Ali Chehab
Title
Cited by
Cited by
Year
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
W Itani, A Kayssi, A Chehab
2009 Eighth IEEE International Conference on Dependable, Autonomic and …, 2009
3782009
SDN controllers: A comparative study
O Salman, IH Elhajj, A Kayssi, A Chehab
2016 18th Mediterranean Electrotechnical Conference (MELECON), 1-6, 2016
1142016
Edge computing enabling the Internet of Things
O Salman, I Elhajj, A Kayssi, A Chehab
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015
1112015
The state of the art in intrusion prevention and detection
ASK Pathan
CRC press, 2014
1042014
Energy-efficient incremental integrity for securing storage in mobile cloud computing
W Itani, A Kayssi, A Chehab
2010 International Conference on Energy Aware Computing, 1-2, 2010
952010
IoT survey: An SDN and fog computing perspective
O Salman, I Elhajj, A Chehab, A Kayssi
Computer Networks 143, 221-246, 2018
692018
Identity-based authentication scheme for the Internet of Things
O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi
2016 IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016
612016
Fuzzy reputation-based trust model
A Tajeddine, A Kayssi, A Chehab, H Artail
Applied soft computing 11 (1), 345-355, 2011
582011
A privacy-preserving trust model for VANETs
A Tajeddine, A Kayssi, A Chehab
2010 10th IEEE International Conference on Computer and Information …, 2010
552010
DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks
RZ El Kaissi, A Kayssi, A Chehab, Z Dawy
American University of Beirut, Department of Electrical and Computer Engineering, 2005
552005
Trummar-a trust model for mobile agent systems based on reputation
G Derbas, A Kayssi, H Artail, A Chehab
The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004 …, 2004
522004
One round cipher algorithm for multimedia IoT devices
H Noura, A Chehab, L Sleem, M Noura, R Couturier, MM Mansour
Multimedia tools and applications 77 (14), 18383-18413, 2018
392018
Signaling oriented denial of service on LTE networks
R Bassil, A Chehab, I Elhajj, A Kayssi
Proceedings of the 10th ACM international symposium on Mobility management …, 2012
382012
Wireless sensor for continuous real-time oil spill thickness and location measurement
H Denkilkian, A Koulakezian, R Ohannessian, MS Chalfoun, MKW Joujou, ...
IEEE Transactions on Instrumentation and Measurement 58 (12), 4001-4011, 2009
382009
Internal security attacks on SCADA systems
N Sayegh, A Chehab, IH Elhajj, A Kayssi
2013 Third International Conference on Communications and Information …, 2013
362013
A comprehensive reputation-based trust model for distributed systems
A Tajeddine, A Kayssi, A Chehab, H Artail
Workshop of the 1st International Conference on Security and Privacy for …, 2005
322005
PATROL: a comprehensive reputation-based trust model
A Tajeddine, A Kayssi, A Chehab, H Artail
International Journal of Internet Technology and Secured Transactions 1 (1-2 …, 2007
312007
Android SMS malware: Vulnerability and mitigation
K Hamandi, A Chehab, IH Elhajj, A Kayssi
2013 27th International Conference on Advanced Information Networking and …, 2013
302013
Trends in mobile agent applications
M Eid, H Artail, A Kayssi, A Chehab
Journal of Research and Practice in Information Technology 37 (4), 323, 2005
302005
SDN VANETs in 5G: An architecture for resilient security services
A Hussein, IH Elhajj, A Chehab, A Kayssi
2017 Fourth International Conference on Software Defined Systems (SDS), 67-74, 2017
292017
The system can't perform the operation now. Try again later.
Articles 1–20