Mohammed Gharib

Orcid: 0000-0001-9611-1693

According to our database1, Mohammed Gharib authored at least 28 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BlocKP: Key-Predistribution-Based Secure Data Transfer.
IEEE Internet Things J., March, 2023

Secure cloud storage with anonymous deduplication using ID-based key management.
J. Supercomput., 2023

5G Wings: Investigating 5G-Connected Drones Performance in Non-Urban Areas.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

SCC5G: A PQC-Based Architecture for Highly Secure Critical Communication Over Cellular Network in Zero-Trust Environment.
Proceedings of the 57th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2023, Pacific Grove, CA, USA, October 29, 2023

2022
LB-OPAR: Load balanced optimized predictive and adaptive routing for cooperative UAV networks.
Ad Hoc Networks, 2022

2021
Modeling and Evaluation of Multi-Hop Wireless Networks Using SRNs.
IEEE Trans. Netw. Sci. Eng., 2021

How UAVs' Highly Dynamic 3D Movement Improves Network Security?
CoRR, 2021

OPAR: Optimized Predictive and Adaptive Routing for Cooperative UAV Networks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

An Exhaustive Study of Using Commercial LTE Network for UAV Communication in Rural Areas.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
VeriVANca framework: verification of VANETs by property-based message passing of actors in Rebeca with inheritance.
Int. J. Softw. Tools Technol. Transf., 2020

An area-scalable human-based mobility model.
Comput. Networks, 2020

UASTrustChain: A Decentralized Blockchain- Based Trust Monitoring Framework for Autonomous Unmanned Aerial Systems.
IEEE Access, 2020

2019
Secure Overlay Routing for Large Scale Networks.
IEEE Trans. Netw. Sci. Eng., 2019

KPsec: Secure End-to-End Communications for Multi-Hop Wireless Networks.
CoRR, 2019

AutoIDS: Auto-encoder Based Method for Intrusion Detection System.
CoRR, 2019

VeriVANca: An Actor-Based Framework for Formal Verification of Warning Message Dissemination Schemes in VANETs.
Proceedings of the Model Checking Software - 26th International Symposium, 2019

2018
Throughput Analysis of IEEE 802.11 Multi-Hop Wireless Networks With Routing Consideration: A General Framework.
IEEE Trans. Commun., 2018

IDS modelling and evaluation in WANETs against black/grey-hole attacks using stochastic models.
Int. J. Ad Hoc Ubiquitous Comput., 2018

SLoPCloud: An Efficient Solution for Locality Problem in Peer-to-Peer Cloud Systems.
Algorithms, 2018

2017
Fully distributed ECC-based key management for mobile ad hoc networks.
Comput. Networks, 2017

2016
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach.
IEEE Trans. Mob. Comput., 2016

2015
Decentralized Social Networking Using Named-Data.
Proceedings of the Computer Networks - 22nd International Conference, 2015

Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
A novel human mobility model for MANETs based on real data.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
Fully Distributed Self Certified Key Management for Large-Scale MANETs.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Expert key selection impact on the MANETs' performance using probabilistic key management algorithm.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A Novel Probabilistic Key Management Algorithm for Large-Scale MANETs.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2010
The Effect of Using Cube Connected Cycle for Improving Locality Awareness in Peer-to-Peer Networks.
Proceedings of the 12th UKSim, 2010


  Loading...