Sahel Alouneh

Orcid: 0000-0001-9321-4005

According to our database1, Sahel Alouneh authored at least 48 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems.
Sensors, September, 2023

A Multi-Path Approach to Protect DNS Against DDoS Attacks.
J. Cyber Secur. Mobil., 2023

Comparative Analysis and Graphic Design Elements to Enhance the Usability of a University Website.
Proceedings of the Tenth International Conference on Social Networks Analysis, 2023

Securing Domain Name Systems with Blockchain.
Proceedings of the Fourth International Conference on Intelligent Data Science Technologies and Applications, 2023

Metaverse through Blockchain and Intelligent Networking: A Comprehensive Survey.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

Impact of Virtual Hadoop Cluster Scalability on The Performance of Big Data Mapreduce Applications.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
An Edge-Based Selection Method for Improving Regions-of-Interest Localizations Obtained Using Multiple Deep Learning Object-Detection Models in Breast Ultrasound Images.
Sensors, 2022

Coordination Protocol and Admission Control for Distributed Services in System-of-Systems With Real-Time Requirements.
IEEE Access, 2022

Optimizing System-on-Chip Performance Using AI and SDN: Approaches and Challenges.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

A Detailed Analysis of Qualitative and Quantitative Factors in Realization of 6G Communication.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Performance Comparison of Big Data Processing Utilizing SciDB and Apache Accumulo Databases.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

Incorporating MPLS for Better SoC Utilization and Traffic Engineering.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

Methodology to Evaluate the Performance of Hadoop MapReduce on a Hyper-V Cluster using SAN Storage.
Proceedings of the International Arab Conference on Information Technology, 2022

2021
Incremental, Distributed, and Concurrent Service Coordination for Reliable and Deterministic Systems-of-Systems.
IEEE Syst. J., 2021

Methods to achieve effective web-based learning management modules: MyGJU versus Moodle.
PeerJ Comput. Sci., 2021

LoRaWAN energy optimization with security consideration.
Int. Arab J. Inf. Technol., 2021

An Open Source LoRaWAN Simulator Framework for the Internet of Things Applications.
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021

2020
A practical three-phase ILP approach for solving the examination timetabling problem.
Int. Trans. Oper. Res., 2020

REST4Mobile: A framework for enhanced usability of REST services on smartphones.
Concurr. Comput. Pract. Exp., 2020

Optimization of Migration Cost for Network Function Virtualization Replacement.
Proceedings of the 21st International Arab Conference on Information Technology, 2020

Optimizing the Energy Consumption Level in LoRaWan Networks.
Proceedings of the 21st International Arab Conference on Information Technology, 2020

2019
An Empirical Study of Cross-Platform Mobile Development in Industry.
Wirel. Commun. Mob. Comput., 2019

An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance.
KSII Trans. Internet Inf. Syst., 2019

A comprehensive study and analysis on SAT-solvers: advances, usages and achievements.
Artif. Intell. Rev., 2019

2018
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks.
Secur. Commun. Networks, 2018

Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers.
Future Gener. Comput. Syst., 2018

Admission Control and Resource Allocation for Distributed Services in System-of-Systems: Challenges and Potential Solutions.
Proceedings of the 13th IEEE International Symposium on Industrial Embedded Systems, 2018

Toward big data analysis to improve enterprise information security.
Proceedings of the 10th International Conference on Management of Digital EcoSystems, 2018

2017
Transmitter Design and Hardware Considerations for Different Space Modulation Techniques.
IEEE Trans. Wirel. Commun., 2017

Decode-and-forward with quadrature spatial modulation in the presence of imperfect channel estimation.
Phys. Commun., 2017

GMPLS/MPLS Wireless Networks.
Proceedings of the 9th International Conference on Management of Digital EcoSystems, 2017

Service Identification Framework for Systems of Systems Based on MPLS Technology.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

A Security Framework for Systems-of-Systems.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Security of VoIP traffic over low or limited bandwidth networks.
Secur. Commun. Networks, 2016

A Multidimension Taxonomy of Insider Threats in Cloud Computing.
Comput. J., 2016

2014
MPLS technology in wireless networks.
Wirel. Networks, 2014

Software comprehension based on database relational algebra.
Int. J. Inf. Commun. Technol., 2014

2013
An Efficient Backup Technique for Database Systems Based on Threshold Sharing.
J. Comput., 2013

Stack Memory Buffer Overflow Protection based on Duplication and Randomization.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

2012
Low power Wallace multiplier design based on wide counters.
Int. J. Circuit Theory Appl., 2012

A novel approach to enhance distributed virtual memory.
Comput. Electr. Eng., 2012

2011
Image Steganography Optimization Technique.
Proceedings of the Signal Processing and Information Technology, 2011

2009
A novel path protection scheme for MPLS networks using multi-path routing.
Comput. Networks, 2009

MPLS security: an approach for unicast and multicast environments.
Ann. des Télécommunications, 2009

2008
A New Approach for Security in MPLS Multicast Networks.
Proceedings of the Distributed Computing and Internet Technology, 2008

2007
A Multiple LSPs Approach to Secure Data in MPLS Networks.
J. Networks, 2007

Securing MPLS Networks with Multi-path Routing.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

A Multiple Tree Approach for Fault Tolerance in MPLS Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007


  Loading...