Wassim Itani
Orcid: 0000-0002-2311-6263
According to our database1,
Wassim Itani
authored at least 44 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Security-Aware Node Replacements and Incremental Updates in Industrial IoT Platforms.
Proceedings of the IEEE Global Communications Conference, 2022
Nodeguard: A Virtualized Introspection Security Approach for the Modern Cloud Data Center.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
2020
Future Gener. Comput. Syst., 2020
Proceedings of the 2020 ITU Kaleidoscope: Industry-Driven Digital Transformation, 2020
2019
Proceedings of the 2nd IEEE Middle East and North Africa COMMunications Conference, 2019
Proceedings of the 2nd IEEE Middle East and North Africa COMMunications Conference, 2019
Advanced Biomimetic Cells Architecture for Parallel Operations in Artificial Intelligence.
Proceedings of the Fourth International Conference on Advances in Computational Tools for Engineering Applications, 2019
2018
Sustain. Comput. Informatics Syst., 2018
Secur. Commun. Networks, 2018
2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Paving the Way for Energy Efficient Cloud Data Centers: A Type-Aware Virtual Machine Placement Strategy.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017
2016
Towards Solving the Problem of Virtual Machine Placement in Cloud Computing: A Job Classification Approach.
J. Comput. Sci., 2016
J. Cloud Comput., 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 3rd International Conference on Advances in Computational Tools for Engineering Applications, 2016
2015
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks.
Sensors, 2015
Clust. Comput., 2015
Job Classification in Cloud Computing: The Classification Effects on Energy Efficiency.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
2014
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud.
Future Gener. Comput. Syst., 2014
ALPS: The Accountable Cloud Protocol Stack.
Proceedings of the CLOSER 2014, 2014
2013
Clust. Comput., 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System.
Proceedings of the 19th International Conference on Telecommunications, 2012
2011
Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the International Conference on Energy Aware Computing, 2011
Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
Proceedings of the CLOSER 2011, 2011
2010
STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments.
Int. J. Dependable Trust. Inf. Syst., 2010
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks.
Proceedings of the Q2SWinet'10, 2010
SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks.
Proceedings of the Global Communications Conference, 2010
2009
Secur. Commun. Networks, 2009
PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
2007
An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
2006
A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices.
Int. J. Netw. Secur., 2006
An enterprise policy-based security protocol for protecting relational database network objects.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
2004
J. Netw. Comput. Appl., 2004
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications.
Comput. Commun., 2004
2003
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003