Ali Chehab
TitleCited byYear
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
W Itani, A Kayssi, A Chehab
2009 Eighth IEEE International Conference on Dependable, Autonomic and …, 2009
The state of the art in intrusion prevention and detection
ASK Pathan
Auerbach Publications, 2014
Edge computing enabling the Internet of Things
O Salman, I Elhajj, A Kayssi, A Chehab
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015
Energy-efficient incremental integrity for securing storage in mobile cloud computing
W Itani, A Kayssi, A Chehab
2010 International Conference on Energy Aware Computing, 1-2, 2010
SDN controllers: A comparative study
O Salman, IH Elhajj, A Kayssi, A Chehab
2016 18th Mediterranean Electrotechnical Conference (MELECON), 1-6, 2016
Fuzzy reputation-based trust model
A Tajeddine, A Kayssi, A Chehab, H Artail
Applied soft computing 11 (1), 345-355, 2011
A privacy-preserving trust model for VANETs
A Tajeddine, A Kayssi, A Chehab
2010 10th IEEE International Conference on Computer and Information …, 2010
Trummar-a trust model for mobile agent systems based on reputation
G Derbas, A Kayssi, H Artail, A Chehab
The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004 …, 2004
DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks
RZ El Kaissi, A Kayssi, A Chehab, Z Dawy
American University of Beirut, Department of Electrical and Computer Engineering, 2005
Wireless sensor for continuous real-time oil spill thickness and location measurement
H Denkilkian, A Koulakezian, R Ohannessian, MS Chalfoun, MKW Joujou, ...
IEEE Transactions on Instrumentation and Measurement 58 (12), 4001-4011, 2009
Identity-based authentication scheme for the internet of things
O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi
2016 IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016
Trends in mobile agent applications
M Eid, H Artail, A Kayssi, A Chehab
Journal of Research and Practice in Information Technology 37 (4), 323, 2005
PATROL: a comprehensive reputation-based trust model
A Tajeddine, A Kayssi, A Chehab, H Artail
International Journal of Internet Technology and Secured Transactions 1 (1-2 …, 2007
PATROL-F–a comprehensive reputation-based trust model with fuzzy subsystems
A Tajeddine, A Kayssi, A Chehab, H Artail
International Conference on Autonomic and Trusted Computing, 205-216, 2006
A comprehensive reputation-based trust model for distributed systems
A Tajeddine, A Kayssi, A Chehab, H Artail
Workshop of the 1st International Conference on Security and Privacy for …, 2005
Signaling oriented denial of service on LTE networks
R Bassil, A Chehab, I Elhajj, A Kayssi
Proceedings of the 10th ACM international symposium on Mobility management …, 2012
i/sub DDT/test methodologies for very deep sub-micron CMOS circuits
A Chehab, R Makki, M Spica, D Wu
Proceedings First IEEE International Workshop on Electronic Design, Test and …, 2002
SCADA Intrusion Detection System based on temporal behavior of frequent patterns
N Sayegh, IH Elhajj, A Kayssi, A Chehab
MELECON 2014-2014 17th IEEE Mediterranean Electrotechnical Conference, 432-438, 2014
IoT survey: An SDN and fog computing perspective
O Salman, I Elhajj, A Chehab, A Kayssi
Computer Networks 143, 221-246, 2018
Privacy enhanced and computationally efficient HSK-AKA LTE scheme
K Hamandi, I Sarji, A Chehab, IH Elhajj, A Kayssi
2013 27th International Conference on Advanced Information Networking and …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20