default search action
Abdallah Moubayed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j23]Abdallah Moubayed:
A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection. Future Internet 16(9): 331 (2024) - 2023
- [j22]Sara Zimmo, Abdallah Moubayed, Ahmed Refaey Hussein, Abdallah Shami:
Quality of service-aware coexistence in unlicensed 5G new radio based on time-domain virtualization. Int. J. Commun. Syst. 36(4) (2023) - [j21]Abdallah Moubayed, Dimitrios Michael Manias, Abbas Javadtalab, Mahdi Hemmati, Yuren You, Abdallah Shami:
OTN-over-WDM optimization in 5G networks: key challenges and innovation opportunities. Photonic Netw. Commun. 45(2): 49-66 (2023) - 2022
- [j20]Abdallah Moubayed, Abdallah Shami, Anwer Al-Dulaimi:
On End-to-End Intelligent Automation of 6G Networks. Future Internet 14(6): 165 (2022) - [j19]Li Yang, Abdallah Moubayed, Abdallah Shami:
MTH-IDS: A Multitiered Hybrid Intrusion Detection System for Internet of Vehicles. IEEE Internet Things J. 9(1): 616-632 (2022) - [j18]Abdallah Moubayed, Abdallah Shami:
Softwarization, Virtualization, and Machine Learning for Intelligent and Effective Vehicle-to-Everything Communications. IEEE Intell. Transp. Syst. Mag. 14(2): 156-173 (2022) - [j17]Sam Aleyadeh, Abdallah Moubayed, Parisa Heidari, Abdallah Shami:
Optimal Container Migration/Re-Instantiation in Hybrid Computing Environments. IEEE Open J. Commun. Soc. 3: 15-30 (2022) - [j16]Li Yang, Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault:
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection. IEEE Trans. Netw. Serv. Manag. 19(1): 686-705 (2022) - 2021
- [j15]Abdallah Moubayed, Mohamed Sharif, Marco Luccini, Serguei Primak, Abdallah Shami:
Water Leak Detection Survey: Challenges & Research Opportunities Using Data Fusion & Federated Learning. IEEE Access 9: 40595-40611 (2021) - [j14]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Machine learning towards intelligent systems: applications, challenges, and opportunities. Artif. Intell. Rev. 54(5): 3299-3348 (2021) - [j13]Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner:
Edge-Enabled V2X Service Placement for Intelligent Transportation Systems. IEEE Trans. Mob. Comput. 20(4): 1380-1392 (2021) - [j12]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 18(2): 1803-1816 (2021) - 2020
- [j11]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Multi-split optimized bagging ensemble model selection for multi-class educational data mining. Appl. Intell. 50(12): 4506-4528 (2020) - [j10]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Systematic ensemble model selection approach for educational data mining. Knowl. Based Syst. 200: 105992 (2020) - 2019
- [j9]Abdallah Moubayed, Ahmed Refaey, Abdallah Shami:
Software-Defined Perimeter (SDP): State of the Art Secure Solution for Modern Networks. IEEE Netw. 33(5): 226-233 (2019) - 2018
- [j8]Abdallah Moubayed, MohammadNoor Injadat, Ali Bou Nassif, Hanan Lutfiyya, Abdallah Shami:
E-Learning: Challenges and Research Opportunities Using Machine Learning & Data Analytics. IEEE Access 6: 39117-39138 (2018) - [j7]Abdallah Moubayed, Karim Hammad, Abdallah Shami, Hanan Lutfiyya:
Dynamic Spectrum Management through Resource Virtualization with M2M Communications. IEEE Commun. Mag. 56(10): 121-127 (2018) - [j6]Karim Hammad, Abdallah Moubayed, Serguei Primak, Abdallah Shami:
QoS-Aware Energy and Jitter-Efficient Downlink Predictive Scheduler for Heterogeneous Traffic LTE Networks. IEEE Trans. Mob. Comput. 17(6): 1411-1428 (2018) - [j5]Emad Aqeeli, Abdallah Moubayed, Abdallah Shami:
Dynamic SON-Enabled Location Management in LTE Networks. IEEE Trans. Mob. Comput. 17(7): 1511-1523 (2018) - [j4]Emad Aqeeli, Abdallah Moubayed, Abdallah Shami:
Power-Aware Optimized RRH to BBU Allocation in C-RAN. IEEE Trans. Wirel. Commun. 17(2): 1311-1322 (2018) - 2016
- [j3]Mohamad Kalil, Abdallah Moubayed, Abdallah Shami, Arafat Al-Dweik:
Efficient Low-Complexity Scheduler for Wireless Resource Virtualization. IEEE Wirel. Commun. Lett. 5(1): 56-59 (2016) - [j2]Karim Hammad, Abdallah Moubayed, Abdallah Shami, Serguei Primak:
Analytical Approximation of Packet Delay Jitter in Simple Queues. IEEE Wirel. Commun. Lett. 5(6): 564-567 (2016) - 2015
- [j1]Abdallah Moubayed, Abdallah Shami, Hanan Lutfiyya:
Wireless Resource Virtualization With Device-to-Device Communication Underlaying LTE Network. IEEE Trans. Broadcast. 61(4): 734-740 (2015)
Conference and Workshop Papers
- 2023
- [c22]Ala' Alyabrodi, Shrouq Al-Daja, MohammadNoor Injadat, Abdallah Moubayed, Hebatullah Khattab:
Enhancing the Performance of Sign Language Recognition Models Using Machine Learning. ACIT 2023: 1-7 - [c21]Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah:
A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective. ACIT 2023: 1-6 - 2022
- [c20]Abdallah Moubayed, Abbas Javadtalab, Mahdi Hemmati, Yuren You, Abdallah Shami:
Traffic-Aware OTN-over-WDM Optimization in 5G Networks. MeditCom 2022: 184-190 - 2021
- [c19]Sam Aleyadeh, Abdallah Moubayed, Abdallah Shami:
Mobility Aware Edge Computing Segmentation Towards Localized Orchestration. ISNCC 2021: 1-6 - 2020
- [c18]Abdallah Moubayed, Tanveer Ahmed, Anwar Haque, Abdallah Shami:
Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing. CCECE 2020: 1-6 - [c17]Abdallah Moubayed, Emad Aqeeli, Abdallah Shami:
Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection. CCECE 2020: 1-6 - [c16]MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami:
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. ICM 2020: 1-4 - [c15]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami:
Optimized Random Forest Model for Botnet Detection Based on DNS Queries. ICM 2020: 1-4 - [c14]Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner:
Cost-optimal V2X Service Placement in Distributed Cloud/Edge Environment. WiMob 2020: 1-6 - 2019
- [c13]Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami:
Tree-Based Intelligent Intrusion Detection System in Internet of Vehicles. GLOBECOM 2019: 1-6 - [c12]Fadi Salo, MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Aleksander Essex:
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection. ICNC 2019: 276-281 - [c11]Palash Kumar, Abdallah Moubayed, Ahmed Refaey, Abdallah Shami, Juanita Koilpillai:
Performance Analysis of SDP For Secure Internal Enterprises. WCNC 2019: 1-6 - 2018
- [c10]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya:
DNS Typo-Squatting Domain Detection: A Data Analytics & Machine Learning Based Approach. GLOBECOM 2018: 1-7 - [c9]Sara Zimmo, Abdallah Moubayed, Ahmed Refaey, Abdallah Shami:
Coexistence of WiFi and LTE in the Unlicensed Band Using Time-Domain Virtualization. GLOBECOM 2018: 1-6 - [c8]Khaled Alhazmi, Abdallah Moubayed, Abdallah Shami:
Green Distributed Cloud Services Provisioning in SDN-enabled Cloud Environment. IWCMC 2018: 861-867 - [c7]Khaled Alhazmi, Abdallah Moubayed, Abdallah Shami:
Distributed SDN Controller Placement Using Betweenness Centrality & Hierarchical Clustering. DIVANet@MSWiM 2018: 15-20 - 2017
- [c6]Karim Hammad, Abdallah Moubayed, Serguei Primak, Abdallah Shami:
Investigating the energy-efficiency/delay jitter trade off for VoLTE in LTE downlink. PIMRC 2017: 1-7 - 2016
- [c5]Mohamed Hussein, Abdallah Moubayed, Serguei Primak, Abdallah Shami:
Virtualized allocation performance analysis in 5G two-tier cellular networks. CCECE 2016: 1-4 - [c4]Abdallah Moubayed, Abdallah Shami, Hanan Lutfiyya:
Power-Aware Wireless Virtualized Resource Allocation with D2D Communication Underlaying LTE Network. GLOBECOM 2016: 1-6 - 2015
- [c3]Emad Aqeeli, Abdallah Moubayed, Abdallah Shami:
Towards Intelligent LTE Mobility Management through MME Pooling. GLOBECOM 2015: 1-6 - [c2]Abdallah Moubayed, Sameh Sorour, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini:
Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks. VTC Spring 2015: 1-6 - [c1]Mohamed Hussein, Abdallah Moubayed, Serguei Primak, Abdallah Shami:
On efficient power allocation modeling in virtualized uplink 3GPP-LTE systems. WiMob 2015: 817-824
Parts in Books or Collections
- 2023
- [p1]Taher M. Ghazal, Mohammad Kamrul Hasan, Siti Norul Huda Sheikh Abdullah, Khairul Azmi Abu Bakar, Nidal A. Al-Dmour, Raed A. Said, Tamer Mohamed Abdellatif, Abdallah Moubayed, Haitham M. Alzoubi, Muhammad Alshurideh, Waleed Alomoush:
Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things. The Effect of Information Technology on Business and Marketing Intelligence Systems 2023: 2013-2036
Informal and Other Publications
- 2024
- [i20]Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah:
A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective. CoRR abs/2402.01655 (2024) - 2023
- [i19]Li Yang, Abdallah Moubayed, Abdallah Shami, Amine Boukhtouta, Parisa Heidari, Stere Preda, Richard Brunner, Daniel Migault, Adel Larabi:
Forensic Data Analytics for Anomaly Detection in Evolving Networks. CoRR abs/2308.09171 (2023) - 2022
- [i18]Abdallah Moubayed, Abdallah Shami, Abbas Ibrahim:
Intelligent Transportation Systems' Orchestration: Lessons Learned & Potential Opportunities. CoRR abs/2205.14040 (2022) - 2021
- [i17]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya:
Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules. CoRR abs/2101.02006 (2021) - [i16]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities. CoRR abs/2101.03655 (2021) - [i15]Li Yang, Abdallah Moubayed, Abdallah Shami:
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles. CoRR abs/2105.13289 (2021) - [i14]Li Yang, Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault:
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection. CoRR abs/2107.11514 (2021) - [i13]Sam Aleyadeh, Abdallah Moubayed, Abdallah Shami:
Mobility Aware Edge Computing Segmentation Towards Localized Orchestration. CoRR abs/2110.07808 (2021) - 2020
- [i12]Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner:
Edge-enabled V2X Service Placement for Intelligent Transportation Systems. CoRR abs/2001.06288 (2020) - [i11]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Systematic Ensemble Model Selection Approach for Educational Data Mining. CoRR abs/2005.06647 (2020) - [i10]Abdallah Moubayed, Abdallah Shami:
Softwarization, Virtualization, & Machine Learning For Intelligent & Effective V2X Communications. CoRR abs/2006.04595 (2020) - [i9]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining. CoRR abs/2006.05031 (2020) - [i8]Abdallah Moubayed, Emad Aqeeli, Abdallah Shami:
Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection. CoRR abs/2006.09272 (2020) - [i7]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection. CoRR abs/2008.03297 (2020) - [i6]Abdallah Moubayed, Tanveer Ahmed, Anwar Haque, Abdallah Shami:
Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing. CoRR abs/2009.03756 (2020) - [i5]Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner:
Cost-optimal V2X Service Placement in Distributed Cloud/Edge Environment. CoRR abs/2010.07223 (2020) - [i4]MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami:
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. CoRR abs/2012.11325 (2020) - [i3]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami:
Optimized Random Forest Model for Botnet Detection Based on DNS Queries. CoRR abs/2012.11326 (2020) - [i2]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya:
DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach. CoRR abs/2012.13604 (2020) - 2019
- [i1]Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami:
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles. CoRR abs/1910.08635 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint