Phishing Detection: A Literature Survey M Khonji, Y Iraqi, A Jones IEEE Communications Surveys & Tutorials, 1-31, 2013 | 550 | 2013 |
Gateway placement optimization in wireless mesh networks with QoS constraints B Aoun, R Boutaba, Y Iraqi, G Kenward IEEE Journal on Selected Areas in Communications 24 (11), 2127-2136, 2006 | 339 | 2006 |
Routing protocols in wireless mesh networks: challenges and design considerations S Waharte, R Boutaba, Y Iraqi, B Ishibashi Multimedia tools and Applications 29, 285-303, 2006 | 209 | 2006 |
A multi-commodity flow based approach to virtual network resource allocation W Szeto, Y Iraqi, R Boutaba GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 153 | 2003 |
Human eye controlled computer mouse interface H Bhaskar, Y Iraqi, S Al Sharif US Patent 9,075,453, 2015 | 147 | 2015 |
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey E Bellini, Y Iraqi, E Damiani IEEE Access 8, 21127-21151, 2020 | 141 | 2020 |
Adaptive packet video streaming over IP networks: a cross-layer approach T Ahmed, A Mehaoua, R Boutaba, Y Iraqi IEEE Journal on selected areas in Communications 23 (2), 385-401, 2005 | 111 | 2005 |
DORA: Efficient routing for MPLS traffic engineering R Boutaba, W Szeto, Y Iraqi Journal of Network and Systems Management 10 (3), 309-325, 2002 | 111 | 2002 |
Peer-to-peer’s most wanted: malicious peers L Mekouar, Y Iraqi, R Boutaba Computer Networks 50 (4), 545-562, 2006 | 84 | 2006 |
Pricing and admission control for QoS-enabled Internet T Li, Y Iraqi, R Boutaba Computer Networks 46 (1), 87-110, 2004 | 78 | 2004 |
A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF) M Khonji, Y Iraqi CLEF2014 Working Notes 1180, 977-983, 2014 | 77 | 2014 |
Sliding contention window (SCW): Towards backoff range-based service differentiation over IEEE 802.11 wireless LAN networks A Nafaa, A Ksentini, A Mehaoua, Y Iraqi, R Boutaba IEEE network 19 (4), 45-51, 2005 | 69 | 2005 |
A state-of-the-art review of cloud forensics S Almulla, Y Iraqi, A Jones Journal of Digital Forensics, Security and Law 9 (4), 2, 2014 | 64 | 2014 |
Lightpaths on demand: a Web-services-based management system R Boutaba, W Golab, Y Iraqi IEEE Communications magazine 42 (7), 101-107, 2004 | 63 | 2004 |
One-shot blind channel estimation for OFDM systems over frequency-selective fading channels A Saci, A Al-Dweik, A Shami, Y Iraqi IEEE Transactions on Communications 65 (12), 5445-5458, 2017 | 53 | 2017 |
Enhancing phishing e-mail classifiers: A lexical url analysis approach M Khonji, Y Iraqi, A Jones International Journal for Information Security Research (IJISR) 2 (1/2), 40, 2012 | 53 | 2012 |
On the Performance of IRS-Assisted Multi-Layer UAV Communications with Imperfect Phase Compensation M Al-Jarrah, A Al-Dweik, E Alsusa, Y Iraqi, MS Alouini IEEE Transactions on Communications, 2021 | 52* | 2021 |
Dynamic Online Routing Algorithm for MPLS Traffic Engineering W Szeto, R Boutaba, Y Iraqi Proceedings of the International Conference on Research in Networking …, 2002 | 50 | 2002 |
Cloud forensics: A research perspective S Almulla, Y Iraqi, A Jones International Conference on Innovations in Information Technology (IIT), 66-71, 2013 | 47 | 2013 |
Lexical URL analysis for discriminating phishing and legitimate websites M Khonji, Y Iraqi, A Jones Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011 | 47 | 2011 |