciplinary conference on engineering …, 2016 | 24 | 2016 |