Ayman Kayssi
Ayman Kayssi
Professor of Electrical and Computer Engineering, American University of Beirut
Verified email at aub.edu.lb - Homepage
TitleCited byYear
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
W Itani, A Kayssi, A Chehab
Eighth IEEE International Conference on Dependable, Autonomic and Secure …, 2009
Low Cost Arduino/Android-Based Energy-Efficient Home Automation System with Smart Task Scheduling
K Baraka, M Ghobril, S Malek, R Kanj, A Kayssi
Fifth International Conference on Computational Intelligence, Communication …, 2013
Analytical Transient Response of CMOS Inverters
AI Kayssi, KA Sakallah, TM Burks
IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1992
Edge Computing Enabling the Internet of Things
O Salman, I Elhajj, A Kayssi, A Chehab
IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015
Energy-Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing
W Itani, A Kayssi, A Chehab
International Conference on Energy Aware Computing, 1-2, 2010
SDN Controllers: A Comparative Study
O Salman, IH Elhajj, A Kayssi, A Chehab
18th Mediterranean Electrotechnical Conference (MELECON), 1-6, 2016
The Impact of Signal Transition Time on Path Delay Computation
AI Kayssi, KA Sakallah, TN Mudge
IEEE Transactions on Circuits and Systems II: Analog and Digital Signal …, 1993
Fuzzy Reputation-Based Trust Model
A Tajeddine, A Kayssi, A Chehab, H Artail
Applied Soft Computing 11 (1), 345-355, 2011
J2ME Application-Layer End-to-End Security for M-Commerce
W Itani, A Kayssi
Journal of Network and Computer Applications 27 (1), 13-32, 2004
FPGA-Based Internet Protocol Firewall Chip
A Kayssi, L Harik, R Ferzli, M Fawaz
7th IEEE International Conference on Electronics, Circuits and Systems …, 2000
A Privacy-Preserving Trust Model for VANETs
A Tajeddine, A Kayssi, A Chehab
10th IEEE International Conference on Computer and Information Technology …, 2010
Trummar - A Trust Model for Mobile Agent Systems Based on Reputation
G Derbas, A Kayssi, H Artail, A Chehab
IEEE/ACS International Conference on Pervasive Services, 113-120, 2004
DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks
RZ El Kaissi, A Kayssi, A Chehab, Z Dawy
Second International Conference on Innovations in Information Technology, 1-10, 2005
Identity-Based Authentication Scheme for the Internet of Things
O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi
IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016
Trends in Mobile Agent Applications
M Eid, H Artail, A Kayssi, A Chehab
Journal of Research and Practice in Information Technology 37 (4), 323-351, 2005
PATROL: A Comprehensive Reputation-Based Trust Model
A Tajeddine, A Kayssi, A Chehab, H Artail
International Journal of Internet Technology and Secured Transactions 1 (1-2 …, 2007
PATROL-F–A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems
A Tajeddine, A Kayssi, A Chehab, H Artail
Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science …, 2006
A Comprehensive Reputation-Based Trust Model for Distributed Systems
A Tajeddine, A Kayssi, A Chehab, H Artail
Workshop of the 1st International Conference on Security and Privacy for …, 2005
The Design of a Microsupercomputer
TN Mudge, RB Brown, WP Birmingham, JA Dykstra, AI Kayssi, RJ Lomax, ...
Computer 24 (1), 57-64, 1991
J2ME End-to-End Security for M-commerce
W Itani, AI Kayssi
IEEE Wireless Communications and Networking, 2003. WCNC 2003. 3, 2015-2020, 2003
The system can't perform the operation now. Try again later.
Articles 1–20