Ali Chehab

Orcid: 0000-0002-1939-2740

According to our database1, Ali Chehab authored at least 260 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models.
Mach. Learn. Knowl. Extr., March, 2024

Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications.
CoRR, 2024

2023
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms.
J. Inf. Secur. Appl., August, 2023

Machine learning-based anti-jamming technique at the physical layer.
Concurr. Comput. Pract. Exp., 2023

LESCA: LightwEight Stream Cipher Algorithm for emerging systems.
Ad Hoc Networks, 2023

High-Density FeFET-based CAM Cell Design Via Multi-Dimensional Encoding.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

2022
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems.
Veh. Commun., 2022

An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security.
Telecommun. Syst., 2022

Group LARS-Based Iterative Reweighted Least Squares Methodology for Efficient Statistical Modeling of Memory Designs.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Novel one round message authentication scheme for constrained IoT devices.
J. Ambient Intell. Humaniz. Comput., 2022

Network coding and MPTCP: Enhancing security and performance in an SDN environment.
J. Inf. Secur. Appl., 2022

Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms.
J. Inf. Secur. Appl., 2022

A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices.
IEEE Internet Things J., 2022

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations.
Internet Things, 2022

Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations.
Int. J. Inf. Sec., 2022

A machine learning based framework for IoT device identification and abnormal traffic detection.
Trans. Emerg. Telecommun. Technol., 2022

Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning.
Comput. Networks, 2022

Mutated traffic detection and recovery: an adversarial generative deep learning approach.
Ann. des Télécommunications, 2022

Efficient and secure selective cipher scheme for MIoT compressed images.
Ad Hoc Networks, 2022

Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

Using Siamese Neural Networks for Efficient and Accurate IoT Device Identification.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

2021
TRESC: Towards redesigning existing symmetric ciphers.
Microprocess. Microsystems, November, 2021

Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme.
Wirel. Networks, 2021

Optimal Packet Camouflage Against Traffic Analysis.
ACM Trans. Priv. Secur., 2021

Message authentication algorithm for OFDM communication systems.
Telecommun. Syst., 2021

Data representation for CNN based internet traffic classification: a comparative study.
Multim. Tools Appl., 2021

OPriv: Optimizing Privacy Protection for Network Traffic.
J. Sens. Actuator Networks, 2021

Efficient data confidentiality scheme for 5G wireless NOMA communications.
J. Inf. Secur. Appl., 2021

Security of Power Line Communication systems: Issues, limitations and existing solutions.
Comput. Sci. Rev., 2021

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations.
CoRR, 2021

A Survey on Ethical Hacking: Issues and Challenges.
CoRR, 2021

Efficient and robust data availability solution for hybrid PLC/RF systems.
Comput. Networks, 2021

Physical layer security for NOMA: limitations, issues, and recommendations.
Ann. des Télécommunications, 2021

Centralization vs. De-Centralization: Where Does the Network Control Plane Stand?
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Blockchain Development Platforms: Performance Comparison.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Efficient and Robust Keyed Hash Function Based on Artificial Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

2020
Physical layer security schemes for MIMO systems: an overview.
Wirel. Networks, 2020

Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN.
IEEE Netw., 2020

Efficient & secure image availability and content protection.
Multim. Tools Appl., 2020

ESSENCE: GPU-based and dynamic key-dependent efficient stream cipher for multimedia contents.
Multim. Tools Appl., 2020

Cyber-physical systems security: Limitations, issues and future trends.
Microprocess. Microsystems, 2020

Security analysis of drones systems: Attacks, limitations, and recommendations.
Internet Things, 2020

LoRaWAN security survey: Issues, threats and possible mitigation techniques.
Internet Things, 2020

Lightweight multi-factor mutual authentication protocol for IoT devices.
Int. J. Inf. Sec., 2020

Securing internet of medical things systems: Limitations, issues and recommendations.
Future Gener. Comput. Syst., 2020

Performance analysis of SDN vs OSPF in diverse network environments.
Concurr. Comput. Pract. Exp., 2020

Efficient and secure multi-homed systems based on binary random linear network coding.
Comput. Electr. Eng., 2020

A review on machine learning-based approaches for Internet traffic classification.
Ann. des Télécommunications, 2020

DistLog: A distributed logging scheme for IoT forensics.
Ad Hoc Networks, 2020

Network Obfuscation for Net Worth Security.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Efficient and Secure Statistical Port Scan Detection Scheme.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

Physical Layer Anti-jamming Technique Using Massive Planar Antenna Arrays.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Overview of Digital Forensics and Anti-Forensics Techniques.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Efficient and Secure Cipher Scheme for Limited IoT Devices.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

An Efficient and Secure Cipher Scheme for Filter Bank Multi-Carrier Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Efficient and Secure Statistical DDoS Detection Scheme.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

A Lightweight Reconfigurable RRAM-based PUF for Highly Secure Applications.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2020

Towards Securing LoRaWAN ABP Communication System.
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020

2019
Secure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach.
IEEE Wirel. Commun., 2019

Efficient & secure cipher scheme with dynamic key-dependent mode of operation.
Signal Process. Image Commun., 2019

A survey on OFDM physical layer security.
Phys. Commun., 2019

Efficient and secure cipher scheme for multimedia contents.
Multim. Tools Appl., 2019

Lightweight, dynamic and efficient image encryption scheme.
Multim. Tools Appl., 2019

A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach.
Mob. Networks Appl., 2019

An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach.
IEEE Internet Things J., 2019

Efficient Chaotic Encryption Scheme with OFB Mode.
Int. J. Bifurc. Chaos, 2019

3D Beamforming With Massive Cylindrical Arrays for Physical Layer Secure Data Transmission.
IEEE Commun. Lett., 2019

Crowdsourcing for click fraud detection.
EURASIP J. Inf. Secur., 2019

AdaptiveMutate: a technique for privacy preservation.
Digit. Commun. Networks, 2019

Automatic Target Detection for Sparse Hyperspectral Images.
CoRR, 2019

Modelling Cognitive Bias in Crowdsourcing Systems.
Cogn. Syst. Res., 2019

Design and realization of efficient & secure multi-homed systems based on random linear network coding.
Comput. Networks, 2019

Preserving data security in distributed fog computing.
Ad Hoc Networks, 2019

RRAM Device Models: A Comparative Analysis With Experimental Validation.
IEEE Access, 2019

Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

An Efficient and Secure Variant of RC4 Stream Cipher Scheme for Emerging Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Lightweight and Secure D2D Authentication & Key Management Based on PLS.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Efficient & Secure Physical Layer Cipher Scheme for VLC Systems.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Enhancing Multipath TCP Security Through Software Defined Networking.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Machine Learning for Network Resiliency and Consistency.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery.
Proceedings of the Machine Learning for Networking, 2019

Joint Security and Energy Efficiency in IoT Networks Through Clustering and Bit Flipping.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Mobile Traffic Anonymization Through Probabilistic Distribution.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

Massive Planar Antenna Arrays for Physical Layer Security.
Proceedings of the Fourth International Conference on Advances in Computational Tools for Engineering Applications, 2019

2018
High Order Multi-User MIMO Subspace Detection.
J. Signal Process. Syst., 2018

Identity Based Key Distribution Framework for Link Layer Security of AMI Networks.
IEEE Trans. Smart Grid, 2018

Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis.
IEEE Trans. Commun., 2018

Power Control and Channel Allocation for D2D Underlaid Cellular Networks.
IEEE Trans. Commun., 2018

Network Programming and Probabilistic Sketching for Securing the Data Plane.
Secur. Commun. Networks, 2018

A new efficient lightweight and secure image cipher scheme.
Multim. Tools Appl., 2018

A dynamic approach for a lightweight and secure cipher for medical images.
Multim. Tools Appl., 2018

One round cipher algorithm for multimedia IoT devices.
Multim. Tools Appl., 2018

A lightweight write-assist scheme for reduced RRAM variability and power.
Microelectron. Reliab., 2018

Mobile Apps identification based on network flows.
Knowl. Inf. Syst., 2018

When Quantized Massive MIMO Meets Large MIMO With Higher Order Modulation.
IEEE Commun. Lett., 2018

IoT survey: An SDN and fog computing perspective.
Comput. Networks, 2018

A fairness-based congestion control algorithm for multipath TCP.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Joint channel allocation and power control for D2D communications using stochastic geometry.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

MMSE Detection for 1-Bit Quantized Massive MIMO with Imperfect Channel Estimation.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

Pushing intelligence to the network edge.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Machine learning for network resilience: The start of a journey.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

Network convergence in SDN versus OSPF networks.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

SDN for QUIC: an enhanced architecture with improved connection establishment.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

A Network Management Framework for SDN.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

A Multi-level Internet Traffic Classifier Using Deep Learning.
Proceedings of the 9th International Conference on the Network of the Future, 2018

S-DES: An efficient & secure DES variant.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Double error cellular automata-based error correction with skip-mode compact syndrome coding for resilient PUF design.
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018

Channel-Punctured Large MIMO Detection.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

App traffic mutation: Toward defending against mobile statistical traffic analysis.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Low power GDI ALU design with mixed logic adder functionality.
Proceedings of the 2018 International Conference on IC Design & Technology, 2018

Memristor models optimization for large-scale 1T1R memory arrays.
Proceedings of the 2018 International Conference on IC Design & Technology, 2018

Adaptive Optimization for Hybrid Network Control Planes.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Low-power and high-speed shift-based multiplier for error tolerant applications.
Microprocess. Microsystems, 2017

Modulation Classification via Subspace Detection in MIMO Systems.
IEEE Commun. Lett., 2017

A privacy-enhanced computationally-efficient and comprehensive LTE-AKA.
Comput. Commun., 2017

A Distance-Based Power Control Scheme for D2D Communications Using Stochastic Geometry.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Software Defined IoT security framework.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

SDN VANETs in 5G: An architecture for resilient security services.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Fuzzy decision system for technology choice in hybrid networks.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Hard-output chase detectors for large MIMO: BER performance and complexity analysis.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

QoS guarantee over hybrid SDN/non-SDN networks.
Proceedings of the 8th International Conference on the Network of the Future, 2017

A Multi-Gbps Fully Pipelined Layered Decoder for IEEE 802.11n/ac/ax LDPC Codes.
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017

Regularized logistic regression for fast importance sampling based SRAM yield analysis.
Proceedings of the 18th International Symposium on Quality Electronic Design, 2017

Flow-based Intrusion Detection System for SDN.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Yield and energy tradeoffs of an NVLatch design using radial sampling.
Proceedings of the 2017 IEEE International Conference on IC Design and Technology, 2017

Virtualized network views for localizing misbehaving sources in SDN data planes.
Proceedings of the IEEE International Conference on Communications, 2017

SDN for MPTCP: An enhanced architecture for large data transfers in datacenters.
Proceedings of the IEEE International Conference on Communications, 2017

Multi-level security for the 5G/IoT ubiquitous network.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

Oxide-based RRAM models for circuit designers: A comparative analysis.
Proceedings of the 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2017

2016
Low-complexity joint modulation classification and detection in MU-MIMO.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Efficient near-optimal 8×8 MIMO detector.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

NCaaS: network configuration as a service in SDN-driven cloud architectures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Solving sybil attacks using evolutionary game theory.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A crowdsourcing game-theoretic intrusion detection and rating system.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Identity-based authentication scheme for the Internet of Things.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

SDN verification plane for consistency establishment.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Efficient near optimal joint modulation classification and detection for MU-MIMO systems.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Efficient subspace detection for high-order MIMO systems.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

SDN Security Plane: An Architecture for Resilient Security Services.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Interlaced Column-Row Message-Passing Schedule for Decoding LDPC Codes.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs.
Proceedings of the 3rd International Conference on Advances in Computational Tools for Engineering Applications, 2016

2015
Partial mobile application offloading to the cloud for energy-efficiency with security measures.
Sustain. Comput. Informatics Syst., 2015

CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks.
Sensors, 2015

Messaging Attacks on Android: Vulnerabilities and Intrusion Detection.
Mob. Inf. Syst., 2015

Energy-Efficient Security for Voice over IP.
Int. J. Netw. Secur., 2015

G-Route: an energy-aware service routing protocol for green cloud computing.
Clust. Comput., 2015

Comparison of in-app ads traffic in different ad networks.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Edge computing enabling the Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Algorithmic Optimizations in the HMAX Model Targeted for Efficient Object Recognition.
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2015

Efficient Implementation of a Recognition System using the Cortex Ventral Stream Model.
Proceedings of the VISAPP 2015, 2015

Low-complexity MIMO detector with 1024-QAM.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Likelihood-based modulation classification for MU-MIMO systems.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

An architecture for the Internet of Things with decentralized data and centralized control.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Decentralised malicious node detection in WSN.
Int. J. Space Based Situated Comput., 2014

An energy-aware design methodology based on kernel optimisations.
Int. J. Auton. Adapt. Commun. Syst., 2014

ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud.
Future Gener. Comput. Syst., 2014

Fast dynamic internet mapping.
Future Gener. Comput. Syst., 2014

CAVE: Hybrid Approach for In-Network Content Caching.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

PUF and ID-based key distribution security framework for advanced metering infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Statistical methodology for modeling non-IID memory fails events.
Proceedings of the Fifteenth International Symposium on Quality Electronic Design, 2014

Robust bias temperature instability refresh design and methodology for memory cell recovery.
Proceedings of the 2014 IEEE International Conference on IC Design & Technology, 2014

"Server-less" Social Network for Enhanced Privacy.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

ALPS: The Accountable Cloud Protocol Stack.
Proceedings of the CLOSER 2014, 2014

DAIDS: An Architecture for Modular Mobile IDS.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

IP Spoofing Detection Using Modified Hop Count.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Application-Aware Fast Dormancy in LTE.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Mobile malware exposed.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

CrowdApp: Crowdsourcing for application rating.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

Smartphone sensors as random bit generators.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

DAGGER: Distributed architecture for granular mitigation of mobile based attacks.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

3G to Wi-Fi offloading on Android.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Evaluation of Low-Power Computing when Operating on Subsets of Multicore Processors.
J. Signal Process. Syst., 2013

Effects of workload variation on the energy distribution in a mobile platform.
Microprocess. Microsystems, 2013

Perception-aware packet-loss resilient compression for networked haptic systems.
Comput. Commun., 2013

SNUAGE: an efficient platform-as-a-service security framework for the cloud.
Clust. Comput., 2013

W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi.
Proceedings of the 2013 Wireless Telecommunications Symposium, 2013

User experience-based mechanism for preserving energy in graphics-intensive applications.
Proceedings of the IEEE 11th International New Circuits and Systems Conference, 2013

Energy-efficient truncated multipliers with scaling.
Proceedings of the 8th International Design and Test Symposium, 2013

Low-power digital signal processor design for a hearing aid.
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013

Energy-efficient HEVC using stochastic processing.
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013

Energy efficiency in Mobile Cloud Computing: Total offloading selectively works. Does selective offloading totally work?
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013

Energy-efficient truncated multipliers.
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013

TABSH: Tag-based stochastic hardware.
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013

Internal security attacks on SCADA systems.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

Accountable energy monitoring for green service routing in the cloud.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

A resource reservation attack against LTE networks.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

Low overhead anonymous routing.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Android SMS Malware: Vulnerability and Mitigation.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Effects of Signaling Attacks on LTE Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Malicious Node Detection in Wireless Sensor Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
BGP-inspired autonomic service routing for the cloud.
Proceedings of the ACM Symposium on Applied Computing, 2012

CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Android SMS botnet: a new perspective.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

Signaling oriented denial of service on LTE networks.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

Optimized conditional privacy preservation in VANETs.
Proceedings of the 19th International Conference on Telecommunications, 2012

Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System.
Proceedings of the 19th International Conference on Telecommunications, 2012

Energy efficient JPEG using stochastic processing.
Proceedings of the International Conference on Energy Aware Computing, 2012

Stochastic hardware architectures: A survey.
Proceedings of the International Conference on Energy Aware Computing, 2012

2011
E<sup>2</sup>VoIP<sup>2</sup>: Energy efficient voice over IP privacy.
Comput. Secur., 2011

Fuzzy reputation-based trust model.
Appl. Soft Comput., 2011

Low-power adder design techniques for noise-tolerant applications.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2011

Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

A design methodology for energy aware neural networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

A novel technique to measure data retention voltage of large SRAM arrays.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

The effectiveness of delay and IDDT tests in detecting resistive open defects for nanometer CMOS adder circuits.
Proceedings of the 6th IEEE International Design and Test Workshop, 2011

A decentralized energy-aware key management scheme for Wireless Sensor Networks.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Secure delay-tolerant communications in the presence of oppressive governments.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

A PUF-based ultra-lightweight mutual-authentication RFID protocol.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Assessing testing techniques for resistive-open defects in nanometer CMOS adders.
Proceedings of the 18th IEEE International Conference on Electronics, Circuits and Systems, 2011

H-TRACE: A hybrid energy-aware routing scheme for mobile ad hoc networks.
Proceedings of the International Conference on Energy Aware Computing, 2011

CloudESE: Energy efficiency model for cloud computing environments.
Proceedings of the International Conference on Energy Aware Computing, 2011

Energy-efficient platform-as-a-service security provisioning in the cloud.
Proceedings of the International Conference on Energy Aware Computing, 2011

Energy consumption breakdown of a modern mobile platform under various workloads.
Proceedings of the International Conference on Energy Aware Computing, 2011

Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
Proceedings of the CLOSER 2011, 2011

2010
STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments.
Int. J. Dependable Trust. Inf. Syst., 2010

Slow but certain wins the race: authenticated bundle communication in delay tolerant networks.
Proceedings of the Q2SWinet'10, 2010

Transient current and delay analysis for resistive-open defects in future 16 nm CMOS circuits.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks.
Proceedings of the Global Communications Conference, 2010

Testing techniques for resistive-open defects in future CMOS technologies.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010

A Privacy-Preserving Trust Model for VANETs.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
The design and implementation of an ad hoc network of mobile devices using the LIME II tuple-space framework.
IEEE Wirel. Commun., 2009

Wireless Sensor for Continuous Real-Time Oil Spill Thickness and Location Measurement.
IEEE Trans. Instrum. Meas., 2009

Smart encryption channels for securing virtual machine-based networked applications.
Secur. Commun. Networks, 2009

Policy-driven and Content-based Web Services Security Gateway.
Int. J. Netw. Secur., 2009

Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain.
Proceedings of the NTMS 2009, 2009

PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
Ring of Masters (ROM): A new ring structure for Bluetooth scatternets with dynamic routing and adaptive scheduling schemes.
Pervasive Mob. Comput., 2008

LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System.
Int. J. Netw. Secur., 2008

2007
Lighter Weight Mobile Agent System.
Int. J. Comput. Their Appl., 2007

An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

XPRIDE: Policy-Driven Web Services Security Based on XML Content.
Proceedings of the Global Communications Conference, 2007

Personalized Web Page Ranking Using Trust and Similarity.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

SmartSSL: Efficient Policy-Based Web Security.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices.
Int. J. Netw. Secur., 2006

Network Setup for Secure Routing in Inter-Vehicle Communication Networks.
Int. J. Bus. Data Commun. Netw., 2006

Scaling of i<sub>DDT</sub> Test Methods for Random Logic Circuits.
J. Electron. Test., 2006

Reputation-Based Algorithm for Managing Trust in File Sharing Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

An enterprise policy-based security protocol for protecting relational database network objects.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Cylindrical Antenna Arrays for WCDMA Downlink Capacity Enhancement.
Proceedings of IEEE International Conference on Communications, 2006

PRIDE: Policy-Driven Web Security for Handheld Wireless Devices.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
A trust model for distributed systems based on reputation.
Int. J. Web Grid Serv., 2005

Trends in Mobile Agent Applications.
J. Res. Pract. Inf. Technol., 2005

Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
8085 microprocessor simulation tool "8085 SimuKit".
Comput. Appl. Eng. Educ., 2004

TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation.
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004

Transient Current Testing of Dynamic CMOS Circuits.
Proceedings of the 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 2004

2002
IDDT Test Methodologies for Very Deep Sub-micron CMOS Circuits.
Proceedings of the 1st IEEE International Workshop on Electronic Design, 2002


  Loading...