Farag Azzedin

Orcid: 0000-0001-9712-439X

According to our database1, Farag Azzedin authored at least 46 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Build-Launch-Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks.
J. Sens. Actuator Networks, February, 2024

2023
Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach.
IEEE Access, 2023

A Federated Learning Approach to Banking Loan Decisions.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation.
Sensors, 2022

A Layered Taxonomy of Internet of Things Attacks.
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022

2021
Towards Scalable and Efficient Architecture for Modeling Trust in IoT Environments.
Sensors, 2021

Security in Internet of Things: RPL Attacks Taxonomy.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

2020
Systematic Partitioning and Labeling XML Subtrees for Efficient Processing of XML Queries in IoT Environments.
IEEE Access, 2020

2019
Internet-of-Things and Information Fusion: Trust Perspective Survey.
Sensors, 2019

Performance Evaluation of VDI Environment.
CoRR, 2019

2018
Web Deception Towards Moving Target Defense.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

2017
Countermeasureing Zero Day Attacks: Asset-Based Approach.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

2016
Mitigating the effect of free riders in distributed systems: a trust-based approach.
Int. J. Sens. Networks, 2016

Modeling BitTorrent choking algorithm using game theory.
Future Gener. Comput. Syst., 2016

2014
Taxonomy of reputation assessment in peer-to-peer systems and analysis of their data retrieval.
Knowl. Eng. Rev., 2014

Interdomain Traffic Engineering Techniques to Overcome Undesirable Connectivity Incidents.
Proceedings of the Network and Parallel Computing, 2014

BitTorrent vulnerability to free riders: Root causes analysis.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

Analyzing and modeling BitTorrent: A game theory approach.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

2013
A scalable NAT-based solution to Internet access denial by higher-tier ISPs.
Secur. Commun. Networks, 2013

Survey of Disease Outbreak Notification Systems.
Proceedings of the International Conference on Advances in Computing, 2013

A methodology for designing trustworthy e-commerce applications.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Towards a scalable HDFS architecture.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

2012
Handling input/output operations in Web servers: issues and countermeasures.
Concurr. Comput. Pract. Exp., 2012

2011
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.
Proceedings of the 2011 International Conference on Cyberworlds, 2011

Internet access denial by higher-tier ISPS: A NAT-based solution.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

Dynamic peer-to-peer (P2P) solution to counter malicious higher Domain Name System (DNS) nameservers.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
Feedback behavior and its role in trust assessment for peer-to-peer systems.
Telecommun. Syst., 2010

Classifying and Tracking Free Riders in Multimedia-Based Systems.
J. Univers. Comput. Sci., 2010

Towards Trustworthy Peer-To-Peer Environments: An Appraisal Analysis Approach.
J. Next Gener. Inf. Technol., 2010

Impact of dishonesty and collusion on free riding in distributed multimedia systems.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Trust-based taxonomy for free riders in distributed multimedia systems.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Towards Designing Application Specific Trust Treated Model.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2009
A self-adapting Web server architecture: Towards higher performance and better utilization.
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009

2008
Recommendation Retrieval in Reputation Assessment for Peer-to-Peer Systems.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Performance Evaluation of Recommendation Retrieval in Peer-to-Peer Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

2006
Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids.
J. Grid Comput., 2006

Evaluation of Breast Cancer Tumor Classification with Unconstrained Functional Networks Classifier.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2004
A Synchronous Co-Allocation Mechanism for Grid Computing Systems.
Clust. Comput., 2004

A Trust Brokering System and Its Application to Resource Management in Public-Resource Grids.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

2003
Trust Modeling for Peer-to-Peer Based Computing Systems.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

2002
Mobile interfaces to computational, data, and service grid systems.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2002

Integrating Trust into Grid Resource Management Systems.
Proceedings of the 31st International Conference on Parallel Processing (ICPP 2002), 2002

MetaGrid: A Scalable Framework for Wide-Area Service Deployment and Management .
Proceedings of the 16th Annual International Symposium on High Performance Computing Systems and Applications, 2002

Invisible Network: Concepts and Architecture.
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002

Towards Trust-Aware Resource Management in Grid Computing Systems.
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002


  Loading...