Folgen
Mahdi Aiash
Titel
Zitiert von
Zitiert von
Jahr
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
A Le, J Loo, A Lasebae, M Aiash, Y Luo
International Journal of Communication Systems 25 (9), 1189-1212, 2012
1592012
A specification-based IDS for detecting attacks on RPL-based network topology
A Le, J Loo, KK Chai, M Aiash
Information 7 (2), 25, 2016
1512016
Security analysis of the constrained application protocol in the Internet of Things
TA Alghamdi, A Lasebae, M Aiash
Second international conference on future generation communication …, 2013
912013
Machine learning based botnet identification traffic
A Azab, M Alazab, M Aiash
2016 IEEE Trustcom/BigDataSE/ISPA, 1788-1794, 2016
842016
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms
F Sardis, G Mapp, J Loo, M Aiash, A Vinel
IEEE transactions on multimedia 15 (4), 769-777, 2013
792013
Secure live virtual machines migration: issues and solutions
M Aiash, G Mapp, O Gemikonakli
2014 28th International Conference on Advanced Information Networking and …, 2014
632014
Providing security in 4G systems: unveiling the challenges
M Aiash, G Mapp, A Lasebae, R Phan
2010 Sixth Advanced International Conference on Telecommunications, 439-444, 2010
562010
Exploring efficient imperative handover mechanisms for heterogeneous wireless networks
G Mapp, F Shaikh, M Aiash, RP Vanni, M Augusto, E Moreira
2009 International Conference on Network-Based Information Systems, 286-291, 2009
422009
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR
M Aiash, G Mapp, A Lasebae, R Phan, J Loo
EURASIP Journal on Wireless Communications and Networking 2012 (1), 1-23, 2012
342012
Exploring multi-homing issues in heterogeneous environments
G Mapp, M Aiash, HC Guardia, J Crowcroft
2011 IEEE Workshops of International Conference on Advanced Information …, 2011
272011
Software defined networking for wireless sensor networks: a survey
MA Hassan, QT Vien, M Aiash
Advances in Wireless Communications and Networks 3 (2), 10-22, 2017
262017
Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments
G Mapp, F Katsriku, M Aiash, N Chinnam, R Lopes, E Moreira, ...
Journal of Computer Networks and Communications 2012, 2012
252012
From fixed to mobile femtocells in LTE systems: Issues and challenges
R Raheem, A Lasebae, M Aiash, J Loo
Second International Conference on Future Generation Communication …, 2013
222013
Security models for heterogeneous networking
G Mapp, M Aiash, A Lasebae, R Phan
2010 International Conference on Security and Cryptography (SECRYPT), 1-4, 2010
222010
Formal verification and analysis of primary authentication based on 5G-AKA protocol
EKK Edris, M Aiash, JKK Loo
2020 Seventh International Conference on Software Defined Systems (SDS), 256-261, 2020
192020
Toward an efficient ontology-based event correlation in SIEM
T Kenaza, M Aiash
Procedia Computer Science 83, 139-146, 2016
192016
Exploring a new security framework for cloud storage using capabilities
G Mapp, M Aiash, B Ondiege, M Clarke
2014 IEEE 8th International Symposium on Service Oriented System Engineering …, 2014
182014
Challenges and solutions for secure information centric networks: A case study of the netinf architecture
J Loo, M Aiash
Journal of Network and Computer Applications 50, 64-72, 2015
152015
Integrating mobility, quality-of-service and security in future mobile networks
M Aiash, G Mapp, A Lasebae, R Phan, J Loo
Electrical Engineering and Intelligent Systems, 195-206, 2013
152013
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKS
AL Mahdi Aiash, Glenford Mapp
International Journal of Network Security & Its Applications (IJNSA) 4 (4), 2012
15*2012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20