Khaled Salah

Orcid: 0000-0002-2310-2558

Affiliations:
  • Khalifa University of Science Technology: Abu Dhabi, United Arab Emirates
  • King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia (former)


According to our database1, Khaled Salah authored at least 293 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NFTs for combating deepfakes and fake metaverse digital contents.
Internet Things, April, 2024

NFTs in Smart Cities: Vision, Applications, and Challenges.
IEEE Consumer Electron. Mag., March, 2024

Using NFTs for Product Management, Digital Certification, Trading, and Delivery in the Healthcare Supply Chain.
IEEE Trans. Engineering Management, 2024

2023
Metaverse applications in smart cities: Enabling technologies, opportunities, challenges, and future directions.
Internet Things, October, 2023

Blockchain and COVID-19 pandemic: applications and challenges.
Clust. Comput., August, 2023

Metaverse in Healthcare: Applications, Challenges, and Future Directions.
IEEE Consumer Electron. Mag., July, 2023

NFTs in Healthcare: Vision, Opportunities, and Challenges.
IEEE Consumer Electron. Mag., July, 2023

Blockchain for deep learning: review and open challenges.
Clust. Comput., February, 2023

Blockchain-based system for tracking and rewarding recyclable plastic waste.
Peer Peer Netw. Appl., January, 2023

CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds.
IEEE Trans. Serv. Comput., 2023

Using NFTs for ownership management of digital twins and for proof of delivery of their physical assets.
Future Gener. Comput. Syst., 2023

Blockchain-Based Approach for Crop Index Insurance in Agricultural Supply Chain.
IEEE Access, 2023

NFTs for Open-Source and Commercial Software Licensing and Royalties.
IEEE Access, 2023

Using Composable NFTs for Trading and Managing Expensive Packaged Products in the Food Industry.
IEEE Access, 2023

Trusted Traceability and Certification of Refurbished Medical Devices Using Dynamic Composable NFTs.
IEEE Access, 2023

A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain.
IEEE Access, 2023

Using Blockchain for Enabling Transparent, Traceable, and Trusted University Ranking Systems.
IEEE Access, 2023

Trustworthy Healthcare Professional Credential Verification Using Blockchain Technology.
IEEE Access, 2023

NFTs for Trusted Traceability and Management of Digital Twins for Shipping Containers.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

2022
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges.
ACM Comput. Surv., January, 2022

epcAware: A Game-Based, Energy, Performance and Cost-Efficient Resource Management Technique for Multi-Access Edge Computing.
IEEE Trans. Serv. Comput., 2022

A Novel Contract Theory-Based Incentive Mechanism for Cooperative Task-Offloading in Electrical Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Blockchain for healthcare data management: opportunities, challenges, and future recommendations.
Neural Comput. Appl., 2022

Scalable blockchains - A systematic review.
Future Gener. Comput. Syst., 2022

A privacy-preserving framework for smart context-aware healthcare applications.
Trans. Emerg. Telecommun. Technol., 2022

Blockchain for Patient Safety: Use Cases, Opportunities and Open Challenges.
Data, 2022

A Blockchain-Based Regulatory Framework for mHealth.
Data, 2022

Machine Learning for Metaverse-enabled Wireless Systems: Vision, Requirements, and Challenges.
CoRR, 2022

Blockchain-based Supply Chain Traceability for COVID-19 personal protective equipment.
Comput. Ind. Eng., 2022

Blockchain-Based Traceability for the Fishery Supply Chain.
IEEE Access, 2022

Supply Chain Inventory Sharing Using Ethereum Blockchain and Smart Contracts.
IEEE Access, 2022

Blockchain and NFTs for Time-Bound Access and Monetization of Private Data.
IEEE Access, 2022

Blockchain-Based Management for Organ Donation and Transplantation.
IEEE Access, 2022

A Blockchain-Based Solution for Mitigating Overproduction and Underconsumption of Medical Supplies.
IEEE Access, 2022

Trustworthy IoT Data Streaming Using Blockchain and IPFS.
IEEE Access, 2022

Incorporating Registration, Reputation, and Incentivization Into the NFT Ecosystem.
IEEE Access, 2022

NFT-Based Traceability and Ownership Management of Medical Devices.
IEEE Access, 2022

Blockchain-Based Traceability for Shipping Containers in Unimodal and Multimodal Logistics.
IEEE Access, 2022

Using NFTs and Blockchain for Traceability and Auctioning of Shipping Containers and Cargo in Maritime Industry.
IEEE Access, 2022

Blockchain and NFTs for Trusted Ownership, Trading, and Access of AI Models.
IEEE Access, 2022

Blockchain-Based Processing of Health Insurance Claims for Prescription Drugs.
IEEE Access, 2022

NFT Certificates and Proof of Delivery for Fine Jewelry and Gemstones.
IEEE Access, 2022

Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions.
IEEE Access, 2022

Towards a Generic UVM.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2022

Blockchain-Based Decentralized Federated Learning.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Toward Offloading Internet of Vehicles Applications in 5G Networks.
IEEE Trans. Intell. Transp. Syst., 2021

TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT.
IEEE Trans. Ind. Informatics, 2021

Blockchain for IoT-Based Healthcare: Background, Consensus, Platforms, and Use Cases.
IEEE Syst. J., 2021

HonestChain: Consortium blockchain for protected data sharing in health information systems.
Peer-to-Peer Netw. Appl., 2021

Blockchain Architectures for Physical Internet: A Vision, Features, Requirements, and Applications.
IEEE Netw., 2021

Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges.
J. Netw. Comput. Appl., 2021

The role of blockchain technology in telehealth and telemedicine.
Int. J. Medical Informatics, 2021

Blockchain for drug traceability: Architectures and open challenges.
Health Informatics J., 2021

Device-centric adaptive data stream management and offloading for analytics applications in future internet architectures.
Future Gener. Comput. Syst., 2021

Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges.
CoRR, 2021

Blockchain for aerospace and defense: Opportunities and open research challenges.
Comput. Ind. Eng., 2021

Blockchain-Based Solution for Product Recall Management in the Automotive Supply Chain.
IEEE Access, 2021

Automating Procurement Contracts in the Healthcare Supply Chain Using Blockchain Smart Contracts.
IEEE Access, 2021

A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain.
IEEE Access, 2021

Blockchain-Based Solution for the Administration of Controlled Medication.
IEEE Access, 2021

Blockchain-Based Solution for Distribution and Delivery of COVID-19 Vaccines.
IEEE Access, 2021

appXchain: Application-Level Interoperability for Blockchain Networks.
IEEE Access, 2021

Blockchain-Based Management of Blood Donation.
IEEE Access, 2021

Blockchain-Enabled Telehealth Services Using Smart Contracts.
IEEE Access, 2021

COVID-19 Contact Tracing Using Blockchain.
IEEE Access, 2021

Trustworthy Blockchain Gateways for Resource-Constrained Clients and IoT Devices.
IEEE Access, 2021

Blockchain-Based Energy Trading in Electric Vehicles Using an Auctioning and Reputation Scheme.
IEEE Access, 2021

Design and Implementation of CryptoCargo: A Blockchain-Powered Smart Shipping Container for Vaccine Distribution.
IEEE Access, 2021

Blockchain-Based Decentralized Digital Manufacturing and Supply for COVID-19 Medical Devices and Supplies.
IEEE Access, 2021

Blockchain for Electric Vehicles Energy Trading: Requirements, Opportunities, and Challenges.
IEEE Access, 2021

Blockchain-Based Forward Supply Chain and Waste Management for COVID-19 Medical Equipment and Supplies.
IEEE Access, 2021

Blockchain for Waste Management in Smart Cities: A Survey.
IEEE Access, 2021

2020
Blockchain for explainable and trustworthy artificial intelligence.
WIREs Data Mining Knowl. Discov., 2020

Automating the Configuration of MapReduce: A Reinforcement Learning Scheme.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems.
IEEE Trans. Netw. Serv. Manag., 2020

Trust in Blockchain Cryptocurrency Ecosystem.
IEEE Trans. Engineering Management, 2020

Blockchain for Digital Twins: Recent Advances and Future Research Challenges.
IEEE Netw., 2020

BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model.
Mob. Networks Appl., 2020

Cloud adoption for e-learning: Survey and future challenges.
Educ. Inf. Technol., 2020

Introduction to the special section on recent advances on blockchain infrastructures and applications.
Comput. Electr. Eng., 2020

Industrial internet of things: Recent advances, enabling technologies and open challenges.
Comput. Electr. Eng., 2020

Enhancing Vendor Managed Inventory Supply Chain Operations Using Blockchain Smart Contracts.
IEEE Access, 2020

Fully Decentralized Multi-Party Consent Management for Secure Sharing of Patient Health Records.
IEEE Access, 2020

Blockchain for Giving Patients Control Over Their Medical Records.
IEEE Access, 2020

An In-Depth Empirical Investigation of State-of-the-Art Scheduling Approaches for Cloud Computing.
IEEE Access, 2020

A Blockchain-Based Approach for the Creation of Digital Twins.
IEEE Access, 2020

Blockchain-Based Solution for COVID-19 Digital Medical Passports and Immunity Certificates.
IEEE Access, 2020

Blockchain-Based Solution for the Traceability of Spare Parts in Manufacturing.
IEEE Access, 2020

Blockchain-Based Decentralized Reverse Bidding in Fog Computing.
IEEE Access, 2020

Monetization of Services Provided by Public Fog Nodes Using Blockchain and Smart Contracts.
IEEE Access, 2020

Blockchain-Based Verifiable Tracking of Resellable Returned Drugs.
IEEE Access, 2020

Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges.
IEEE Access, 2020

Blockchain-Based Multi-Party Authorization for Accessing IPFS Encrypted Data.
IEEE Access, 2020

Blockchain-Based Traceability and Management for Additive Manufacturing.
IEEE Access, 2020

Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model.
IEEE Access, 2020

IPXACT-Based RTL Generation Tool.
Proceedings of the 2nd Novel Intelligent and Leading Emerging Sciences Conference, 2020

Towards Blockchain-Based Reputation-Aware Federated Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Blockchain-Based Solution for Multiple Operator Spectrum Sharing (MOSS) in 5G Networks.
Proceedings of the IEEE Globecom Workshops, 2020

IoT-Enabled Shipping Container with Environmental Monitoring and Location Tracking.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Transparent Blockchain-Based Voting System: Guide to Massive Deployments.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2020

FairFed: Cross-Device Fair Federated Learning.
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020

2019
The Rise of Proximal Mobile Edge Servers.
IT Prof., 2019

AppsPred: Predicting context-aware smartphone apps using random forest learning.
Internet Things, 2019

Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions.
Int. J. Distributed Sens. Networks, 2019

Dynamic VM allocation and traffic control to manage QoS and energy consumption in cloud computing environment.
Int. J. Comput. Appl. Technol., 2019

Monetization of IoT data using smart contracts.
IET Networks, 2019

Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems.
IET Networks, 2019

COLIDE: a collaborative intrusion detection framework for Internet of Things.
IET Networks, 2019

The role of big data analytics in industrial Internet of Things.
Future Gener. Comput. Syst., 2019

Performance analysis of content discovery for ad-hoc tactile networks.
Future Gener. Comput. Syst., 2019

Decentralized document version control using ethereum blockchain and IPFS.
Comput. Electr. Eng., 2019

An ultrafast neural network-based hardware acceleration for nonlinear systems' simulators.
Comput. Electr. Eng., 2019

Smart contract-based approach for efficient shipment management.
Comput. Ind. Eng., 2019

Blockchain for AI: Review and Open Research Challenges.
IEEE Access, 2019

Blockchain-Based Soybean Traceability in Agricultural Supply Chain.
IEEE Access, 2019

Combating Deepfake Videos Using Blockchain and Smart Contracts.
IEEE Access, 2019

IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain.
IEEE Access, 2019

Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions.
IEEE Access, 2019

A Survey on Autonomic Provisioning and Management of QoS in SDN Networks.
IEEE Access, 2019

Reliable Middleware for Wireless Sensor-Actuator Networks.
IEEE Access, 2019

Development of a Generic and a Reconfigurable UVM-Based Verification Environment for SoC Buses.
Proceedings of the 31st International Conference on Microelectronics, 2019

Decentralized Access Control for IoT Data Using Blockchain and Trusted Oracles.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Cost-Performance Trade-Offs in Fog Computing for IoT Data Processing of Social Virtual Reality.
Proceedings of the IEEE International Conference on Fog Computing, 2019

Blockchain for 5G: Opportunities and Challenges.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Architecture to manage Internet of Things Data using Blockchain and Fog Computing.
Proceedings of the BDIoT'19: The 4th International Conference On Big Data and Internet of Things, 2019

Proof of Concept Blockchain-based Voting System.
Proceedings of the BDIoT'19: The 4th International Conference On Big Data and Internet of Things, 2019

Exploiting Ethereum Smart Contracts for Clinical Trial Management.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Towards a Blockchain-Based Decentralized Reputation System for Public Fog Nodes.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
IoT security: Review, blockchain solutions, and open challenges.
Future Gener. Comput. Syst., 2018

Performance analysis of multi-core VMs hosting cloud SaaS applications.
Comput. Stand. Interfaces, 2018

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT.
CoRR, 2018

Systems and methods for SPIT detection in VoIP: Survey and future directions.
Comput. Secur., 2018

M2M-REP: Reputation system for machines in the internet of things.
Comput. Secur., 2018

Improved Session Table Architecture for Denial of Stateful Firewall Attacks.
IEEE Access, 2018

Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts.
IEEE Access, 2018

Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters.
IEEE Access, 2018

Constructing Effective UVM Testbench for DRAM Memory Controllers.
Proceedings of the 2018 New Generation of CAS, 2018

Blockchain-based Ownership Management for Medical IoT (MIoT) Devices.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Cloud Automation to Run Large-Scale Quantum Chemical Simulations.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Automatic RTL coding correction Linting tool for critical issues.
Proceedings of the 30th International Conference on Microelectronics, 2018

HEVC Implementation for IoT Applications.
Proceedings of the 30th International Conference on Microelectronics, 2018

An Automated Lightweight UVM Tool.
Proceedings of the 30th International Conference on Microelectronics, 2018

ASIC Implementation of Energy-Optimized Successive Cancellation Polar Decoders for Internet of Things.
Proceedings of the 30th International Conference on Microelectronics, 2018

Using Blockchain for IOT Access Control and Authentication Management.
Proceedings of the Internet of Things - ICIOT 2018, 2018

IPFS-Blockchain-Based Authenticity of Online Publications.
Proceedings of the Blockchain - ICBC 2018, 2018

Blockchain-Based Solution for Proof of Delivery of Physical Assets.
Proceedings of the Blockchain - ICBC 2018, 2018

Performance Evaluation of IoT-Fag-Cloud Deployment for Healthcare servicies.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

Internet of things: A comparative study.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Analytical Model for Elastic Scaling of Cloud-Based Firewalls.
IEEE Trans. Netw. Serv. Manag., 2017

Efficient and dynamic scaling of fog nodes for IoT devices.
J. Supercomput., 2017

Formal analysis of seamless application execution in mobile cloud computing.
J. Supercomput., 2017

Performance modeling and analysis of hypoexponential network servers.
Telecommun. Syst., 2017

A novel model order reduction technique based on artificial intelligence.
Microelectron. J., 2017

Approaches to analyze cyber terrorist communities: Survey and challenges.
Comput. Secur., 2017

An innovative approach of model order reduction using ant colony optimization.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Real time embedded system IPs protection using chaotic maps.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

BigCrypt for big data encryption.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

A Scattering Technique for Protecting Cryptographic Keys in the Cloud.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Workflow Automation for Partially Hosted Cloud Services.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

A Unified UVM Architecture for Flash-Based Memory.
Proceedings of the 18th International Workshop on Microprocessor and SOC Test and Verification, 2017

A comparative analysis between FPGA and GPU for solving large numbers of linear equations.
Proceedings of the 29th International Conference on Microelectronics, 2017

Performance modeling of cloud apps using message queueing as a service (MaaS).
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

Stochastic modelling and analysis of cloud computing data center.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

Smart auto-correction methodology using assertions and dynamic partial reconfiguration.
Proceedings of the 24th IEEE International Conference on Electronics, Circuits and Systems, 2017

A generic model order reduction technique based on Particle Swarm Optimization (PSO) algorithm.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017

2016
A High-Speed FPGA Implementation of an RSD-Based ECC Processor.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Clustering VoIP caller for SPIT identification.
Secur. Commun. Networks, 2016

An Analytical Model for Estimating Cloud Resources of Elastic Services.
J. Netw. Syst. Manag., 2016

Securing Cryptographic Keys in the Cloud: A Survey.
IEEE Cloud Comput., 2016

An RTL power optimization technique based on System Verilog assertions.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

Model order reduction using genetic algorithm.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

A 65nm ASIC based 256 NIST prime field ECC processor.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

An Efficient Scenario Based Testing Methodology Using UVM.
Proceedings of the 17th International Workshop on Microprocessor and SOC Test and Verification, 2016

Coverage Closure Efficient UVM Based Generic Verification Architecture for Flash Memory Controllers.
Proceedings of the 17th International Workshop on Microprocessor and SOC Test and Verification, 2016

Subverting MAC: How authentication in mobile environment can be undermined.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Architectural design of a cloud-based reCAPTCHA service.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016

Model order reduction using fuzzy logic algorithm.
Proceedings of the 28th International Conference on Microelectronics, 2016

A novel assertion-based CAD tool for automatic extraction of functional coverage.
Proceedings of the 28th International Conference on Microelectronics, 2016

Model order reduction using artificial neural networks.
Proceedings of the 2016 IEEE International Conference on Electronics, Circuits and Systems, 2016

Adaptive Cloud Resource Allocation scheme to minimize SLO response time violation.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

TGV versus TSV: A comparative analysis.
Proceedings of the 3rd International Conference on Advances in Computational Tools for Engineering Applications, 2016

Lightweight Encryption for Smart Home.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Teaching Cybersecurity Using the Cloud.
IEEE Trans. Learn. Technol., 2015

Review of Elliptic Curve Cryptography processor designs.
Microprocess. Microsystems, 2015

Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges.
J. Networks, 2015

Modelling and analysis of rule-based network security middleboxes.
IET Inf. Secur., 2015

On kernel acceleration of electromagnetic solvers via hardware emulation.
Comput. Electr. Eng., 2015

Using the Cloud to Teach Computer Networks.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Securing Cryptographic Keys in the IaaS Cloud Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

New TSV-Based applications: Resonant inductive coupling, variable inductor, power amplifier, bandpass filter, and antenna.
Proceedings of the IEEE 13th International New Circuits and Systems Conference, 2015

CloudNA 2015.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

An analytical model to achieve elasticity for cloud-based firewalls.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Finite element emulation-based solver for electromagnetic computations.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Design of adiabatic TSV, SWCNT TSV, and Air-Gap Coaxial TSV.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

A novel wavelet-based method for TSV modeling.
Proceedings of the 10th International Design & Test Symposium, 2015

A proposed methodology to improve UVM-based test generation and coverage closure.
Proceedings of the 10th International Design & Test Symposium, 2015

A SWOT analysis of TSV: Strengths, weaknesses, opportunities, and threats.
Proceedings of the 27th International Conference on Microelectronics, 2015

A Novel TSV-Based power harvesting system for low-power applications.
Proceedings of the 27th International Conference on Microelectronics, 2015

Accelerating electromagnetic simulations: A hardware emulation approach.
Proceedings of the 2015 IEEE International Conference on Electronics, 2015

A functional coverage approach for direct testing: An industrial IP as a case study.
Proceedings of the IEEE EUROCON 2015, 2015

A TSV to TSV, A TSV to Metal interconnects, and A TSV to active device coupling capacitance: Analysis and recommendations.
Proceedings of the 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2015

Implementation and verification of a generic universal memory controller based on UVM.
Proceedings of the 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2015

Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Cloud-based Arabic reCAPTCHA service: Design and architecture.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Experimental Proof: Data Remanence in Cloud VMs.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Performance Study of Mobile TV over Mobile WiMAX Considering Different Modulation and Coding Techniques.
CoRR, 2014

VDC-Analyst: Design and verification of virtual desktop cloud resource allocations.
Comput. Networks, 2014

Harnessing the cloud for teaching cybersecurity.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Accelerating snort NIDS using NetFPGA-based Bloom filter.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A novel dimensional analysis method for TSV modeling and analysis in three dimensional integrated circuits.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

TSV-based 3D integration fabrication technologies: An overview.
Proceedings of the 9th International Design and Test Symposium, 2014

A UVM-based smart functional verification platform: Concepts, pros, cons, and opportunities.
Proceedings of the 9th International Design and Test Symposium, 2014

Framework for a NetFPGA-based Snort NIDS.
Proceedings of the 9th International Symposium on Communication Systems, 2014

A Modbus traffic generator for evaluating the security of SCADA systems.
Proceedings of the 9th International Symposium on Communication Systems, 2014

2013
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.
Secur. Commun. Networks, 2013

Performance of IP-forwarding of Linux hosts with multiple network interfaces.
J. Netw. Comput. Appl., 2013

Using Cloud Computing to Implement a Security Overlay Network.
IEEE Secur. Priv., 2013

Evaluating the Performance of IPTV over Fixed WiMAX.
CoRR, 2013

Analyzing the security of Windows 7 and Linux for cloud computing.
Comput. Secur., 2013

TSV-based on-chip inductive coupling communications.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

Performance comparison between air-gap based coaxial TSV and conventional circular TSV in 3D-ICs.
Proceedings of the 8th International Design and Test Symposium, 2013

A TSV-based architecture for AC-DC converters.
Proceedings of the 8th International Design and Test Symposium, 2013

RSD based Karatsuba multiplier for ECC processors.
Proceedings of the 8th International Design and Test Symposium, 2013

Memory controller architectures: A comparative study.
Proceedings of the 8th International Design and Test Symposium, 2013

Network-aware resource allocation for cloud elastic applications.
Proceedings of the 20th IEEE International Conference on Electronics, 2013

An FPGA implementation of NIST 256 prime field ECC processor.
Proceedings of the 20th IEEE International Conference on Electronics, 2013

An online RTL-level scan-chain-based methodology for accelerating IP emulation debugging at run-time.
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013

Secure Framework for the Return Routability Procedure in MIPv6.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

A macro-modeling approach for through silicon via.
Proceedings of Eurocon 2013, 2013

Achieving elasticity for cloud MapReduce jobs.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013

Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

A Queueing Model to Achieve Proper Elasticity for Cloud Cluster Jobs.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Performance Modeling and Analysis of Network Firewalls.
IEEE Trans. Netw. Serv. Manag., 2012

Mitigating starvation of Linux CPU-bound processes in the presence of network I/O.
J. Syst. Softw., 2012

Video-on-Demand (VoD) deployment over hospitality networks.
Int. J. Netw. Manag., 2012

Mitigation of DHCP starvation attack.
Comput. Electr. Eng., 2012

Assessing Overhead Cost Associated with Encrypting Swap File.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A closed form expression for TSV-based on-chip spiral inductor.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

Modeling and analysis of through silicon via: Electromagnetic and device simulation approach.
Proceedings of the 19th IEEE International Conference on Electronics, Circuits and Systems, 2012

Analysis of coupling capacitance between TSVs and metal interconnects in 3D-ICs.
Proceedings of the 19th IEEE International Conference on Electronics, Circuits and Systems, 2012

Effect of non-uniform substrate doping profile on the electrical performance of through-silicon-via for low power application.
Proceedings of the International Conference on Energy Aware Computing, 2012

Estimating service response time for elastic cloud applications.
Proceedings of the 1st IEEE International Conference on Cloud Networking, 2012

2011
A potential low-rate DoS attack against network firewalls.
Secur. Commun. Networks, 2011

Performance Evaluation of Snort under Windows 7 and Windows Server 2008.
J. Univers. Comput. Sci., 2011

Statistical analysis of H.264 video frame size distribution.
IET Commun., 2011

On Linux starvation of CPU-bound processes in the presence of network I/O.
Comput. Electr. Eng., 2011

Analysis of a two-stage network server.
Appl. Math. Comput., 2011

EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

Compact lumped element model for TSV in 3D-ICs.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

Performance evaluation of popular Cloud IaaS providers.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

A unified countermeasure against side channel attacks on cryptographic RFID.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Evaluation of popular application sandboxing.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

On the security of inclusion or omission of MixColumns in AES cipher.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Identifying Scanning Activities in Honeynet Data Using Data Mining.
Proceedings of the Third International Conference on Computational Intelligence, 2011

Identifying network traffic features suitable for honeynet data analysis.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

Equivalent lumped element models for various n-port Through Silicon Vias networks.
Proceedings of the 16th Asia South Pacific Design Automation Conference, 2011

2010
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP.
J. Univers. Comput. Sci., 2010

Performance evaluation comparison of Snort NIDS under Linux and Windows Server.
J. Netw. Comput. Appl., 2010

Discovering last-matching rules in popular open-source and commercial firewalls.
Int. J. Internet Protoc. Technol., 2010

Distributed security for multi-agent systems - review and applications.
IET Inf. Secur., 2010

Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks.
IET Inf. Secur., 2010

On the performance of IP-forwarding for multicore multiprocessor Linux hosts.
IET Commun., 2010

Modeling and analysis of PC-based software routers.
Comput. Commun., 2010

Queuing Analysis of Network Firewalls.
Proceedings of the Global Communications Conference, 2010

2009
Comparative packet-forwarding measurement of three popular operating systems.
J. Netw. Comput. Appl., 2009

An analytical simulator for deploying IP telephony.
Int. J. Netw. Manag., 2009

Improving snort performance under linux.
IET Commun., 2009

Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme.
Comput. Commun., 2009

Resiliency of open-source firewalls against remote discovery of last-matching rules.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

An Entropy-Based Countermeasure against Intelligent DoS Attacks Targeting Firewalls.
Proceedings of the POLICY 2009, 2009

2008
Assessing readiness of IP networks to support desktop videoconferencing using OPNET.
J. Netw. Comput. Appl., 2008

On the performance of a simple packet rate estimator.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Throughput and delay analysis of interrupt-driven kernels under Poisson and bursty traffic.
Comput. Syst. Sci. Eng., 2007

Performance analysis and comparison of interrupt-handling schemes in gigabit networks.
Comput. Commun., 2007

Modeling and Analysis of Interrupt Disable-Enable Scheme.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Throughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks.
J. High Speed Networks, 2006

On the accuracy of two analytical models for evaluating the performance of Gigabit Ethernet hosts.
Inf. Sci., 2006

An OPNET-based simulation approach for deploying VoIP.
Int. J. Netw. Manag., 2006

On the deployment of VoIP in Ethernet networks: methodology and case study.
Comput. Commun., 2006

An Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Modeling and Analysis of Application Throughput in Gigabit Networks.
Int. J. Comput. Their Appl., 2005

Integrated performance evaluating criterion for selecting between interrupt coalescing and normal interruption.
Int. J. High Perform. Comput. Netw., 2005

Analysis and simulation of interrupt overhead impact on OS throughput in high-speed networks.
Int. J. Commun. Syst., 2005

An Analytical Model for Evaluating Interrupt-Driven System Performance of Gigabit Ethernet Hosts with Finite Buffer.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2003
Internet Computing.
Inf. Sci., 2003

Evaluating System Performance in Gigabit Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Performance evaluation of interrupt-driven kernels in gigabit networks.
Proceedings of the Global Telecommunications Conference, 2003

Modeling and Analysis of OS Performance in High-Speed Networks.
Proceedings of the International Conference on Communications in Computing, 2003

1999
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

1998
A Two-Phase Inter-Switch Handoff Scheme for Wireless ATM Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998


  Loading...