Folgen
Mai Abdelhakim
Titel
Zitiert von
Zitiert von
Jahr
Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard
A Alahmadi, M Abdelhakim, J Ren, T Li
IEEE transactions on information forensics and security 9 (5), 772-781, 2014
1252014
An automatic attribute-based access control policy extraction from access logs
L Karimi, M Aldairi, J Joshi, M Abdelhakim
IEEE Transactions on Dependable and Secure Computing 19 (4), 2304-2317, 2021
762021
Distributed detection in mobile access wireless sensor networks under byzantine attacks
M Abdelhakim, LE Lightfoot, J Ren, T Li
IEEE Transactions on Parallel and Distributed Systems 25 (4), 950-959, 2013
712013
Anomaly detection for cooperative adaptive cruise control in autonomous vehicles using statistical learning and kinematic model
F Alotibi, M Abdelhakim
IEEE Transactions on Intelligent Transportation Systems 22 (6), 3468-3478, 2020
692020
A time-efficient optimization for robust image watermarking using machine learning
AM Abdelhakim, M Abdelhakim
Expert Systems with Applications 100, 197-210, 2018
622018
Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning
X Liu, M Abdelhakim, P Krishnamurthy, D Tipper
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
542018
Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering
A Abdelhakim, HI Saleh, M Abdelhakim
Multimedia Tools and Applications 78 (22), 32523-32563, 2019
392019
Cooperative sensing in cognitive networks under malicious attack
M Abdelhakim, L Zhang, J Ren, T Li
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
332011
Mobile coordinated wireless sensor network: An energy efficient scheme for real-time transmissions
M Abdelhakim, Y Liang, T Li
IEEE Journal on Selected Areas in Communications 34 (5), 1663-1675, 2016
312016
Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard
A Alahmadi, M Abdelhakim, J Ren, T Li
2013 IEEE Global Communications Conference (GLOBECOM), 3229-3234, 2013
262013
Occupancy estimation using nonparametric online change-point detection, and apparatuses, systems, and software for same
S Bermudez, Y Li, M Abdelhakim
US Patent 10,605,905, 2020
202020
Reliable data fusion in wireless sensor networks under byzantine attacks
M Abdelhakim, LE Lightfoot, T Li
2011-MILCOM 2011 Military Communications Conference, 810-815, 2011
192011
Survey paper of digital twins and their integration into electric power systems
S Nguyen, M Abdelhakim, R Kerestes
2021 IEEE Power & Energy Society General Meeting (PESGM), 01-05, 2021
182021
On automated trust computation in iot with multiple attributes and subjective logic
NB Akhuseyinoglu, M Karimi, M Abdelhakim, P Krishnamurthy
2020 IEEE 45th Conference on Local Computer Networks (LCN), 267-278, 2020
162020
Adaptive abac policy learning: A reinforcement learning approach
L Karimi, M Abdelhakim, J Joshi
arXiv preprint arXiv:2105.08587, 2021
152021
Identifying malicious nodes in multihop iot networks using dual link technologies and unsupervised learning
X Liu, M Abdelhakim, P Krishnamurthy, D Tipper
Open Journal of Internet Of Things (OJIOT) 4 (1), 109-125, 2018
152018
Mobile access coordinated wireless sensor networks—Topology design and throughput analysis
M Abdelhakim, J Ren, T Li
2013 IEEE Global Communications Conference (GLOBECOM), 4627-4632, 2013
112013
Architecture design of mobile access coordinated wireless sensor networks
M Abdelhakim, LE Lightfoot, J Ren, T Li
2013 IEEE International Conference on Communications (ICC), 1720-1724, 2013
112013
Anomaly detection in cooperative adaptive cruise control using physics laws and data fusion
F Alotibi, M Abdelhakim
2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-7, 2019
102019
N-hop networks: A general framework for wireless systems
T Li, M Abdelhakim, J Ren
IEEE wireless communications 21 (2), 98-105, 2014
102014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20