Folgen
Hadi Otrok
Hadi Otrok
Chair and Professor Computer Science, Khalifa University
Bestätigte E-Mail-Adresse bei ku.ac.ae - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems
OA Wahab, A Mourad, H Otrok, T Taleb
IEEE Communications Surveys & Tutorials 23 (2), 1342-1397, 2021
4912021
VANET QoS-OLSR: QoS-based clustering protocol for vehicular ad hoc networks
OA Wahab, H Otrok, A Mourad
Computer Communications 36 (13), 1422-1435, 2013
2182013
A survey on trust and reputation models for Web services: Single, composite, and communities
OA Wahab, J Bentahar, H Otrok, A Mourad
Decision Support Systems 74, 121-134, 2015
1732015
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009
1622009
AI, blockchain, and vehicular edge computing for smart and secure IoV: Challenges and directions
A Hammoud, H Sami, A Mourad, H Otrok, R Mizouni, J Bentahar
IEEE Internet of Things Magazine 3 (2), 68-73, 2020
1562020
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks
OA Wahab, A Mourad, H Otrok, J Bentahar
Expert Systems with Applications 50, 40-54, 2016
1452016
A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions
S Arisdakessian, OA Wahab, A Mourad, H Otrok, M Guizani
IEEE Internet of Things Journal 10 (5), 4059-4092, 2022
1422022
Optimal load distribution for the detection of VM-based DDoS attacks in the cloud
OA Wahab, J Bentahar, H Otrok, A Mourad
IEEE transactions on services computing 13 (1), 114-129, 2017
1342017
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
1252008
Towards trustworthy multi-cloud services communities: A trust-based hedonic coalitional game
OA Wahab, J Bentahar, H Otrok, A Mourad
IEEE Transactions on Services Computing 11 (1), 184-201, 2016
1242016
A Cooperative Watchdog Model Based on Dempster-Shafer for Detecting Misbehaving Vehicles
OA Wahab, H Otrok, A Mourad
Computer Communications 41, 43-54, 2014
1162014
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection
A Mourad, H Tout, OA Wahab, H Otrok, T Dbouk
IEEE Internet of Things Journal 8 (2), 829-843, 2020
1072020
On demand fog federations for horizontal federated learning in IoV
A Hammoud, H Otrok, A Mourad, Z Dziong
IEEE Transactions on Network and Service Management 19 (3), 3062-3075, 2022
1002022
AI-based resource provisioning of IoE services in 6G: A deep reinforcement learning approach
H Sami, H Otrok, J Bentahar, A Mourad
IEEE Transactions on Network and Service Management 18 (3), 3527-3540, 2021
952021
A crowd-sensing framework for allocation of time-constrained and location-based tasks
R Estrada, R Mizouni, H Otrok, A Ouali, J Bentahar
IEEE Transactions on Services Computing 13 (5), 769-785, 2017
922017
FoGMatch: An intelligent multi-criteria IoT-fog scheduling approach using game theory
S Arisdakessian, OA Wahab, A Mourad, H Otrok, N Kara
IEEE/ACM Transactions on Networking 28 (4), 1779-1789, 2020
832020
An efficient vehicle-to-vehicle (V2V) energy sharing framework
M Shurrab, S Singh, H Otrok, R Mizouni, V Khadkikar, H Zeineldin
IEEE Internet of Things Journal 9 (7), 5315-5328, 2021
822021
Demand-driven deep reinforcement learning for scalable fog and service placement
H Sami, A Mourad, H Otrok, J Bentahar
IEEE Transactions on Services Computing 15 (5), 2671-2684, 2021
812021
Resource-aware detection and defense system against multi-type attacks in the cloud: Repeated bayesian stackelberg game
OA Wahab, J Bentahar, H Otrok, A Mourad
IEEE Transactions on Dependable and Secure Computing 18 (2), 605-622, 2019
762019
A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading
T Dbouk, A Mourad, H Otrok, H Tout, C Talhi
IEEE Transactions on Network and Service Management 16 (4), 1665-1680, 2019
752019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20