Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures W Itani, A Kayssi, A Chehab 2009 Eighth IEEE International Conference on Dependable, Autonomic and …, 2009 | 427 | 2009 |
Security analysis of drones systems: Attacks, limitations, and recommendations JP Yaacoub, H Noura, O Salman, A Chehab Internet of Things 11, 100218, 2020 | 353 | 2020 |
Cyber-physical systems security: Limitations, issues and future trends JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli Microprocessors and microsystems 77, 103201, 2020 | 254 | 2020 |
SDN controllers: A comparative study O Salman, IH Elhajj, A Kayssi, A Chehab 2016 18th mediterranean electrotechnical conference (MELECON), 1-6, 2016 | 214 | 2016 |
Edge computing enabling the Internet of Things O Salman, I Elhajj, A Kayssi, A Chehab 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015 | 209 | 2015 |
IoT survey: An SDN and fog computing perspective O Salman, I Elhajj, A Chehab, A Kayssi Computer Networks 143, 221-246, 2018 | 197 | 2018 |
Securing internet of medical things systems: Limitations, issues and recommendations JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ... Future Generation Computer Systems 105, 581-606, 2020 | 154 | 2020 |
Identity-based authentication scheme for the Internet of Things O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi 2016 IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016 | 114 | 2016 |
Energy-efficient incremental integrity for securing storage in mobile cloud computing W Itani, A Kayssi, A Chehab 2010 International Conference on Energy Aware Computing, 1-2, 2010 | 107 | 2010 |
One round cipher algorithm for multimedia IoT devices H Noura, A Chehab, L Sleem, M Noura, R Couturier, MM Mansour Multimedia tools and applications 77, 18383-18413, 2018 | 105 | 2018 |
A machine learning based framework for IoT device identification and abnormal traffic detection O Salman, IH Elhajj, A Chehab, A Kayssi Transactions on Emerging Telecommunications Technologies 33 (3), e3743, 2022 | 93 | 2022 |
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations JPA Yaacoub, HN Noura, O Salman, A Chehab International Journal of Information Security, 1-44, 2022 | 78 | 2022 |
Flow-based intrusion detection system for SDN GA Ajaeiya, N Adalian, IH Elhajj, A Kayssi, A Chehab 2017 IEEE Symposium on Computers and Communications (ISCC), 787-793, 2017 | 75 | 2017 |
LoRaWAN security survey: Issues, threats and possible mitigation techniques H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab Internet of Things 12, 100303, 2020 | 70 | 2020 |
Fuzzy reputation-based trust model A Tajeddine, A Kayssi, A Chehab, H Artail Applied soft computing 11 (1), 345-355, 2011 | 70 | 2011 |
A privacy-preserving trust model for VANETs A Tajeddine, A Kayssi, A Chehab 2010 10th IEEE International Conference on Computer and Information …, 2010 | 65 | 2010 |
DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks RZ El Kaissi, A Kayssi, A Chehab, Z Dawy American University of Beirut, Department of Electrical and Computer Engineering, 2005 | 65 | 2005 |
SDN VANETs in 5G: An architecture for resilient security services A Hussein, IH Elhajj, A Chehab, A Kayssi 2017 Fourth international conference on software defined systems (SDS), 67-74, 2017 | 60 | 2017 |
A survey on OFDM physical layer security R Melki, HN Noura, MM Mansour, A Chehab Physical Communication 32, 1-30, 2019 | 59 | 2019 |
Trummar-a trust model for mobile agent systems based on reputation G Derbas, A Kayssi, H Artail, A Chehab The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004 …, 2004 | 57 | 2004 |