A specification-based IDS for detecting attacks on RPL-based network topology A Le, J Loo, KK Chai, M Aiash Information 7 (2), 25, 2016 | 240 | 2016 |
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach A Le, J Loo, A Lasebae, M Aiash, Y Luo International Journal of Communication Systems 25 (9), 1189-1212, 2012 | 182 | 2012 |
Machine learning based botnet identification traffic A Azab, M Alazab, M Aiash 2016 IEEE Trustcom/BigDataSE/ISPA, 1788-1794, 2016 | 111 | 2016 |
Security analysis of the constrained application protocol in the Internet of Things TA Alghamdi, A Lasebae, M Aiash Second international conference on future generation communication …, 2013 | 106 | 2013 |
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms F Sardis, G Mapp, J Loo, M Aiash, A Vinel IEEE transactions on multimedia 15 (4), 769-777, 2013 | 85 | 2013 |
Secure live virtual machines migration: issues and solutions M Aiash, G Mapp, O Gemikonakli 2014 28th International Conference on Advanced Information Networking and …, 2014 | 72 | 2014 |
Providing security in 4G systems: unveiling the challenges M Aiash, G Mapp, A Lasebae, R Phan 2010 Sixth Advanced International Conference on Telecommunications, 439-444, 2010 | 60 | 2010 |
Exploring efficient imperative handover mechanisms for heterogeneous wireless networks G Mapp, F Shaikh, M Aiash, RP Vanni, M Augusto, E Moreira 2009 International Conference on Network-Based Information Systems, 286-291, 2009 | 43 | 2009 |
Formal verification and analysis of primary authentication based on 5G-AKA protocol EKK Edris, M Aiash, JKK Loo 2020 Seventh International Conference on Software Defined Systems (SDS), 256-261, 2020 | 42 | 2020 |
Software defined networking for wireless sensor networks: a survey M Hassan, Q Vien, M Aiash Advances in Wireless Communications and Networks 3 (2), 10-22, 2017 | 34 | 2017 |
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR M Aiash, G Mapp, A Lasebae, R Phan, J Loo EURASIP Journal on Wireless Communications and Networking 2012, 1-23, 2012 | 34 | 2012 |
Exploring multi-homing issues in heterogeneous environments G Mapp, M Aiash, HC Guardia, J Crowcroft 2011 IEEE Workshops of International Conference on Advanced Information …, 2011 | 30 | 2011 |
Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments G Mapp, F Katsriku, M Aiash, N Chinnam, R Lopes, E Moreira, ... Journal of Computer Networks and Communications 2012 (1), 748163, 2012 | 29 | 2012 |
Toward an efficient ontology-based event correlation in SIEM T Kenaza, M Aiash Procedia Computer Science 83, 139-146, 2016 | 26 | 2016 |
From fixed to mobile femtocells in LTE systems: Issues and challenges R Raheem, A Lasebae, M Aiash, J Loo Second International Conference on Future Generation Communication …, 2013 | 23 | 2013 |
IoT-based emergency vehicle services in intelligent transportation system A Chowdhury, S Kaisar, ME Khoda, R Naha, MA Khoshkholghi, M Aiash Sensors 23 (11), 5324, 2023 | 22 | 2023 |
Security models for heterogeneous networking G Mapp, M Aiash, A Lasebae, R Phan 2010 International Conference on Security and Cryptography (SECRYPT), 1-4, 2010 | 21 | 2010 |
Exploring a new security framework for cloud storage using capabilities G Mapp, M Aiash, B Ondiege, M Clarke 2014 IEEE 8th International Symposium on Service Oriented System Engineering …, 2014 | 18 | 2014 |
A survey on authentication and key agreement protocols in heterogeneous networks M Aiash, G Mapp, A Lasebae arXiv preprint arXiv:1208.1918, 2012 | 18 | 2012 |
Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement R Raheem, A Lasebae, M Aiash, J Loo, RH Colson Vehicular Communications 9, 31-42, 2017 | 17 | 2017 |