“Server-less” Social Network for Enhanced Privacy D Bedrossian, A Harb, R Khalil, A Chehab, HA Artail Procedia Computer Science 34, 95-102, 2014 | 1 | 2014 |
1.5 GHz robust SRAM array employing dynamic power management scheme S Kharouf, L Chatila, M Mansour, A Chehab 2010 International Conference on Energy Aware Computing, 1-2, 2010 | 1 | 2010 |
2016 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET) R Darazi, S Moussa, A Akl, R Elgemayel, A Kayssi, A Chehab, SS Gebai, ... | 1 | |
3D beamforming with massive cylindrical arrays for physical layer secure data transmission E Yaacoub, M Al-Husseini, A Chehab, K Abualsaud, T Khattab, M Guizani IEEE Communications Letters 23 (5), 830-833, 2019 | 9 | 2019 |
3G to Wi-Fi offloading on Android K Bakhit, C Chalouhi, S Francis, S Mourad, IH Elhajj, A Kayssi, A Chehab 2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014 | 3 | 2014 |
8085 microprocessor simulation tool “8085 SimuKit” A Chehab, S Hanna, KY Kabalan, A El‐Hajj Computer Applications in Engineering Education 12 (4), 249-256, 2004 | 6 | 2004 |
9 Intrusion Detection for A Atassi, IH Elhajj, A Chehab, A Kayssi The State of the Art in Intrusion Prevention and Detection, 211, 2014 | | 2014 |
A 1.5 GHz robust SRAM array optimized for cell area S Kharouf, L Chatila, M Mansour, A Chehab 2010 International Conference on Microelectronics, 379-382, 2010 | 1 | 2010 |
A 1.5 GHz Robust SRAM Array Optimized for Cell Area SKLCM Mansour, A Chehab | | |
A centralized energy-aware trust-based routing scheme for wireless sensor networks A Tajeddine, A Kayssi, A Chehab 2010 International Conference on Energy Aware Computing, 1-2, 2010 | 2 | 2010 |
A clustering method for iDDT-based testing A Chehab, R Makki, S Patel IEEE International Workshop on Current & Defect Based Testing, 2003 | 3 | 2003 |
A comprehensive reputation-based trust model for distributed systems A Tajeddine, A Kayssi, A Chehab, H Artail Workshop of the 1st International Conference on Security and Privacy for …, 2005 | 34 | 2005 |
A crowdsourcing game-theoretic intrusion detection and rating system F Saab, I Elhajj, A Kayssi, A Chehab Proceedings of the 31st annual ACM symposium on applied computing, 622-625, 2016 | 5 | 2016 |
A decentralized energy-aware key management scheme for wireless sensor networks SA Saab, A Kayssi, A Chehab 2011 International Conference for Internet Technology and Secured …, 2011 | 7 | 2011 |
A design methodology for energy aware neural networks M Dabbagh, H Hajj, A Chehab, W El-Hajj, A Kayssi, M Mansour 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 4 | 2011 |
A distance-based power control scheme for D2D communications using stochastic geometry A Abdallah, MM Mansour, A Chehab 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-6, 2017 | 37 | 2017 |
A dynamic approach for a lightweight and secure cipher for medical images M Noura, H Noura, A Chehab, MM Mansour, L Sleem, R Couturier Multimedia Tools and Applications 77, 31397-31426, 2018 | 24 | 2018 |
A fairness-based congestion control algorithm for multipath TCP R Melki, MM Mansour, A Chehab 2018 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2018 | 10 | 2018 |
A game-theoretic approach to resource allocation in the cloud O Salman, M Awad, F Saab, I Elhajj, A Chehab, A Kayssi 2016 IEEE International Multidisciplinary Conference on Engineering …, 2016 | 3 | 2016 |
A lightweight reconfigurable RRAM-based PUF for highly secure applications B Hajri, MM Mansour, A Chehab, H Aziza 2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2020 | 7 | 2020 |