Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures W Itani, A Kayssi, A Chehab Eighth IEEE International Conference on Dependable, Autonomic and Secure …, 2009 | 386 | 2009 |
Low Cost Arduino/Android-Based Energy-Efficient Home Automation System with Smart Task Scheduling K Baraka, M Ghobril, S Malek, R Kanj, A Kayssi Fifth International Conference on Computational Intelligence, Communication …, 2013 | 153 | 2013 |
Edge Computing Enabling the Internet of Things O Salman, I Elhajj, A Kayssi, A Chehab IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015 | 123 | 2015 |
SDN Controllers: A Comparative Study O Salman, IH Elhajj, A Kayssi, A Chehab 18th Mediterranean Electrotechnical Conference (MELECON), 1-6, 2016 | 121 | 2016 |
Energy-Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing W Itani, A Kayssi, A Chehab International Conference on Energy Aware Computing, 1-2, 2010 | 99 | 2010 |
Analytical Transient Response of CMOS Inverters AI Kayssi, KA Sakallah, TM Burks IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1992 | 96 | 1992 |
IoT Survey: An SDN and Fog Computing Perspective O Salman, I Elhajj, A Chehab, A Kayssi Computer Networks 143, 221-246, 2018 | 79 | 2018 |
Identity-Based Authentication Scheme for the Internet of Things O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016 | 67 | 2016 |
The Impact of Signal Transition Time on Path Delay Computation AI Kayssi, KA Sakallah, TN Mudge IEEE Transactions on Circuits and Systems II: Analog and Digital Signal …, 1993 | 63 | 1993 |
Fuzzy Reputation-Based Trust Model A Tajeddine, A Kayssi, A Chehab, H Artail Applied Soft Computing 11 (1), 345-355, 2011 | 59 | 2011 |
J2ME Application-Layer End-to-End Security for M-Commerce W Itani, A Kayssi Journal of Network and Computer Applications 27 (1), 13-32, 2004 | 58 | 2004 |
A Privacy-Preserving Trust Model for VANETs A Tajeddine, A Kayssi, A Chehab 10th IEEE International Conference on Computer and Information Technology …, 2010 | 57 | 2010 |
DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks RZ El Kaissi, A Kayssi, A Chehab, Z Dawy Second International Conference on Innovations in Information Technology, 1-10, 2005 | 57 | 2005 |
FPGA-Based Internet Protocol Firewall Chip A Kayssi, L Harik, R Ferzli, M Fawaz 7th IEEE International Conference on Electronics, Circuits and Systems …, 2000 | 56 | 2000 |
Trummar - A Trust Model for Mobile Agent Systems Based on Reputation G Derbas, A Kayssi, H Artail, A Chehab IEEE/ACS International Conference on Pervasive Services, 113-120, 2004 | 52 | 2004 |
Signaling Oriented Denial of Service on LTE Networks R Bassil, A Chehab, I Elhajj, A Kayssi 10th ACM International Symposium on Mobility Management and Wireless Access …, 2012 | 39 | 2012 |
Internal Security Attacks on SCADA Systems N Sayegh, A Chehab, IH Elhajj, A Kayssi Third International Conference on Communications and Information Technology …, 2013 | 37 | 2013 |
SCADA Intrusion Detection System Based on Temporal Behavior of Frequent Patterns N Sayegh, IH Elhajj, A Kayssi, A Chehab 17th IEEE Mediterranean Electrotechnical Conference (MELECON), 432-438, 2014 | 33 | 2014 |
SDN VANETs in 5G: An Architecture for Resilient Security Services A Hussein, IH Elhajj, A Chehab, A Kayssi Fourth International Conference on Software Defined Systems (SDS), 67-74, 2017 | 32 | 2017 |
Android SMS Malware: Vulnerability and Mitigation K Hamandi, A Chehab, IH Elhajj, A Kayssi 27th International Conference on Advanced Information Networking and …, 2013 | 32 | 2013 |