Abed Ellatif Samhat

Orcid: 0000-0002-1137-621X

According to our database1, Abed Ellatif Samhat authored at least 83 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-based multi-organizational cyber risk management framework for collaborative environments.
Int. J. Inf. Sec., April, 2024

2023
Joint throughput-energy optimization in multi-gateway LoRaWAN networks.
Telecommun. Syst., October, 2023

A Seamless Integration Solution for LoRaWAN Into 5G System.
IEEE Internet Things J., September, 2023

High-level power estimation techniques in embedded systems hardware: an overview.
J. Supercomput., March, 2023

A formal verification approach for composite smart contracts security using FSM.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Secure proxy MIPv6-based mobility solution for LPWAN.
Wirel. Networks, 2023

Improving Energy Efficiency in LoRaWAN Networks with Multiple Gateways.
Sensors, 2023

Access selection in heterogeneous wireless networks based on user preferences.
Int. J. Intell. Syst. Technol. Appl., 2023

Caching-aided coded multicasting in dynamic scenarios.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Energy Efficiency Enhancement for LoRaWAN Networks with Multiple Gateways.
Proceedings of the IEEE International Conference on Communications, 2023

VNFO-DCSC: A Novel Secure End-to-End NFV Marketplace Using Dynamic Composite Smart Contracts.
Proceedings of the IEEE Global Communications Conference, 2023

High-Level Online Power Monitoring of FPGA IP Based on Machine Learning.
Proceedings of the Design and Architecture for Signal and Image Processing, 2023

Throughput Improvement for LoRaWAN Networks Considering IoT Applications Priority.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023

Vulnerability and Threat Assessment Framework for Internet of Things Systems.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023

Demystifying Threshold Elliptic Curve Digital Signature Algorithm for MultiParty Applications.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
Lebanon Solar Rooftop Potential Assessment Using Buildings Segmentation From Aerial Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Battery-Less LoRaWAN Network using Energy Harvesting: Improving Network Throughput.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022

High-Level Early Power Estimation of FPGA IP Based on Machine Learning.
Proceedings of the 29th IEEE International Conference on Electronics, Circuits and Systems, 2022

2021
Privacy preservation of genome data analysis using homomorphic encryption.
Serv. Oriented Comput. Appl., 2021

Computing Resource Allocation Scheme for DAG-Based IOTA Nodes.
Sensors, 2021

Towards an ultra lightweight block ciphers for Internet of Things.
J. Inf. Secur. Appl., 2021

Buildings Classification using Very High Resolution Satellite Imagery.
CoRR, 2021

Solar Potential Assessment using Multi-Class Buildings Segmentation from Aerial Images.
CoRR, 2021

Overview of the mobility related security challenges in LPWANs.
Comput. Networks, 2021

Tangle the Blockchain: Towards Connecting Blockchain and DAG.
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021

Smart Contract Based Solution for Secure Distributed SDN.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

An Automated and Centralized Data Generation and Acquisition System.
Proceedings of the 28th IEEE International Conference on Electronics, 2021

2020
Verification of smart contracts: A survey.
Pervasive Mob. Comput., 2020

An efficient fully homomorphic symmetric encryption algorithm.
Multim. Tools Appl., 2020

Mobility Management With Session Continuity During Handover in LPWAN.
IEEE Internet Things J., 2020

Media independent solution for mobility management in heterogeneous LPWAN technologies.
Comput. Networks, 2020

On the Verification of Smart Contracts: A Systematic Review.
Proceedings of the Blockchain - ICBC 2020, 2020

Cloud Assisted Privacy Preserving Using Homomorphic Encryption.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

2019
Trust model for secure group leader-based communications in VANET.
Wirel. Networks, 2019

Misbehavior detection and efficient revocation within VANET.
J. Inf. Secur. Appl., 2019

Mesh HDR WPAN resource allocation optimization approaches.
Int. Arab J. Inf. Technol., 2019

Internet of Mobile Things: Overview of LoRaWAN, DASH7, and NB-IoT in LPWANs Standards and Supported Mobility.
IEEE Commun. Surv. Tutorials, 2019

Hop-2 IEEE 802.15.5 Optimization framework for Resource Allocation with Service Differentiation.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

Implementation of SCHC in NS-3 and Comparison with 6LoWPAN.
Proceedings of the 26th International Conference on Telecommunications, 2019

An Efficient FHE Scheme to Secure Cloud Computing.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

A Trusted Group-Based Revocation Process for Intelligent Transportation System.
Proceedings of the Digital Economy. Emerging Technologies and Business Innovation, 2019

Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT Environment.
Proceedings of the Hybrid Intelligent Systems, 2019

SCHC-Based Solution for Roaming in LoRaWAN.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
Energy Efficient Resource Sharing in Multi-Operator Heterogeneous Cloud RAN.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

A security solution for V2V communication within VANETs.
Proceedings of the 2018 Wireless Days, 2018

Overview and Measurement of Mobility in DASH7.
Proceedings of the 25th International Conference on Telecommunications, 2018

Resource Allocation for D2D Communications in Mobile Networks.
Proceedings of the 2018 International Conference on Computer and Applications (ICCA), 2018

Trustless Blockchain-based Access Control in Dynamic Collaboration.
Proceedings of the 1st International Conference on Big Data and Cyber-Security Intelligence, 2018

Optimization Framework for Resource Allocation in IEEE 802.15.5 Hop-1.
Proceedings of the International Arab Conference on Information Technology, 2018

2017
Radio Access Network Sharing in 5G: Strategies and Benefits.
Wirel. Pers. Commun., 2017

VANet security challenges and solutions: A survey.
Veh. Commun., 2017

Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications.
J. Inf. Secur. Appl., 2017

On DGHV and BGV fully homomorphic encryption schemes.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications.
Proceedings of the Risks and Security of Internet and Systems, 2017

2015
Resource allocation mechanism in IEEE 802.15.3 parent/child model.
Wirel. Networks, 2015

Pricing strategies in multi-operator heterogeneous wireless networks.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Group-based authentication in V2V communications.
Proceedings of the 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications, 2015

Access selection and joint pricing in multi-operator wireless networks: A Stackelberg game.
Proceedings of the 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications, 2015

2014
Resource Allocation in High Data Rate Mesh WPAN: A Survey Paper.
Wirel. Pers. Commun., 2014

Admission control and resource allocation strategies for IEEE 802.15.5.
EURASIP J. Wirel. Commun. Netw., 2014

Best Operator Policy in a Heterogeneous Wireless Network.
CoRR, 2014

Hybrid Decision Algorithm for Access Selection in Multi-operator Networks.
CoRR, 2014

Hybrid decision algorithm for access selection in multi-operator networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Admission control and resource allocation in IEEE 802.15.5 HDR WPAN.
Proceedings of the 2014 International Conference and Workshop on the Network of the Future, 2014

2013
Dynamic superframe size-based admission control in parent/child HR WPANs.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

2010
ABCDecision: A Simulation Platform for Access Selection Algorithms in Heterogeneous Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010

2009
Analytical framework for dimensioning hierarchical WiMax-WiFi networks.
Comput. Networks, 2009

2008
A Layer 2 Scheme of Inter-RAT Handover between UMTS and WiMAX.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

A layer 2 scheme for inter-RAT handover between UMTS and WiMAX in tight coupling architecture.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A Cross-Layer Scheme for Inter-RAT Handover from WiMAX to UMTS.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Dimensioning Hierarchical WiMax-WiFi Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
A New Approach of UMTS-WLAN Load Balancing; Algorithm and its Dynamic Optimization.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Fluid Model for Wireless Adhoc Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Security and AAA Architecture for WiFi-WiMAX Mesh Network.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

2006
Modelling and Radio Resource Management in IEEE 802.11B WLAN for Semi-Dynamic Simulator.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Performance analysis of the IEEE 802.11 DCF with imperfect radio conditions.
Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), 2006

2005
IP versus AAL2 for transport in the UMTS radio access network.
Comput. Commun., 2005

IP-based transport of voice traffic in the UMTS radio access network: analytical study and empirical validation.
Ann. des Télécommunications, 2005

On the QoS-capable transport in the IP-based UTRAN.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

2004
Measurement-based admission control in UMTS.
Ann. des Télécommunications, 2004

Modeling and analysis of transport of voice and data in the UMTS radio access network: IP versus AAL2/ATM.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Priority Queuing for IP-Based Service Differentiation in the UMTS Radio Access Network.
Proceedings of the NETWORKING 2004, 2004

Transport in IP-based UMTS radio access network: analytical study and empirical validation.
Proceedings of IEEE International Conference on Communications, 2004


  Loading...