Lo'ai Ali Tawalbeh

Orcid: 0000-0002-2294-9829

According to our database1, Lo'ai Ali Tawalbeh authored at least 87 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Zero-day attack detection: a systematic literature review.
Artif. Intell. Rev., October, 2023

A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain.
IEEE Access, 2023

Energy Consumption and Carbon Emissions Data Analysis: Case Study and Future Predictions.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing.
J. Web Eng., 2022

Editorial.
J. ICT Stand., 2022

A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks.
J. Inf. Secur. Appl., 2022

A comprehensive deep learning benchmark for IoT IDS.
Comput. Secur., 2022

Improved gossip protocol for blockchain applications.
Clust. Comput., 2022

Towards building data analytics benchmarks for IoT intrusion detection.
Clust. Comput., 2022

New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications.
Proceedings of the 17th International Conference on Future Networks and Communications / 19th International Conference on Mobile Systems and Pervasive Computing / 12th International Conference on Sustainable Energy Information Technology (FNC/MobiSPC/SEIT 2022), 2022

Security Concerns for 5G/6G Mobile Network Technology and Quantum Communication.
Proceedings of the 17th International Conference on Future Networks and Communications / 19th International Conference on Mobile Systems and Pervasive Computing / 12th International Conference on Sustainable Energy Information Technology (FNC/MobiSPC/SEIT 2022), 2022

New Waves of Cyber Attacks in the Time of COVID19.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

The Security Concerns On Cyber-Physical Systems And Potential Risks Analysis Using Machine Learning.
Proceedings of the 13th International Conference on Ambient Systems, 2022

2021
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities.
Secur. Commun. Networks, 2021

Reconsidering big data security and privacy in cloud and mobile cloud systems.
J. King Saud Univ. Comput. Inf. Sci., 2021

Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark.
Future Internet, 2021

Vehicle to Vehicle (V2V) Communication Protocol: Components, Benefits, Challenges, Safety and Machine Learning Applications.
CoRR, 2021

Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021.
Big Data, 2021

Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity.
Big Data, 2021

Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications.
IEEE Access, 2021

Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities.
IEEE Access, 2021

Emerging Concepts Using Blockchain and Big Data.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

2020
Improving the impact of power efficiency in mobile cloud applications using cloudlet model.
Concurr. Comput. Pract. Exp., 2020

Automated negotiated user profiling across distributed social mobile clouds for resource optimisation.
Concurr. Comput. Pract. Exp., 2020

In-Home Floor Based Sensor System-Smart Carpet- to Facilitate Healthy Aging in Place (AIP).
IEEE Access, 2020

Health Care Insurance Fraud Detection Using Blockchain.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Applications of Blockchain in Healthcare, Industry 4, and Cyber-Physical Systems.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

Swarm Robotics meets Blockchain to deploy Surveillance missions.
Proceedings of the 32nd International Conference on Microelectronics, 2020

Investigating the Security Threats on Networked Medical Devices.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Floor Based Sensors Walk Identification System Using Dynamic Time Warping with Cloudlet Support.
Proceedings of the 13th IEEE International Conference on Semantic Computing, 2019

WSN-based Interactive Dynamic Maps for Guidance in Al-Masjid Al-Haram.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Wildfire Detection using Wireless Mesh Network.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

2018
Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks.
Telecommun. Syst., 2018

A framework and a process for digital forensic analysis on smart phones with multiple data logs.
Int. J. Embed. Syst., 2018

Context-Aware, Accurate, and Real Time Fall Detection System for Elderly People.
Proceedings of the 12th IEEE International Conference on Semantic Computing, 2018

Fine-Grained Emotion Analysis of Arabic Tweets: A Multi-target Multi-label Approach.
Proceedings of the 12th IEEE International Conference on Semantic Computing, 2018

An Integrated Cloud Based Healthcare System.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

Feasibility study and requirements for mobile cloud healthcare systems in Saudi Arabia.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

Power consumption experimental analysis in smart phones.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

2017
Delay-aware power optimization model for mobile edge computing systems.
Pers. Ubiquitous Comput., 2017

Trust delegation-based secure mobile cloud computing framework.
Int. J. Inf. Comput. Secur., 2017

Software-defined systems support for secure cloud computing based on data classification.
Ann. des Télécommunications, 2017

Dos and Donts Integrated System Based on GPS and Cloud Technologies for Pilgrims.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Intrusion and attacks over mobile networks and cloud health systems.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Quality of Service requirements and Challenges in Generic WSN Infrastructures.
Proceedings of the 8th International Conference on Ambient Systems, 2017

Cyber Security Attacks on Smart Cities and Associated Mobile Technologies.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
Energy Optimisation for Mobile Device Power Consumption: A Survey and a Unified View of Modelling for a Comprehensive Network Simulation.
Mob. Networks Appl., 2016

Efficient and secure software-defined mobile cloud computing infrastructure.
Int. J. High Perform. Comput. Netw., 2016

Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications.
EURASIP J. Inf. Secur., 2016

Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications.
IEEE Access, 2016

Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption.
IEEE Access, 2016

GA-Based Resource Augmentation Negotation for Energy-Optimised Mobile Ad-hoc Cloud.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

Cooperative models in cloud and mobile cloud computing.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Towards secure communications: Review of side channel attacks and countermeasures on ECC.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Cloudlet-Based Mobile Cloud Computing for Healthcare Applications.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Studying the Energy Consumption in Mobile Devices.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

Leveraging Software-Defined-Networking for Energy Optimisation in Mobile-Cloud-Computing.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

A Mobile Cloud System for Different Useful Applications.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Power Optimization of Large Scale Mobile Cloud System Using Cooperative Cloudlets.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

A Mobile Cloud Computing Model Using the Cloudlet Scheme for Big Data Applications.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

Framework for Mobile Devices Analysis.
Proceedings of the 7th International Conference on Ambient Systems, 2016

More secure Internet of Things using robust encryption algorithms against side channel attacks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

Integrated sensors system based on IoT and mobile cloud computing.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing.
J. Networks, 2015

Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers.
J. Networks, 2015

Secure and Efficient Cloud Computing Framework.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015

Efficient Software-Based Mobile Cloud Computing Framework.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Power Optimization of Large Scale Mobile Cloud Computing Systems.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

A Secure Cloud Computing Model based on Data Classification.
Proceedings of the 6th International Conference on Ambient Systems, 2015

User Profiling for Energy Optimisation in Mobile Cloud Computing.
Proceedings of the 6th International Conference on Ambient Systems, 2015

Efficient techniques for energy optimization in Mobile Cloud Computing.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
High-Throughput Encryption for Cloud Computing Storage System.
Int. J. Cloud Appl. Comput., 2014

Scalable Cloudlet-based Mobile Computing Model.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm.
Int. J. Inf. Secur. Priv., 2013

Use of elliptic curve cryptography for multimedia encryption.
IET Inf. Secur., 2013

Resource Efficient Mobile Computing Using Cloudlet Infrastructure.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol.
J. Information Security, 2012

Hardware Performance Evaluation of SHA-3 Candidate Algorithms.
J. Information Security, 2012

A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process.
Inf. Secur. J. A Glob. Perspect., 2012

An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications.
Int. Arab J. Inf. Technol., 2012

2011
AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations.
J. Signal Process. Syst., 2010

Hardware Design and Implementation of <i>ElGamal</i> Public-Key Cryptography Algorithm.
Inf. Secur. J. A Glob. Perspect., 2010

2009
Efficient Modular Squaring Algorithms for Hardware Implementation in GF(<i>p</i>).
Inf. Secur. J. A Glob. Perspect., 2009

2006
Carry-Save Representation Is Shift-Unsafe: The Problem and Its Solution.
IEEE Trans. Computers, 2006

2004
An Algorithm and Hardware Architecture for Integrated Modular Division and Multiplication in GF(p) and GF(2<sup>n</sup>).
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, 2004


  Loading...