Security analysis of drones systems: Attacks, limitations, and recommendations JP Yaacoub, H Noura, O Salman, A Chehab Internet of Things 11, 100218, 2020 | 617 | 2020 |
Cyber-physical systems security: Limitations, issues and future trends JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli Microprocessors and microsystems 77, 103201, 2020 | 448 | 2020 |
SDN controllers: A comparative study O Salman, IH Elhajj, A Kayssi, A Chehab 2016 18th mediterranean electrotechnical conference (MELECON), 1-6, 2016 | 277 | 2016 |
Securing internet of medical things systems: Limitations, issues and recommendations JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ... Future Generation Computer Systems 105, 581-606, 2020 | 267 | 2020 |
Edge computing enabling the Internet of Things O Salman, I Elhajj, A Kayssi, A Chehab 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015 | 241 | 2015 |
IoT survey: An SDN and fog computing perspective O Salman, I Elhajj, A Chehab, A Kayssi Computer Networks 143, 221-246, 2018 | 239 | 2018 |
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab International Journal of Information Security 21 (1), 115-158, 2022 | 214 | 2022 |
A machine learning based framework for IoT device identification and abnormal traffic detection O Salman, IH Elhajj, A Chehab, A Kayssi Transactions on Emerging Telecommunications Technologies 33 (3), e3743, 2022 | 142 | 2022 |
Identity-based authentication scheme for the Internet of Things O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi 2016 IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016 | 134 | 2016 |
LoRaWAN security survey: Issues, threats and possible mitigation techniques H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab Internet of Things 12, 100303, 2020 | 116 | 2020 |
A review on machine learning–based approaches for Internet traffic classification O Salman, IH Elhajj, A Kayssi, A Chehab Annals of Telecommunications 75 (11), 673-710, 2020 | 101 | 2020 |
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things and Cyber-Physical Systems 3, 280-308, 2023 | 59 | 2023 |
DistLog: A distributed logging scheme for IoT forensics HN Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 98, 102061, 2020 | 52 | 2020 |
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab Internet of Things 19, 100544, 2022 | 48 | 2022 |
Preserving data security in distributed fog computing H Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 94, 101937, 2019 | 48 | 2019 |
An architecture for the Internet of Things with decentralized data and centralized control O Salman, I Elhajj, A Kayssi, A Chehab 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 47 | 2015 |
A multi-level internet traffic classifier using deep learning O Salman, IH Elhajj, A Chehab, A Kayssi 2018 9th International Conference on the Network of the Future (NOF), 68-75, 2018 | 33 | 2018 |
Software defined iot security framework O Salman, I Elhajj, A Chehab, A Kayssi 2017 Fourth International Conference on Software Defined Systems (SDS), 75-80, 2017 | 32 | 2017 |
Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab arXiv preprint arXiv:2103.17028, 2021 | 28 | 2021 |
A deep learning object detection method for an efficient clusters initialization R Couturier, HN Noura, O Salman, A Sider arXiv preprint arXiv:2104.13634, 2021 | 26 | 2021 |