Fadi El-Moussa

Affiliations:
  • British Telecom, Ipswich, United Kingdom


According to our database1, Fadi El-Moussa authored at least 22 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Systematic Review of Data-Driven Attack Detection Trends in IoT.
Sensors, August, 2023

Identification of Important Features at Different IoT layers for Dynamic Attack Detection.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2021
A trust model for popular smart home devices.
Int. J. Inf. Sec., 2021

2020
A Deep Learning Approach Combining Autoencoder with One-class SVM for DDoS Attack Detection in SDNs.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020

2019
Data Protection as a Service in the Multi-Cloud Environment.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Automated Detection of the Early Stages of Cyber Kill Chain.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A System for Detecting Targeted Cyber-Attacks Using Attack Patterns.
Proceedings of the Information Systems Security and Privacy, 2017

A Collaborative Tool for Modelling Multi-stage Attacks.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Managed security service distribution model.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Integrating Security Services in Cloud Service Stores.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Characteristic-based security analysis of personal networks.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Privacy in the Age of Mobility and Smart Devices in Smart Homes.
Proceedings of the 2012 International Conference on Privacy, 2012

Security framework for smart devices.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture.
Proceedings of the Cloud Computing - Third International Conference, 2012

2010
Collaborative defence as a pervasive service: architectural insights and validation methodologies of a trial deployment.
Int. J. Sens. Networks, 2010

2009
Collaborative defense as a pervasive service Architectural insights and validation methodologies of a trial deployment.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Overview of SIP Attacks and Countermeasures.
Proceedings of the Information Security and Digital Forensics, 2009

2007
Active router approach to defeating denial-of-service attacks in networks.
IET Commun., 2007


  Loading...