Security analysis of drones systems: Attacks, limitations, and recommendations JP Yaacoub, H Noura, O Salman, A Chehab Internet of Things 11, 100218, 2020 | 353 | 2020 |
Cyber-physical systems security: Limitations, issues and future trends JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli Microprocessors and microsystems 77, 103201, 2020 | 254 | 2020 |
SDN controllers: A comparative study O Salman, IH Elhajj, A Kayssi, A Chehab 2016 18th mediterranean electrotechnical conference (MELECON), 1-6, 2016 | 214 | 2016 |
Edge computing enabling the Internet of Things O Salman, I Elhajj, A Kayssi, A Chehab 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015 | 209 | 2015 |
IoT Survey: An SDN and Fog Computing Perspective O Salman, I Elhajj, A Chehab, A Kayssi Computer Networks, 2018 | 197 | 2018 |
Securing internet of medical things systems: Limitations, issues and recommendations JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ... Future Generation Computer Systems 105, 581-606, 2020 | 154 | 2020 |
Identity-based authentication scheme for the Internet of Things O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi 2016 IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016 | 114 | 2016 |
A machine learning based framework for IoT device identification and abnormal traffic detection O Salman, IH Elhajj, A Chehab, A Kayssi Transactions on Emerging Telecommunications Technologies 33 (3), e3743, 2022 | 93 | 2022 |
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab International Journal of Information Security, 1-44, 2022 | 78 | 2022 |
LoRaWAN security survey: Issues, threats and possible mitigation techniques H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab Internet of Things 12, 100303, 2020 | 70 | 2020 |
A review on machine learning–based approaches for Internet traffic classification O Salman, I Elhajj, A Kayssi, A Chehab Annals of Telecommunications, 2020 | 48 | 2020 |
An architecture for the Internet of Things with decentralized data and centralized control O Salman, I Elhajj, A Kayssi, A Chehab 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 46 | 2015 |
Preserving data security in distributed fog computing H Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 94, 101937, 2019 | 40 | 2019 |
DistLog: A distributed logging scheme for IoT forensics HN Noura, O Salman, A Chehab, R Couturier Ad Hoc Networks 98, 102061, 2020 | 35 | 2020 |
Software defined iot security framework O Salman, I Elhajj, A Chehab, A Kayssi 2017 Fourth International Conference on Software Defined Systems (SDS), 75-80, 2017 | 26 | 2017 |
A multi-level internet traffic classifier using deep learning O Salman, IH Elhajj, A Chehab, A Kayssi 2018 9th International Conference on the Network of the Future (NOF), 68-75, 2018 | 23 | 2018 |
Multi-level security for the 5G/IoT ubiquitous network O Salman, A Kayssi, A Chehab, I Elhajj 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017 | 21 | 2017 |
Analysis of topology based routing protocols for VANETs in different environments O Salman, R Morcel, O Al Zoubi, I Elhajj, A Kayssi, A Chehab 2016 IEEE International Multidisciplinary Conference on Engineering …, 2016 | 21 | 2016 |
Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab arXiv preprint arXiv:2103.17028, 2021 | 14 | 2021 |
Data representation for CNN based internet traffic classification: a comparative study O Salman, IH Elhajj, A Kayssi, A Chehab Multimedia Tools and Applications 80, 16951-16977, 2021 | 12 | 2021 |