default search action
Mo Adda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j10]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks. IEEE Access 8: 91311-91325 (2020) - [j9]Ali Malik, Benjamin Aziz, Mo Adda, Chih-Heng Ke:
Smart routing: Towards proactive fault handling of software-defined networks. Comput. Networks 170: 107104 (2020) - 2018
- [j8]Humphrey Emesowum, Athanasios Paraskelidis, Mo Adda:
Fault Tolerance and Graceful Performance Degradation in Cloud Data Center. J. Comput. 13(8): 889-896 (2018) - 2017
- [j7]Ali Malik, Benjamin Aziz, Mo Adda, Chih-Heng Ke:
Optimisation Methods for Fast Restoration of Software-Defined Networks. IEEE Access 5: 16111-16123 (2017) - [j6]Humphrey Emesowum, Athanasios Paraskelidis, Mo Adda:
Fault Tolerance Improvement for Cloud Data Center. J. Commun. 12(7): 412-418 (2017) - [j5]Mo Adda, Adamantini Peratikou:
Routing and Fault Tolerance in Z-Fat Tree. IEEE Trans. Parallel Distributed Syst. 28(8): 2373-2386 (2017) - 2011
- [j4]Asad Ahmad Khan, Mo Adda, Tahir Ahmad Khan:
LRPF: an RF coverage reporting protocol for LTE systems. IEEE Wirel. Commun. 18(6): 64-72 (2011) - 2009
- [j3]Asad Ahmad Khan, Mo Adda, Carl Adams:
Convergence of terrestrial and satellite mobile communication systems: an operator's perspective. Int. J. Mob. Commun. 7(3): 308-329 (2009) - [j2]Mouhammd Al-Kasassbeh, Mo Adda:
Network fault detection with Wiener filter-based agent. J. Netw. Comput. Appl. 32(4): 824-833 (2009) - 2008
- [j1]Mouhammd Al-Kasassbeh, Mo Adda:
Analysis of mobile agents in network fault management. J. Netw. Comput. Appl. 31(4): 699-711 (2008)
Conference and Workshop Papers
- 2024
- [c43]Soraya Harding, Mo Adda:
Multi-Blockchain Model for IoT Devices Forensic Investigations on Spidernet. CSR 2024: 120-126 - 2022
- [c42]Boriana Vatchova, Mo Adda, Yordanka Boneva, Alexander E. Gegov:
Fuzzy Control of Traffic Junctions in Undersaturated Urban Networks. BlackSeaCom 2022: 96-101 - 2021
- [c41]Chuck Easttom, Mo Adda:
Application of the Spectra of Graphs in Network Forensics. CCWC 2021: 846-852 - [c40]David A. Sanders, Malik Haddad, Giles Tewkesbury, Alexander E. Gegov, Mo Adda:
Are Human Drivers a Liability or an Asset? IntelliSys (1) 2021: 805-816 - [c39]Nancy Scheidt, Mo Adda, Lucas Chateau, Yasin Emir Kutlu:
Forensic Tools for IoT Device Investigations in regards to Human Trafficking. SmartIoT 2021: 1-7 - 2020
- [c38]Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network. IEEE ICBC 2020: 1-3 - [c37]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Towards Secure Data Sharing Processes in Online Social Networks: Trusty. ICSOFT 2020: 418-425 - [c36]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs). IEEE Conf. on Intelligent Systems 2020: 31-37 - [c35]Nancy Scheidt, Gulsum Akkuzu, Mo Adda:
Making Decision on Sharing Forensic Data with the Fuzzy Logic Approach. IEEE Conf. on Intelligent Systems 2020: 44-50 - [c34]Nancy Scheidt, Mo Adda:
Identification of IoT Devices for Forensic Investigation. IEEE Conf. on Intelligent Systems 2020: 165-170 - [c33]Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network. ISCC 2020: 1-6 - [c32]Omar Ali, Nancy Scheidt, Alexander E. Gegov, Ella Haig, Mo Adda, Benjamin Aziz:
Automated Detection of Racial Microaggressions using Machine Learning. SSCI 2020: 2477-2484 - 2019
- [c31]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
A Fuzzy Modeling Approach for Group Decision Making in Social Networks. BIS (2) 2019: 74-85 - [c30]Zirak Allaf, Mo Adda, Alexander E. Gegov:
TrapMP: Malicious Process Detection By Utilising Program Phase Detection. Cyber Security 2019: 1-8 - [c29]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks. ICISSP 2019: 674-684 - [c28]Zirak Allaf, Mo Adda, Alexander E. Gegov:
Malicious Loop Detection Using Support Vector Machine. INISTA 2019: 1-6 - [c27]Karwan Qader, Mo Adda:
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means. INISTA 2019: 1-6 - [c26]Raheleh Jafari, Sina Razvarz, Wen Yu, Alexander E. Gegov, Morten Goodwin, Mo Adda:
Genetic Algorithm Modeling for Photocatalytic Elimination of Impurity in Wastewater. IntelliSys (1) 2019: 228-236 - [c25]Ogechukwu Okonor, Mo Adda, Alexander E. Gegov, David A. Sanders, Malik Jamal Musa Haddad, Giles Tewkesbury:
Intelligent Approach to Minimizing Power Consumption in a Cloud-Based System Collecting Sensor Data and Monitoring the Status of Powered Wheelchairs. IntelliSys (1) 2019: 694-710 - [c24]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks. SNAMS 2019: 189-195 - 2018
- [c23]Humphrey Emesowum, Athanasios Paraskelidis, Mo Adda:
Achieving a Fault Tolerant and Reliable Cloud Data Center Network. SCC 2018: 201-208 - [c22]Zirak Allaf, Mo Adda, Alexander E. Gegov:
ConfMVM: A Hardware-Assisted Model to Confine Malicious VMs. UKSim 2018: 49-54 - 2017
- [c21]Humphrey Emesowum, Athanasios Paraskelidis, Mo Adda:
Fault tolerance capability of cloud data center. ICCP 2017: 495-502 - [c20]Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network. ICDCS 2017: 2411-2416 - [c19]Ali Malik, Benjamin Aziz, Chih-Heng Ke, Han Liu, Mo Adda:
Virtual topology partitioning towards an efficient failure recovery of software defined networks. ICMLC 2017: 646-651 - [c18]Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
Locality based approach to improve propagation delay on the Bitcoin peer-to-peer network. IM 2017: 556-559 - [c17]Jean Tajer, Mo Adda, Benjamin Aziz:
New Computing Model for Securing Mobile Agents in IP Networks. IoTBDS 2017: 232-238 - [c16]Zirak Allaf, Mo Adda, Alexander E. Gegov:
A Comparison Study on Flush+Reload and Prime+Probe Attacks on AES Using Machine Learning Approaches. UKCI 2017: 203-213 - 2016
- [c15]Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
A Bitcoin Model for Evaluation of Clustering to Improve Propagation Delay in Bitcoin Network. CSE/EUC/DCABES 2016: 468-475 - [c14]Mohamed Bahy Bader-El-Den, Eleman Teitei, Mo Adda:
Hierarchical classification for dealing with the Class imbalance problem. IJCNN 2016: 3584-3591 - [c13]Muntadher Fadhil Sallal, Gareth Owen, Mo Adda:
Bitcoin Network Measurements for Simulation Validation and Parameterization . INC 2016: 109-114 - 2014
- [c12]Karwan Qader, Mo Adda:
Fault Classification System for Computer Networks Using Fuzzy Probabilistic Neural Network Classifier (FPNNC). EANN 2014: 217-226 - 2010
- [c11]Mo Adda, Adamantini Peratikou, Djazia Ghefir:
Detecting Network Faults with Filtering. Security and Management 2010: 481-486 - [c10]Frederic T. Stahl, Max Bramer, Mo Adda:
J-PMCRI: A Methodology for Inducing Pre-pruned Modular Classification Rules. IFIP AI 2010: 47-56 - [c9]Maya Dimitrova, Anna K. Lekova, Mo Adda:
Personality Filter in Mobile Networks with Communication Constraints. SYNASC 2010: 565-568 - 2009
- [c8]Athanasios Paraskelidis, Mo Adda:
Efficiency and Benefits of Wireless Network Segregation. ICNS 2009: 235-241 - [c7]Athanasios Paraskelidis, Mo Adda:
Achieving 802.11 Wireless Networks Deployment in Noisy Environments. ICWN 2009: 495-501 - [c6]Frederic T. Stahl, Max A. Bramer, Mo Adda:
PMCRI: A Parallel Modular Classification Rule Induction Framework. MLDM 2009: 148-162 - [c5]Frederic T. Stahl, Max Bramer, Mo Adda:
Parallel Rule Induction with Information Theoretic Pre-Pruning. SGAI Conf. 2009: 151-164 - 2008
- [c4]Frederic T. Stahl, Max A. Bramer, Mo Adda:
P-Prism: A Computationally Efficient Approach to Scaling up Classification Rule Induction. IFIP AI 2008: 77-86 - [c3]Frederic T. Stahl, Max Bramer, Mo Adda:
Parallel Induction of Modular Classification Rules. SGAI Conf. 2008: 343-348 - 2007
- [c2]Athanasios Paraskelidis, Mo Adda:
Network Segregation for Fixed 802.11 Wireless Networks Utilizing Modulo. ICWN 2007: 451-457 - 2006
- [c1]Gareth Owen, Mo Adda:
Self-organising quorum systems for ad hoc networks. Communication, Network, and Information Security 2006: 93-98
Informal and Other Publications
- 2019
- [i2]Ali Malik, Benjamin Aziz, Mo Adda, Chih-Heng Ke:
Smart Routing: Towards Proactive Fault-Handling in Software-Defined Networks. CoRR abs/1904.00717 (2019) - [i1]Ali Malik, Benjamin Aziz, Ali Al-Haj, Mo Adda:
Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance. PeerJ Prepr. 7: e27624 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint