default search action
Ali Chehab
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j99]Fouad Trad, Ali Chehab:
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models. Mach. Learn. Knowl. Extr. 6(1): 367-384 (2024) - [i8]Fouad Trad, Ali Chehab:
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications. CoRR abs/2403.17787 (2024) - 2023
- [j98]Hassan Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
LESCA: LightwEight Stream Cipher Algorithm for emerging systems. Ad Hoc Networks 138: 102999 (2023) - [j97]Mahdi Chehimi, Mohamad Khattar Awad, Mohammed Al-Husseini, Ali Chehab:
Machine learning-based anti-jamming technique at the physical layer. Concurr. Comput. Pract. Exp. 35(9) (2023) - [j96]Hassan N. Noura, Ola Salman, Ali Chehab:
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms. J. Inf. Secur. Appl. 76: 103514 (2023) - [c157]Hadi Noureddine, Omar Bekdache, Mohamad Al Tawil, Rouwaida Kanj, Ali Chehab, Mohammed E. Fouda, Ahmed M. Eltawil:
High-Density FeFET-based CAM Cell Design Via Multi-Dimensional Encoding. ACM Great Lakes Symposium on VLSI 2023: 403-407 - 2022
- [j95]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Efficient and secure selective cipher scheme for MIoT compressed images. Ad Hoc Networks 135: 102928 (2022) - [j94]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. Ann. des Télécommunications 77(5-6): 395-406 (2022) - [j93]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning. Comput. Networks 204: 108684 (2022) - [j92]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A machine learning based framework for IoT device identification and abnormal traffic detection. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j91]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Sec. 21(1): 115-158 (2022) - [j90]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet Things 19: 100544 (2022) - [j89]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices. IEEE Internet Things J. 9(18): 17885-17900 (2022) - [j88]Hassan N. Noura, Reem Melki, Ali Chehab:
Network coding and MPTCP: Enhancing security and performance in an SDN environment. J. Inf. Secur. Appl. 66: 103165 (2022) - [j87]Hassan N. Noura, Ali Chehab:
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms. J. Inf. Secur. Appl. 68: 103264 (2022) - [j86]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Novel one round message authentication scheme for constrained IoT devices. J. Ambient Intell. Humaniz. Comput. 13(1): 483-499 (2022) - [j85]Lama Shaer, Rouwaida Kanj, Rajiv V. Joshi, Ali Chehab:
Group LARS-Based Iterative Reweighted Least Squares Methodology for Efficient Statistical Modeling of Memory Designs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(12): 5722-5726 (2022) - [j84]Reem Melki, Hassan N. Noura, Ali Chehab:
An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security. Telecommun. Syst. 79(1): 17-32 (2022) - [j83]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems. Veh. Commun. 34: 100416 (2022) - [c156]Fouad Trad, Ali Hussein, Ali Chehab:
Using Siamese Neural Networks for Efficient and Accurate IoT Device Identification. FMEC 2022: 1-7 - [c155]Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability. SITIS 2022: 45-52 - [c154]Reem Melki, Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Machine Learning for Physical Layer Security: Limitations, Challenges and Recommendation. SITIS 2022: 53-60 - 2021
- [j82]Reem Melki, Hassan N. Noura, Ali Chehab:
Physical layer security for NOMA: limitations, issues, and recommendations. Ann. des Télécommunications 76(5-6): 375-397 (2021) - [j81]Hassan N. Noura, Reem Melki, Ali Chehab, Javier Hernandez Fernandez:
Efficient and robust data availability solution for hybrid PLC/RF systems. Comput. Networks 185: 107675 (2021) - [j80]Jean-Paul A. Yaacoub, Javier Hernandez Fernandez, Hassan N. Noura, Ali Chehab:
Security of Power Line Communication systems: Issues, limitations and existing solutions. Comput. Sci. Rev. 39: 100331 (2021) - [j79]Hassan N. Noura, Reem Melki, Ali Chehab:
Efficient data confidentiality scheme for 5G wireless NOMA communications. J. Inf. Secur. Appl. 58: 102781 (2021) - [j78]Louma Chaddad, Ali Chehab, Ayman I. Kayssi:
OPriv: Optimizing Privacy Protection for Network Traffic. J. Sens. Actuator Networks 10(3): 38 (2021) - [j77]Hassan N. Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, Raphaël Couturier:
TRESC: Towards redesigning existing symmetric ciphers. Microprocess. Microsystems 87: 103478 (2021) - [j76]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Data representation for CNN based internet traffic classification: a comparative study. Multim. Tools Appl. 80(11): 16951-16977 (2021) - [j75]Reem Melki, Hassan N. Noura, Javier Hernandez Fernandez, Ali Chehab:
Message authentication algorithm for OFDM communication systems. Telecommun. Syst. 76(3): 403-422 (2021) - [j74]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Optimal Packet Camouflage Against Traffic Analysis. ACM Trans. Priv. Secur. 24(3): 22:1-22:23 (2021) - [j73]Hassan N. Noura, Reem Melki, Rouwaida Kanj, Ali Chehab:
Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme. Wirel. Networks 27(1): 557-574 (2021) - [c153]Hassan Noura, Ali Chehab:
Efficient and Robust Keyed Hash Function Based on Artificial Neural Networks. ISNCC 2021: 1-7 - [c152]Iman Dernayka, Ali Chehab:
Blockchain Development Platforms: Performance Comparison. NTMS 2021: 1-6 - [c151]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Centralization vs. De-Centralization: Where Does the Network Control Plane Stand? SDS 2021: 1-6 - [i7]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
A Survey on Ethical Hacking: Issues and Challenges. CoRR abs/2103.15072 (2021) - [i6]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations. CoRR abs/2103.17028 (2021) - 2020
- [j72]Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
DistLog: A distributed logging scheme for IoT forensics. Ad Hoc Networks 98 (2020) - [j71]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A review on machine learning-based approaches for Internet traffic classification. Ann. des Télécommunications 75(11): 673-710 (2020) - [j70]Reem Melki, Hassan N. Noura, Ali Chehab:
Efficient and secure multi-homed systems based on binary random linear network coding. Comput. Electr. Eng. 87: 106774 (2020) - [j69]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Performance analysis of SDN vs OSPF in diverse network environments. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j68]Jean-Paul A. Yaacoub, Mohamad Noura, Hassan N. Noura, Ola Salman, Elias Yaacoub, Raphaël Couturier, Ali Chehab:
Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 105: 581-606 (2020) - [j67]Reem Melki, Hassan N. Noura, Ali Chehab:
Lightweight multi-factor mutual authentication protocol for IoT devices. Int. J. Inf. Sec. 19(6): 679-694 (2020) - [j66]Jean-Paul A. Yaacoub, Hassan Noura, Ola Salman, Ali Chehab:
Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 11: 100218 (2020) - [j65]Hassan Noura, Tarif Hatoum, Ola Salman, Jean-Paul A. Yaacoub, Ali Chehab:
LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet Things 12: 100303 (2020) - [j64]Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohammad Malli:
Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsystems 77: 103201 (2020) - [j63]Raphaël Couturier, Hassan N. Noura, Ali Chehab:
ESSENCE: GPU-based and dynamic key-dependent efficient stream cipher for multimedia contents. Multim. Tools Appl. 79(19-20): 13559-13579 (2020) - [j62]Hassan Noura, Mohamad Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Efficient & secure image availability and content protection. Multim. Tools Appl. 79(31-32): 22869-22904 (2020) - [j61]Elias Yaacoub, Khalid Abualsaud, Tamer Khattab, Ali Chehab:
Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN. IEEE Netw. 34(5): 226-231 (2020) - [j60]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
Physical layer security schemes for MIMO systems: an overview. Wirel. Networks 26(3): 2089-2111 (2020) - [c150]Hassan N. Noura, Ola Salman, Tarif Hatoum, Mohammad Malli, Ali Chehab:
Towards Securing LoRaWAN ABP Communication System. CLOSER 2020: 440-447 - [c149]Basma Hajri, Mohammad M. Mansour, Ali Chehab, Hassen Aziza:
A Lightweight Reconfigurable RRAM-based PUF for Highly Secure Applications. DFT 2020: 1-4 - [c148]Reem Melki, Hassan Noura, Ali Chehab:
An Efficient and Secure Cipher Scheme for Filter Bank Multi-Carrier Systems. ICETE (1) 2020: 133-141 - [c147]Hassan N. Noura, Ola Salman, Ali Chehab:
Efficient and Secure Cipher Scheme for Limited IoT Devices. ICETE (1) 2020: 142-150 - [c146]Hussein Majed, Hassan N. Noura, Ola Salman, Mohammad Malli, Ali Chehab:
Efficient and Secure Statistical DDoS Detection Scheme. ICETE (1) 2020: 153-161 - [c145]Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. ISCC 2020: 1-7 - [c144]Hussein Majed, Hassan N. Noura, Ali Chehab:
Overview of Digital Forensics and Anti-Forensics Techniques. ISDFS 2020: 1-5 - [c143]Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches. ISDFS 2020: 1-6 - [c142]Mahdi Chehimi, Elias Yaacoub, Ali Chehab, Mohammed Al-Husseini:
Physical Layer Anti-jamming Technique Using Massive Planar Antenna Arrays. IWCMC 2020: 1740-1745 - [c141]Hussein Majed, Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Efficient and Secure Statistical Port Scan Detection Scheme. MSPN 2020: 72-88 - [c140]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Network Obfuscation for Net Worth Security. SDS 2020: 83-88
2010 – 2019
- 2019
- [j59]Basma Hajri, Hassen Aziza, Mohammad M. Mansour, Ali Chehab:
RRAM Device Models: A Comparative Analysis With Experimental Validation. IEEE Access 7: 168963-168980 (2019) - [j58]Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Preserving data security in distributed fog computing. Ad Hoc Networks 94 (2019) - [j57]Hassan N. Noura, Reem Melki, Mohammad M. Mansour, Ali Chehab:
Design and realization of efficient & secure multi-homed systems based on random linear network coding. Comput. Networks 163 (2019) - [j56]Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Modelling Cognitive Bias in Crowdsourcing Systems. Cogn. Syst. Res. 58: 1-18 (2019) - [j55]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
AdaptiveMutate: a technique for privacy preservation. Digit. Commun. Networks 5(4): 245-255 (2019) - [j54]Riwa Mouawi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Crowdsourcing for click fraud detection. EURASIP J. Inf. Secur. 2019: 11 (2019) - [j53]Elias Yaacoub, Mohammed Al-Husseini, Ali Chehab, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani:
3D Beamforming With Massive Cylindrical Arrays for Physical Layer Secure Data Transmission. IEEE Commun. Lett. 23(5): 830-833 (2019) - [j52]Hassan Noura, Christophe Guyeux, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
Efficient Chaotic Encryption Scheme with OFB Mode. Int. J. Bifurc. Chaos 29(5): 1950059:1-1950059:24 (2019) - [j51]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach. IEEE Internet Things J. 6(1): 361-378 (2019) - [j50]Hassan N. Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour:
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. Mob. Networks Appl. 24(2): 447-463 (2019) - [j49]Hassan N. Noura, Mohamad Noura, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
Efficient and secure cipher scheme for multimedia contents. Multim. Tools Appl. 78(11): 14837-14866 (2019) - [j48]Hassan Noura, Ali Chehab, Mohamad Noura, Raphaël Couturier, Mohammad M. Mansour:
Lightweight, dynamic and efficient image encryption scheme. Multim. Tools Appl. 78(12): 16527-16561 (2019) - [j47]Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab:
A survey on OFDM physical layer security. Phys. Commun. 32: 1-30 (2019) - [j46]Hassan N. Noura, Ali Chehab, Raphaël Couturier:
Efficient & secure cipher scheme with dynamic key-dependent mode of operation. Signal Process. Image Commun. 78: 448-464 (2019) - [j45]Elias Yaacoub, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani, Ali Chehab:
Secure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach. IEEE Wirel. Commun. 26(5): 70-76 (2019) - [c139]Mahdi Chehimi, Rofaida Al Ahmad Matar, Elias Yaacoub, Ali Chehab, Hassan Noura:
Massive Planar Antenna Arrays for Physical Layer Security. ACTEA 2019: 1-6 - [c138]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Mobile Traffic Anonymization Through Probabilistic Distribution. ICIN 2019: 242-248 - [c137]Elias Yaacoub, Ali Chehab, Mohammed Al-Husseini, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani:
Joint Security and Energy Efficiency in IoT Networks Through Clustering and Bit Flipping. IWCMC 2019: 1385-1390 - [c136]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. MLN 2019: 99-116 - [c135]Reem Melki, Ali Hussein, Ali Chehab:
Enhancing Multipath TCP Security Through Software Defined Networking. SDS 2019: 33-38 - [c134]Ali Hussein, Ola Salman, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Machine Learning for Network Resiliency and Consistency. SDS 2019: 146-153 - [c133]Reem Melki, Hassan N. Noura, Ali Chehab:
Efficient & Secure Physical Layer Cipher Scheme for VLC Systems. VTC Fall 2019: 1-6 - [c132]Reem Melki, Hassan N. Noura, Ali Chehab:
Lightweight and Secure D2D Authentication & Key Management Based on PLS. VTC Fall 2019: 1-7 - [c131]Hassan N. Noura, Reem Melki, Ali Chehab:
Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems. VTC Fall 2019: 1-7 - [c130]Hassan Noura, Ali Chehab:
An Efficient and Secure Variant of RC4 Stream Cipher Scheme for Emerging Networks. WCNC 2019: 1-8 - [c129]Hassan Noura, Ali Chehab, Raphaël Couturier:
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices. WCNC 2019: 1-8 - [c128]Hassan Noura, Raphaël Couturier, Congduc Pham, Ali Chehab:
Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices. WiMob 2019: 1-8 - [i5]Ahmad W. Bitar, Jean Philippe Ovarlez, Loong-Fah Cheong, Ali Chehab:
Automatic Target Detection for Sparse Hyperspectral Images. CoRR abs/1904.09030 (2019) - 2018
- [j44]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
IoT survey: An SDN and fog computing perspective. Comput. Networks 143: 221-246 (2018) - [j43]Asmaa Abdallah, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
When Quantized Massive MIMO Meets Large MIMO With Higher Order Modulation. IEEE Commun. Lett. 22(12): 2599-2602 (2018) - [j42]Georgi A. Ajaeiya, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi, Marc Kneppers:
Mobile Apps identification based on network flows. Knowl. Inf. Syst. 55(3): 771-796 (2018) - [j41]Hassen Aziza, Basma Hajri, Mohammad M. Mansour, Ali Chehab, Annie Pérez:
A lightweight write-assist scheme for reduced RRAM variability and power. Microelectron. Reliab. 88-90: 6-10 (2018) - [j40]Hassan Noura, Lama Sleem, Mohamad Noura, Mohammad M. Mansour, Ali Chehab, Raphaël Couturier:
A new efficient lightweight and secure image cipher scheme. Multim. Tools Appl. 77(12): 15457-15484 (2018) - [j39]Hassan Noura, Ali Chehab, Lama Sleem, Mohamad Noura, Raphaël Couturier, Mohammad M. Mansour:
One round cipher algorithm for multimedia IoT devices. Multim. Tools Appl. 77(14): 18383-18413 (2018) - [j38]Mohamad Noura, Hassan Noura, Ali Chehab, Mohammad M. Mansour, Lama Sleem, Raphaël Couturier:
A dynamic approach for a lightweight and secure cipher for medical images. Multim. Tools Appl. 77(23): 31397-31426 (2018) - [j37]Maha Shamseddine, Wassim Itani, Ali Chehab, Ayman I. Kayssi:
Network Programming and Probabilistic Sketching for Securing the Data Plane. Secur. Commun. Networks 2018: 2905730:1-2905730:23 (2018) - [j36]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis. IEEE Trans. Commun. 66(6): 2421-2436 (2018) - [j35]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
Power Control and Channel Allocation for D2D Underlaid Cellular Networks. IEEE Trans. Commun. 66(7): 3217-3234 (2018) - [j34]Vahe Seferian, Rouwaida Kanj, Ali Chehab, Ayman I. Kayssi:
Identity Based Key Distribution Framework for Link Layer Security of AMI Networks. IEEE Trans. Smart Grid 9(4): 3166-3179 (2018) - [j33]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
High Order Multi-User MIMO Subspace Detection. J. Signal Process. Syst. 90(3): 305-321 (2018) - [c127]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Adaptive Optimization for Hybrid Network Control Planes. AICCSA 2018: 1-8 - [c126]Jean Abou Rahal, Bassel Maamari, Basma Hajri, Rouwaida Kanj, Mohammad M. Mansour, Ali Chehab:
Low power GDI ALU design with mixed logic adder functionality. ICICDT 2018: 9-12 - [c125]Basma Hajri, Mohammad M. Mansour, Ali Chehab, Hassen Aziza:
Memristor models optimization for large-scale 1T1R memory arrays. ICICDT 2018: 109-112 - [c124]Riwa Mouawi, Mariette Awad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. IIT 2018: 88-92 - [c123]Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
App traffic mutation: Toward defending against mobile statistical traffic analysis. INFOCOM Workshops 2018: 27-32 - [c122]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Channel-Punctured Large MIMO Detection. ISIT 2018: 2147-2151 - [c121]Anthony Mattar El Raachini, Hussein Alawieh, Adam Issa, Zainab Swaidan, Rouwaida Kanj, Ali Chehab, Mazen A. R. Saghir:
Double error cellular automata-based error correction with skip-mode compact syndrome coding for resilient PUF design. ISQED 2018: 413-418 - [c120]Hassan Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour, Steven Martin:
Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices. IWCMC 2018: 1267-1272 - [c119]Mohamad Noura, Hassan N. Noura, Ali Chehab, Mohammad M. Mansour, Raphaël Couturier:
S-DES: An efficient & secure DES variant. MENACOMM 2018: 1-6 - [c118]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A Multi-level Internet Traffic Classifier Using Deep Learning. NOF 2018: 68-75 - [c117]Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A Network Management Framework for SDN. NTMS 2018: 1-4 - [c116]Ali Hussein, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
SDN for QUIC: an enhanced architecture with improved connection establishment. SAC 2018: 2136-2139 - [c115]Ali Hussein, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Machine learning for network resilience: The start of a journey. SDS 2018: 59-66 - [c114]Ola Salman, Louma Chaddad, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Pushing intelligence to the network edge. SDS 2018: 87-92 - [c113]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Network convergence in SDN versus OSPF networks. SDS 2018: 130-137 - [c112]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab, Louay M. A. Jalloul:
MMSE Detection for 1-Bit Quantized Massive MIMO with Imperfect Channel Estimation. SPAWC 2018: 1-5 - [c111]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
Joint channel allocation and power control for D2D communications using stochastic geometry. WCNC 2018: 1-6 - [c110]Reem Melki, Mohammad M. Mansour, Ali Chehab:
A fairness-based congestion control algorithm for multipath TCP. WCNC 2018: 1-6 - [i4]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
Power Control and Channel Allocation for D2D Underlaid Cellular Networks. CoRR abs/1803.00983 (2018) - 2017
- [j32]Khodor Hamandi, Jacques Bou Abdo, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Comput. Commun. 98: 20-30 (2017) - [j31]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Modulation Classification via Subspace Detection in MIMO Systems. IEEE Commun. Lett. 21(1): 64-67 (2017) - [j30]Sami Malek, Sarah Abdallah, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Low-power and high-speed shift-based multiplier for error tolerant applications. Microprocess. Microsystems 52: 566-574 (2017) - [c109]Basma Hajri, Mohammad M. Mansour, Ali Chehab, Hassen Aziza:
Oxide-based RRAM models for circuit designers: A comparative analysis. DTIS 2017: 1-6 - [c108]Ola Salman, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
Multi-level security for the 5G/IoT ubiquitous network. FMEC 2017: 188-193 - [c107]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN for MPTCP: An enhanced architecture for large data transfers in datacenters. ICC 2017: 1-7 - [c106]Maha Shamseddine, Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Virtualized network views for localizing misbehaving sources in SDN data planes. ICC 2017: 1-7 - [c105]Adam Issa, Rouwaida Kanj, Ali Chehab, Rajiv V. Joshi:
Yield and energy tradeoffs of an NVLatch design using radial sampling. ICICDT 2017: 1-4 - [c104]Georgi A. Ajaeiya, Nareg Adalian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Flow-based Intrusion Detection System for SDN. ISCC 2017: 787-793 - [c103]Lama Shaer, Rouwaida Kanj, Rajiv V. Joshi, Maria Malik, Ali Chehab:
Regularized logistic regression for fast importance sampling based SRAM yield analysis. ISQED 2017: 119-124 - [c102]Saleh Usman, Mohammad M. Mansour, Ali Chehab:
A Multi-Gbps Fully Pipelined Layered Decoder for IEEE 802.11n/ac/ax LDPC Codes. ISVLSI 2017: 194-199 - [c101]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
QoS guarantee over hybrid SDN/non-SDN networks. NOF 2017: 141-143 - [c100]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Hard-output chase detectors for large MIMO: BER performance and complexity analysis. PIMRC 2017: 1-5 - [c99]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN VANETs in 5G: An architecture for resilient security services. SDS 2017: 67-74 - [c98]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Software Defined IoT security framework. SDS 2017: 75-80 - [c97]Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Fuzzy decision system for technology choice in hybrid networks. SDS 2017: 106-111 - [c96]Asmaa Abdallah, Mohammad M. Mansour, Ali Chehab:
A Distance-Based Power Control Scheme for D2D Communications Using Stochastic Geometry. VTC Fall 2017: 1-6 - [i3]Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab:
Efficient Implementation of a Recognition System Using the Cortex Ventral Stream Model. CoRR abs/1711.07827 (2017) - [i2]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Large MIMO Detection Schemes Based on Channel Puncturing: Performance and Complexity Analysis. CoRR abs/1712.01877 (2017) - 2016
- [c95]Raghid Morcel, Hadi Sarieddeen, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs. ACTEA 2016: 178-183 - [c94]Saleh Usman, Mohammad M. Mansour, Ali Chehab:
Interlaced Column-Row Message-Passing Schedule for Decoding LDPC Codes. GLOBECOM 2016: 1-6 - [c93]Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach. IC2E Workshops 2016: 30-35 - [c92]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN Security Plane: An Architecture for Resilient Security Services. IC2E Workshops 2016: 54-59 - [c91]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Efficient subspace detection for high-order MIMO systems. ICASSP 2016: 1001-1005 - [c90]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Efficient near optimal joint modulation classification and detection for MU-MIMO systems. ICASSP 2016: 3706-3710 - [c89]Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
SDN verification plane for consistency establishment. ISCC 2016: 519-524 - [c88]Ola Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Identity-based authentication scheme for the Internet of Things. ISCC 2016: 1109-1111 - [c87]Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi, Wassim Itani:
NCaaS: network configuration as a service in SDN-driven cloud architectures. SAC 2016: 448-454 - [c86]Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A crowdsourcing game-theoretic intrusion detection and rating system. SAC 2016: 622-625 - [c85]Farah Saab, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Solving sybil attacks using evolutionary game theory. SAC 2016: 2195-2201 - [c84]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Efficient near-optimal 8×8 MIMO detector. WCNC 2016: 1-6 - [c83]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Low-complexity joint modulation classification and detection in MU-MIMO. WCNC 2016: 1-6 - [i1]Hadi Sarieddeen, Mohammad M. Mansour, Ali Chehab:
Modulation Classification via Subspace Detection in MIMO Systems. CoRR abs/1610.03362 (2016) - 2015
- [j29]Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
G-Route: an energy-aware service routing protocol for green cloud computing. Clust. Comput. 18(2): 889-908 (2015) - [j28]Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Energy-Efficient Security for Voice over IP. Int. J. Netw. Secur. 17(1): 7-22 (2015) - [j27]Khodor Hamandi, Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Messaging Attacks on Android: Vulnerabilities and Intrusion Detection. Mob. Inf. Syst. 2015: 746930:1-746930:13 (2015) - [j26]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj, Wassim Itani:
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks. Sensors 15(2): 3299-3333 (2015) - [j25]Salwa Adriana Saab, Farah Saab, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
Partial mobile application offloading to the cloud for energy-efficiency with security measures. Sustain. Comput. Informatics Syst. 8: 38-46 (2015) - [c82]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
An architecture for the Internet of Things with decentralized data and centralized control. AICCSA 2015: 1-8 - [c81]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Likelihood-based modulation classification for MU-MIMO systems. GlobalSIP 2015: 873-877 - [c80]Hadi Sarieddeen, Mohammad M. Mansour, Louay M. A. Jalloul, Ali Chehab:
Low-complexity MIMO detector with 1024-QAM. GlobalSIP 2015: 883-887 - [c79]Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab:
Efficient Implementation of a Recognition System using the Cortex Ventral Stream Model. VISAPP (2) 2015: 138-147 - [c78]Ahmad W. Bitar, Mohammad M. Mansour, Ali Chehab:
Algorithmic Optimizations in the HMAX Model Targeted for Efficient Object Recognition. VISIGRAPP (Selected Papers) 2015: 374-395 - [c77]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Edge computing enabling the Internet of Things. WF-IoT 2015: 603-608 - [c76]Riwa Mouawi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Comparison of in-app ads traffic in different ad networks. WiMob 2015: 581-587 - 2014
- [j24]Wassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab:
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud. Future Gener. Comput. Syst. 32: 99-117 (2014) - [j23]Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
Fast dynamic internet mapping. Future Gener. Comput. Syst. 39: 55-66 (2014) - [j22]Mehiar Dabbagh, Hazem M. Hajj, Wassim El-Hajj, Mohammad M. Mansour, Ayman I. Kayssi, Ali Chehab:
An energy-aware design methodology based on kernel optimisations. Int. J. Auton. Adapt. Commun. Syst. 7(3): 271-294 (2014) - [j21]Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Decentralised malicious node detection in WSN. Int. J. Space Based Situated Comput. 4(1): 15-25 (2014) - [c75]Khaled Bakhit, Chantal Chalouhi, Sabine Francis, Sara Mourad, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
3G to Wi-Fi offloading on Android. AICCSA 2014: 247-252 - [c74]Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Mobile malware exposed. AICCSA 2014: 253-258 - [c73]Khaled Bakhit, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
DAGGER: Distributed architecture for granular mitigation of mobile based attacks. AICCSA 2014: 259-265 - [c72]Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
CrowdApp: Crowdsourcing for application rating. AICCSA 2014: 551-556 - [c71]Joseph Loutfi, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Smartphone sensors as random bit generators. AICCSA 2014: 773-780 - [c70]Jacques Bou Abdo, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Application-Aware Fast Dormancy in LTE. AINA 2014: 194-201 - [c69]Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
DAIDS: An Architecture for Modular Mobile IDS. AINA Workshops 2014: 328-333 - [c68]Ayman Mukaddam, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
IP Spoofing Detection Using Modified Hop Count. AINA 2014: 512-516 - [c67]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
ALPS: The Accountable Cloud Protocol Stack. CLOSER 2014: 467-475 - [c66]Dylan Bedrossian, Anas Harb, Rawad Khalil, Ali Chehab, Hassan Ali Artail:
"Server-less" Social Network for Enhanced Privacy. FNC/MobiSPC 2014: 95-102 - [c65]Gerard Touma, Rouwaida Kanj, Rajiv V. Joshi, Ayman I. Kayssi, Ali Chehab:
Robust bias temperature instability refresh design and methodology for memory cell recovery. ICICDT 2014: 1-4 - [c64]Sabine Francis, Rouwaida Kanj, Rajiv V. Joshi, Ayman I. Kayssi, Ali Chehab:
Statistical methodology for modeling non-IID memory fails events. ISQED 2014: 205-211 - [c63]Vahe Seferian, Rouwaida Kanj, Ali Chehab, Ayman I. Kayssi:
PUF and ID-based key distribution security framework for advanced metering infrastructures. SmartGridComm 2014: 933-938 - [c62]Khaled Bakhit, Sirine Taleb, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
CAVE: Hybrid Approach for In-Network Content Caching. UIC/ATC/ScalCom 2014: 649-654 - 2013
- [j20]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
SNUAGE: an efficient platform-as-a-service security framework for the cloud. Clust. Comput. 16(4): 707-724 (2013) - [j19]Jalal Awed, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Perception-aware packet-loss resilient compression for networked haptic systems. Comput. Commun. 36(15-16): 1621-1628 (2013) - [j18]Faisal Hamady, Ayman I. Kayssi, Ali Chehab, Nitin Gupte:
Effects of workload variation on the energy distribution in a mobile platform. Microprocess. Microsystems 37(8-D): 1192-1199 (2013) - [j17]Faisal Hamady, Ayman I. Kayssi, Ali Chehab, Mohammad M. Mansour:
Evaluation of Low-Power Computing when Operating on Subsets of Multicore Processors. J. Signal Process. Syst. 70(2): 193-208 (2013) - [c61]Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Malicious Node Detection in Wireless Sensor Networks. AINA Workshops 2013: 456-461 - [c60]Ramzi Bassil, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Effects of Signaling Attacks on LTE Networks. AINA Workshops 2013: 499-504 - [c59]Khodor Hamandi, Imad Sarji, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme. AINA Workshops 2013: 929-934 - [c58]Khodor Hamandi, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Android SMS Malware: Vulnerability and Mitigation. AINA Workshops 2013: 1004-1009 - [c57]Naoum Sayegh, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Internal security attacks on SCADA systems. ICCIT 2013: 22-27 - [c56]Wassim Itani, Cesar Ghali, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Accountable energy monitoring for green service routing in the cloud. ICCIT 2013: 103-108 - [c55]Alaa Atassi, Imad Sarji, Ayman I. Kayssi, Ali Chehab, Imad Elhaj:
Low overhead anonymous routing. ICCIT 2013: 173-178 - [c54]Ramzi Bassil, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A resource reservation attack against LTE networks. ICCIT 2013: 262-268 - [c53]Ibrahim Abdelghany, Wajeb Saab, Tarek Sakakini, Abdul-Amir Yassine, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Energy-efficient truncated multipliers. ICEAC 2013: 34-39 - [c52]Lama Shaer, Ihab Nahlus, Jawad Merhi, Ayman I. Kayssi, Ali Chehab:
Low-power digital signal processor design for a hearing aid. ICEAC 2013: 40-44 - [c51]Sarah Abdallah, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
TABSH: Tag-based stochastic hardware. ICEAC 2013: 115-120 - [c50]Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Energy-efficient HEVC using stochastic processing. ICEAC 2013: 152-157 - [c49]Salwa Adriana Saab, Ali Chehab, Ayman I. Kayssi:
Energy efficiency in Mobile Cloud Computing: Total offloading selectively works. Does selective offloading totally work? ICEAC 2013: 164-168 - [c48]Ibrahim Abdelghany, Wajeb Saab, Tarek Sakakini, Abdul-Amir Yassine, Ali Chehab, Ayman I. Kayssi, Imad H. Elhajj:
Energy-efficient truncated multipliers with scaling. IDT 2013: 1-6 - [c47]Faisal Hamady, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
User experience-based mechanism for preserving energy in graphics-intensive applications. NEWCAS 2013: 1-4 - [c46]Khodor Hamandi, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi. WTS 2013: 1-6 - 2012
- [c45]Sarah Abdallah, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Stochastic hardware architectures: A survey. ICEAC 2012: 1-6 - [c44]Farah Saab, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Energy efficient JPEG using stochastic processing. ICEAC 2012: 1-6 - [c43]Ramzi Bassil, Roula Hobeica, Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab:
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System. ICT 2012: 1-6 - [c42]Mostafa Dikmak, Zahraa Sabra, Ayman I. Kayssi, Ali Chehab:
Optimized conditional privacy preservation in VANETs. ICT 2012: 1-6 - [c41]Khodor Hamandi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Android SMS botnet: a new perspective. MOBIWAC 2012: 125-130 - [c40]Ramzi Bassil, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Signaling oriented denial of service on LTE networks. MOBIWAC 2012: 153-158 - [c39]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:
CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. PST 2012: 195-202 - [c38]Wassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab:
BGP-inspired autonomic service routing for the cloud. SAC 2012: 406-411 - 2011
- [j16]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail:
Fuzzy reputation-based trust model. Appl. Soft Comput. 11(1): 345-355 (2011) - [j15]Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
E2VoIP2: Energy efficient voice over IP privacy. Comput. Secur. 30(8): 815-829 (2011) - [c37]Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab:
Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing. CLOSER 2011: 49-55 - [c36]Faisal Hamady, Ali Chehab, Ayman I. Kayssi:
Energy consumption breakdown of a modern mobile platform under various workloads. ICEAC 2011: 1-4 - [c35]Wassim Itani, Ali Chehab, Ayman I. Kayssi:
Energy-efficient platform-as-a-service security provisioning in the cloud. ICEAC 2011: 1-6 - [c34]Imad Sarji, Cesar Ghali, Ali Chehab, Ayman I. Kayssi:
CloudESE: Energy efficiency model for cloud computing environments. ICEAC 2011: 1-6 - [c33]Ayman Tajeddine, Ali Chehab, Ayman I. Kayssi:
H-TRACE: A hybrid energy-aware routing scheme for mobile ad hoc networks. ICEAC 2011: 1-6 - [c32]Ahmed Fawaz, Ameen Jaber, Ali Kassem, Ali Chehab, Ayman I. Kayssi:
Assessing testing techniques for resistive-open defects in nanometer CMOS adders. ICECS 2011: 165-168 - [c31]Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali:
Secure delay-tolerant communications in the presence of oppressive governments. ICITST 2011: 302-307 - [c30]Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab:
A PUF-based ultra-lightweight mutual-authentication RFID protocol. ICITST 2011: 495-499 - [c29]Salwa Adriana Saab, Ayman I. Kayssi, Ali Chehab:
A decentralized energy-aware key management scheme for Wireless Sensor Networks. ICITST 2011: 504-508 - [c28]Layla Hamieh, Nader Mehdi, Ghazalah Omeirat, Ali Chehab, Ayman I. Kayssi:
The effectiveness of delay and IDDT tests in detecting resistive open defects for nanometer CMOS adder circuits. IDT 2011: 53-57 - [c27]Farah B. Yahya, Mohammad M. Mansour, Ali Chehab:
A novel technique to measure data retention voltage of large SRAM arrays. ISCAS 2011: 65-68 - [c26]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:
TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks. IWCMC 2011: 953-958 - [c25]Mehiar Dabbagh, Hazem M. Hajj, Ali Chehab, Wassim El-Hajj, Ayman I. Kayssi, Mohammad M. Mansour:
A design methodology for energy aware neural networks. IWCMC 2011: 1333-1340 - [c24]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing. SECRYPT 2011: 450-456 - [c23]Ihab Nahlus, Lama Shaer, Ali Chehab, Ayman I. Kayssi, Mohammad M. Mansour:
Low-power adder design techniques for noise-tolerant applications. SiPS 2011: 117-121 - 2010
- [j14]Rima Deghaili, Ali Chehab, Ayman I. Kayssi, Wassim Itani:
STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments. Int. J. Dependable Trust. Inf. Syst. 1(1): 60-81 (2010) - [c22]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:
A Privacy-Preserving Trust Model for VANETs. CIT 2010: 832-837 - [c21]Cesar Ghali, Ali Chehab, Ayman I. Kayssi:
CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services. CIT 2010: 1085-1089 - [c20]Mohammad Fawaz, Nader Kobrosli, Ali Chehab, Ayman I. Kayssi:
Testing techniques for resistive-open defects in future CMOS technologies. APCCAS 2010: 256-259 - [c19]Wassim Itani, Cesar Ghali, Ahmad M. El-Hajj, Ayman I. Kayssi, Ali Chehab:
SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks. GLOBECOM 2010: 1-6 - [c18]Mohammad Fawaz, Nader Kobrosli, Ahmad Chkeir, Ali Chehab, Ayman I. Kayssi:
Transient current and delay analysis for resistive-open defects in future 16 nm CMOS circuits. ICECS 2010: 438-441 - [c17]Wassim Itani, Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks. Q2SWinet 2010: 90-97
2000 – 2009
- 2009
- [j13]Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab:
Policy-driven and Content-based Web Services Security Gateway. Int. J. Netw. Secur. 8(3): 253-265 (2009) - [j12]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Smart encryption channels for securing virtual machine-based networked applications. Secur. Commun. Networks 2(6): 507-518 (2009) - [j11]Hovig Denkilkian, Agop Koulakezian, Rostom Ohannessian, Milad S. Chalfoun, Mohamad Khaled Joujou, Ali Chehab, Imad H. Elhajj:
Wireless Sensor for Continuous Real-Time Oil Spill Thickness and Location Measurement. IEEE Trans. Instrum. Meas. 58(12): 4001-4011 (2009) - [j10]Hassan Artail, Fahim Al-Halabi, Ali Chehab:
The design and implementation of an ad hoc network of mobile devices using the LIME II tuple-space framework. IEEE Wirel. Commun. 16(3): 52-59 (2009) - [c16]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. DASC 2009: 711-716 - [c15]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices. Q2SWinet 2009: 37-43 - [c14]Saleem Wehbe, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain. NTMS 2009: 1-5 - 2008
- [j9]Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab:
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System. Int. J. Netw. Secur. 6(2): 145-157 (2008) - [j8]Tarek Hassan, Ayman I. Kayssi, Ali Chehab:
Ring of Masters (ROM): A new ring structure for Bluetooth scatternets with dynamic routing and adaptive scheduling schemes. Pervasive Mob. Comput. 4(4): 546-561 (2008) - 2007
- [j7]Samer Hanna, Ali Chehab, Ayman I. Kayssi, Hassan Artail:
Lighter Weight Mobile Agent System. Int. J. Comput. Their Appl. 14(3): 170-187 (2007) - [c13]Lara Srour, Ayman I. Kayssi, Ali Chehab:
Personalized Web Page Ranking Using Trust and Similarity. AICCSA 2007: 454-457 - [c12]Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab:
SmartSSL: Efficient Policy-Based Web Security. AICCSA 2007: 833-839 - [c11]Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab:
XPRIDE: Policy-Driven Web Services Security Based on XML Content. GLOBECOM 2007: 553-558 - [c10]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures. SecureComm 2007: 63-72 - 2006
- [j6]Ali Chehab, Saurabh Patel, Rafic Z. Makki:
Scaling of iDDT Test Methods for Random Logic Circuits. J. Electron. Test. 22(1): 11-22 (2006) - [j5]Rania Wehbi, Ayman I. Kayssi, Ali Chehab, Zaher Dawy:
Network Setup for Secure Routing in Inter-Vehicle Communication Networks. Int. J. Bus. Data Commun. Netw. 2(4): 1-17 (2006) - [j4]Wassim Itani, Ayman I. Kayssi, Ali Chehab, Camille Gaspard:
A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices. Int. J. Netw. Secur. 3(2): 120-131 (2006) - [c9]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail:
PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. ATC 2006: 205-216 - [c8]Wassim Itani, Camille Gaspard, Ayman I. Kayssi, Ali Chehab:
PRIDE: Policy-Driven Web Security for Handheld Wireless Devices. GLOBECOM 2006 - [c7]Elias Yaacoub, Karim Y. Kabalan, Ali El-Hajj, Ali Chehab:
Cylindrical Antenna Arrays for WCDMA Downlink Capacity Enhancement. ICC 2006: 4912-4917 - [c6]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
An enterprise policy-based security protocol for protecting relational database network objects. IWCMC 2006: 343-348 - [c5]Lara Srour, Ayman I. Kayssi, Ali Chehab:
Reputation-Based Algorithm for Managing Trust in File Sharing Networks. SecureComm 2006: 1-10 - 2005
- [j3]Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab:
Trends in Mobile Agent Applications. J. Res. Pract. Inf. Technol. 37(4) (2005) - [j2]Ghada Derbas, Ayman I. Kayssi, Ali Chehab, Hassan Artail, Ayman Tajeddine:
A trust model for distributed systems based on reputation. Int. J. Web Grid Serv. 1(3/4): 416-447 (2005) - [c4]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices. SecureComm 2005: 240-242 - 2004
- [j1]Ali Chehab, Samer Hanna, Karim Y. Kabalan, Ali El-Hajj:
8085 microprocessor simulation tool "8085 SimuKit". Comput. Appl. Eng. Educ. 12(4): 249-256 (2004) - [c3]Najwa Aaraj, Anis Nazer, Ali Chehab, Ayman I. Kayssi:
Transient Current Testing of Dynamic CMOS Circuits. DFT 2004: 264-271 - [c2]Ghada Derbas, Ayman I. Kayssi, Hassan Artail, Ali Chehab:
TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation. ICPS 2004: 113-120 - 2002
- [c1]Ali Chehab, Rafic Z. Makki, Michael Spica, David Wu:
IDDT Test Methodologies for Very Deep Sub-micron CMOS Circuits. DELTA 2002: 403-407
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint