Follow
Mohammed Mahyoub
Mohammed Mahyoub
Ph.D
Verified email at carleton.ca
Title
Cited by
Cited by
Year
A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model
HA Abdul-Ghani, D Konstantas, M Mahyoub
International Journal of Advanced Computer Science and Applications (IJACSA …, 2018
2372018
An Efficient RPL-based Mechanism for Node-to-Node Communications in IoT
M Mahyoub, ASH Mahmoud, M Abu-Amara, TR Sheltami
IEEE Internet of Things Journal 8 (9), 7152-7169, 2021
252021
Traffic-aware auto-configuration protocol for service oriented low-power and lossy networks in IoT
A Mahmoud, M Mahyoub, T Sheltami, M Abu-Amara
Wireless Networks 25, 4231-4246, 2019
92019
HPRDG: A scalable framework hypercube-P2P-based for resource discovery in computational Grid
HA Ali, MA Ahmed
IEEE International Conference on Computer Theory and Applications (ICCTA …, 2012
92012
An optimized discovery mechanism for smart objects in IoT
M Mahyoub, A Mahmoud, T Sheltami
8th IEEE Annual, Information Technology, Electronics and Mobile …, 2017
82017
Content-Based Filter Publish Subscribe Model for Real-Time WSN Applications.
M Mahyoub, A Al-Roubaiey, G Ahmed
J. Ubiquitous Syst. Pervasive Networks 7 (1), 19-27, 2016
32016
Security analysis of critical 5g interfaces
M Mahyoub, AA AbdulGhaffar, E Alalade, E Ndubisi, A Matrawy
IEEE Communications Surveys & Tutorials, 2024
22024
On Mitigating DIS Attacks in IoT Networks
G Aljufair, M Mahyoub, AS Almazyad
2023 18th Wireless On-Demand Network Systems and Services Conference (WONS …, 2023
22023
Reliable and low-latency routing mechanism for IoT-based networks
M Mahyoub, A Mahmoud, M Abu-Amara, T Sheltami
2019 IEEE 14th Malaysia International Conference on Communication (MICC), 81-85, 2019
22019
Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach
ED Alalade, M Mahyoub, A Matrawy
arXiv preprint arXiv:2401.09519, 2024
12024
A Security-aware Network Function Sharing Model for 5G Slicing
M Mahyoub, AA AbdulGhaffar, E Alalade, A Matrawy
arXiv preprint arXiv:2303.03492, 2023
12023
Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study
M Mahyoub, A Matrawy, K Isleem, O Ibitoye
12023
A survey of resource discovery in computational grids
MAA ▪ Hesham A. Ali, Alaa E. Abdel-Hakim
of 8th International Conference on Electrical Engineering (ICEENG 2012) 8 …, 2012
1*2012
On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations
AA AbdulGhaffar, M Mahyoub, A Matrawy
Accepted in 20th International Conference on the Design of Reliable …, 2024
2024
On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks
M Mahyoub, S Hossain, A Matrawy
Accepted in 20th International Conference on the Design of Reliable …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–15