Follow
Ali Chehab
Title
Cited by
Cited by
Year
Security analysis of drones systems: Attacks, limitations, and recommendations
JP Yaacoub, H Noura, O Salman, A Chehab
Internet of Things 11, 100218, 2020
6802020
Cyber-physical systems security: Limitations, issues and future trends
JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli
Microprocessors and microsystems 77, 103201, 2020
4922020
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
W Itani, A Kayssi, A Chehab
2009 Eighth IEEE International Conference on Dependable, Autonomic and …, 2009
4402009
Securing internet of medical things systems: Limitations, issues and recommendations
JPA Yaacoub, M Noura, HN Noura, O Salman, E Yaacoub, R Couturier, ...
Future Generation Computer Systems 105, 581-606, 2020
2932020
SDN controllers: A comparative study
O Salman, IH Elhajj, A Kayssi, A Chehab
2016 18th mediterranean electrotechnical conference (MELECON), 1-6, 2016
2892016
IoT survey: An SDN and fog computing perspective
O Salman, I Elhajj, A Chehab, A Kayssi
Computer Networks 143, 221-246, 2018
2452018
Edge computing enabling the Internet of Things
O Salman, I Elhajj, A Kayssi, A Chehab
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015
2452015
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
JPA Yaacoub, HN Noura, O Salman, A Chehab
International Journal of Information Security 21 (1), 115-158, 2022
2442022
A machine learning based framework for IoT device identification and abnormal traffic detection
O Salman, IH Elhajj, A Chehab, A Kayssi
Transactions on Emerging Telecommunications Technologies 33 (3), e3743, 2022
1582022
Identity-based authentication scheme for the Internet of Things
O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi
2016 IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016
1412016
LoRaWAN security survey: Issues, threats and possible mitigation techniques
H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab
Internet of Things 12, 100303, 2020
1312020
One round cipher algorithm for multimedia IoT devices
H Noura, A Chehab, L Sleem, M Noura, R Couturier, MM Mansour
Multimedia tools and applications 77, 18383-18413, 2018
1222018
A review on machine learning–based approaches for Internet traffic classification
O Salman, IH Elhajj, A Kayssi, A Chehab
Annals of Telecommunications 75 (11), 673-710, 2020
1112020
Energy-efficient incremental integrity for securing storage in mobile cloud computing
W Itani, A Kayssi, A Chehab
2010 International Conference on Energy Aware Computing, 1-2, 2010
1082010
Flow-based intrusion detection system for SDN
GA Ajaeiya, N Adalian, IH Elhajj, A Kayssi, A Chehab
2017 IEEE Symposium on Computers and Communications (ISCC), 787-793, 2017
972017
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
JPA Yaacoub, HN Noura, O Salman, A Chehab
Internet of Things and Cyber-Physical Systems 3, 280-308, 2023
832023
Lightweight multi-factor mutual authentication protocol for IoT devices
R Melki, HN Noura, A Chehab
International Journal of Information Security 19 (6), 679-694, 2020
802020
SDN VANETs in 5G: An architecture for resilient security services
A Hussein, IH Elhajj, A Chehab, A Kayssi
2017 Fourth international conference on software defined systems (SDS), 67-74, 2017
772017
A survey on OFDM physical layer security
R Melki, HN Noura, MM Mansour, A Chehab
Physical Communication 32, 1-30, 2019
752019
Fuzzy reputation-based trust model
A Tajeddine, A Kayssi, A Chehab, H Artail
Applied soft computing 11 (1), 345-355, 2011
712011
The system can't perform the operation now. Try again later.
Articles 1–20