Azzam Mourad

According to our database1, Azzam Mourad authored at least 83 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud.
IEEE Trans. Serv. Comput., 2020

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services.
IEEE/ACM Trans. Netw., 2020

FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory.
IEEE/ACM Trans. Netw., 2020

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment.
IEEE Trans. Netw. Serv. Manag., 2020

Reinforcement R-learning model for time scheduling of on-demand fog placement.
J. Supercomput., 2020

An endorsement-based trust bootstrapping approach for newcomer cloud services.
Inf. Sci., 2020

AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions.
IEEE Internet Things Mag., 2020

Cloud federation formation using genetic and evolutionary game theoretical models.
Future Gener. Comput. Syst., 2020

A two-level solution to fight against dishonest opinions in recommendation-based trust systems.
CoRR, 2020

Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions.
CoRR, 2020

A rewriting system for the assessment of XACML policies relationship.
Comput. Secur., 2020

Intelligent Performance-Aware Adaptation of Control Policies for Optimizing Banking Teller Process Using Machine Learning.
IEEE Access, 2020

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Towards Trust-Aware IoT Hashing Offloading in Mobile Edge Computing.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Optical Spatial Modulation with Improved Energy Harvesting for MIMO FSO Communications.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading.
IEEE Trans. Netw. Serv. Manag., 2019

Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability.
IEEE Trans. Cloud Comput., 2019

On the Detection of Passive Malicious Providers in Cloud Federations.
IEEE Commun. Lett., 2019

Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing.
Comput. Electr. Eng., 2019

An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation.
IEEE Access, 2019

Sampling Online Social Networks with Tailored Mining Strategies.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

2018
A novel on-demand vehicular sensing framework for traffic condition monitoring.
Veh. Commun., 2018

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game.
IEEE Trans. Serv. Comput., 2018

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach.
IEEE Access, 2018

Towards Proactive Social Learning Approach for Traffic Event Detection based on Arabic Tweets.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
Smart mobile computation offloading: Centralized selective and multi-objective approach.
Expert Syst. Appl., 2017

I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

On the Effects of User Ratings on the Profitability of Cloud Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks.
Expert Syst. Appl., 2016

A Stackelberg game for distributed formation of business-driven services communities.
Expert Syst. Appl., 2016

From model-driven specification to design-level set-based analysis of XACML policies.
Comput. Electr. Eng., 2016

Towards ad-hoc cloud based approach for mobile intrusion detection.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service.
Proceedings of the 7th International Conference on Ambient Systems, 2016

An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability.
Proceedings of the 7th International Conference on Ambient Systems, 2016

How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud?
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services.
Expert Syst. Appl., 2015

A survey on trust and reputation models for Web services: Single, composite, and communities.
Decis. Support Syst., 2015

AOMD approach for context-adaptable and conflict-free Web services composition.
Comput. Electr. Eng., 2015

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies.
Comput. Electr. Eng., 2015

Analyzing Social Web Services' Capabilities.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

Misbehavior Detection Framework for Community-Based Cloud Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Towards an offloading approach that augments multi-persona performance and viability.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol.
Wirel. Pers. Commun., 2014

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol.
Wirel. Pers. Commun., 2014

Assuring consistency in mixed models.
J. Comput. Sci., 2014

A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles.
Comput. Commun., 2014

Towards efficient evaluation of XACML policies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
XrML-RBLicensing approach adapted to the BPEL process of composite web services.
Serv. Oriented Comput. Appl., 2013

Common weaving approach in mainstream languages for software security hardening.
J. Syst. Softw., 2013

New XACML-AspectBPEL approach for composite web services security.
Int. J. Web Grid Serv., 2013

VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks.
Comput. Commun., 2013

Detecting attacks in QoS-OLSR protocol.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
A synergy between context-aware policies and AOP to achieve highly adaptable Web services.
Serv. Oriented Comput. Appl., 2012

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security.
Int. J. Web Grid Serv., 2012

Towards a BPEL model-driven approach for Web services security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Towards Smart Anti-Malwares for Battery-Powered Devices.
Proceedings of the 5th International Conference on New Technologies, 2012

2011
Towards context-adaptable Web service policies.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

New Approach Targeting Security Patterns Development and Deployment.
Inf. Secur. J. A Glob. Perspect., 2011

A cluster-based model for QoS-OLSR protocol.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Toward an abstract language on top of XACML for web services security.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Toward Systematic Integration of Security Policies into Web Services.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Security Evaluation and Hardening of Free and Open Source Software (FOSS).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

A Novel Approach for the Development and Deployment of Security Patterns.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

New approach for the dynamic enforcement of Web services security.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité.
Tech. Sci. Informatiques, 2009

New aspect-oriented constructs for security hardening concerns.
Comput. Secur., 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

2008
Wireless Applications: Middleware Security.
Encyclopedia of Wireless and Mobile Communications, 2008

A High-level Aspect-oriented-based Framework for Software Security Hardening.
Inf. Secur. J. A Glob. Perspect., 2008

An aspect-oriented approach for the systematic security hardening of code.
Comput. Secur., 2008

Towards Language-Independent Approach for Security Concerns Weaving.
Proceedings of the SECRYPT 2008, 2008

Cross-Language Weaving Approach Targeting Software Security Hardening.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

2007
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns.
Proceedings of the Security in Information Systems, 2007

A High-Level Aspect-Oriented based Language for Software Security Hardening.
Proceedings of the SECRYPT 2007, 2007

Control Flow Based Pointcuts for Security Hardening Concerns.
Proceedings of the Trust Management, 2007

A Security Hardening Language Based on Aspect-Orientation.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Towards an Aspect Oriented Approach for the Security Hardening of Code.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors.
Sci. Comput. Program., 2006

Security hardening of open source software.
Proceedings of the 2006 International Conference on Privacy, 2006

Security Design Patterns: Survey and Evaluation.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Accelerating embedded Java for mobile devices.
IEEE Commun. Mag., 2005

Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005


  Loading...