Farah I. Kandah

Orcid: 0000-0002-5729-8536

According to our database1, Farah I. Kandah authored at least 35 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
B2-C2: Blockchain-based Flow Control Consistency for Multi-Controller SDN Architecture.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

2023
BEAST: Behavior as a Service for Trust management in IoT devices.
Future Gener. Comput. Syst., July, 2023

2022
Physical Layer-Based IoT Security: An Investigation Into Improving Preamble-Based SEI Performance When Using Multiple Waveform Collections.
IEEE Access, 2022

An Analysis of Signal Energy Impacts and Threats to Deep Learning Based SEI.
Proceedings of the IEEE International Conference on Communications, 2022

Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Mitigating Location-based Attacks Using Predication Models in Vehicular Ad-Hoc Networks.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM.
IEEE Internet Things J., 2021

2020
Towards trusted and energy-efficient data collection in unattended wireless sensor networks.
Wirel. Networks, 2020

Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM.
CoRR, 2020

Behavioral Model based Trust Management design for IoT at Scale.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

MARS: Machine learning based Adaptable and Robust Network Management for Software-defined Networks.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Behavioral Model Anomaly Detection in Automatic Identification Systems (AIS).
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Buterin's Scalability Trilemma viewed through a State-change-based Classification for Common Consensus Algorithms.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Denial of Service Attacks Prevention using Traffic Pattern Recognition over Software-Defined Network.
EAI Endorsed Trans. Ambient Syst., 2019

A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Intelligent Threat Hunting in Software-Defined Networking.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

BLAST: Blockchain-based Trust Management in Smart Cities and Connected Vehicles Setup.
Proceedings of the 2019 IEEE High Performance Extreme Computing Conference, 2019

A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2017
Cluster-Based Dynamic Backup in Cognitive Radio Networks.
Proceedings of the 2017 International Conference on Computing, 2017

Efficient key management for Big Data gathering in dynamic sensor networks.
Proceedings of the 2017 International Conference on Computing, 2017

2015
Ultimate control and security over data localization in the cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Energy-aware Multipath Provisioning in wireless mesh networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2013
Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks.
Secur. Commun. Networks, 2013

Mitigating Misleading Routing Attack using path signature in Mobile Ad-Hoc Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Self-protecting networking using dynamic <i>p</i>-cycle construction within link capacity constraint.
Secur. Commun. Networks, 2012

Diverse Path Routing with Interference and Reusability Consideration in Wireless Mesh Networks.
Mob. Networks Appl., 2012

Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks.
J. Commun., 2012

A misleading active routing attack in mobile ad-hoc networks.
Int. J. Secur. Networks, 2012

2011
Dynamic light trail routing in WDM optical networks.
Photonic Netw. Commun., 2011

A Secure Key Management Scheme in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2011

MIRA: Misleading Routing Attack in Mobile Ad-Hoc Networks.
Proceedings of the Global Communications Conference, 2011

2010
Interference-Aware Robust Wireless Mesh Network Design.
Proceedings of the Global Communications Conference, 2010

Interference-Aware Robust Topology Design in Multi-Channel Wireless Mesh Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010


  Loading...