Muath Obaidat

Orcid: 0000-0003-2963-7315

According to our database1, Muath Obaidat authored at least 19 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions.
IEEE Access, 2023

Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges.
IEEE Access, 2023

Metaverse through Blockchain and Intelligent Networking: A Comprehensive Survey.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Optimizing System-on-Chip Performance Using AI and SDN: Approaches and Challenges.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

Incorporating MPLS for Better SoC Utilization and Traffic Engineering.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

A Secure Authentication and Access Control Scheme for CoAP-based IoT.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

2021
IOT-based service migration for connected communities.
Comput. Electr. Eng., 2021

A novel Paradigm for Access Control Trust in IoT Applications: A Distributed Cross-Communication Approach.
Proceedings of the 13th IFIP Wireless and Mobile Networking Conference, 2021

Artificial Intelligence Bias Minimization Via Random Sampling Technique of Adversary Data.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Blind Attack Flaws in Adaptive Honeypot Strategies.
Proceedings of the IEEE World AI IoT Congress, 2021

2020
A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication.
Sensors, 2020

A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures.
Comput., 2020

Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Web Browser Extension User-Script XSS Vulnerabilities.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
SNR-Based Early Warning Message Scheme for VANETs.
J. Mobile Multimedia, 2019

Security Architecture Framework for Internet of Things (IoT).
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography.
Proceedings of the Security, Privacy and Trust in the IoT Environment, 2019

2013
QoS-Aware Multipath Communications over MANETs.
J. Networks, 2013

2011
QoS-aware Multipath Routing Protocol for Delay Sensitive Applications in MANETs - A Cross-layer Approach.
Proceedings of the WINSYS 2011, 2011


  Loading...