Stebėti
Jacques Bou Abdo
Pavadinimas
Cituota
Cituota
Metai
Blockchain: Trends and Future Opportunities
S Zeadally, J Bou Abdo
Internet Technology Letters, e130, 2019
772019
A survey on access control mechanisms for cloud computing
R El Sibai, N Gemayel, J Bou Abdo, J Demerjian
Transactions on Emerging Telecommunications Technologies 31 (2), e3720, 2020
762020
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
S Hajj, R El Sibai, J Bou Abdo, J Demerjian, A Makhoul, C Guyeux
Transactions on Emerging Telecommunications Technologies, 4240, 2021
662021
Similarity measures for collaborative filtering recommender systems
L Al Hassanieh, C Abou Jaoudeh, J Bou Abdo, J Demerjian
2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 1-5, 2018
572018
Ensured confidentiality authentication and key agreement protocol for EPS
J Bou Abdo, H Chaouchi, M Aoude
Broadband Networks and Fast Internet (RELABIRA), 2012 Symposium on, 73-77, 2012
52*2012
Security in Emerging 4G Networks
J Bou Abdo, H Chaouchi, J Demerjian
Next-Generation Wireless Technologies, 243-272, 2013
45*2013
Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains
J Bou Abdo, R El Sibai, J Demerjian
Transactions on Emerging Telecommunications Technologies, e4148, 2020
402020
Broker-based Cross-Cloud Federation Manager
J Bou Abdo, J Demerjian, H Chaouchi, K Barbar, G Pujolle
Internet Technology and Secured Transactions (ICITST), 2013 8th …, 2013
39*2013
Evaluation of mobile cloud architectures
J Bou Abdo, J Demerjian
Pervasive and Mobile Computing 39, 284-303, 2017
352017
Connectivity-aware service provision in vehicular cloud
R El Sibaï, T Atéchian, J Bou Abdo, R Tawil, J Demerjian
2015 International Conference on Cloud Technologies and Applications …, 2015
322015
Converged AI, IoT, and blockchain technologies: a conceptual ethics framework
E Nehme, R El Sibai, J Bou Abdo, AR Taylor, J Demerjian
AI and Ethics 2 (1), 129-143, 2022
262022
Extended Privacy in Crowdsourced Location‐Based Services Using Mobile Cloud Computing
J Bou Abdo, T Bourgeau, J Demerjian, H Chaouchi
Mobile Information Systems 2016 (1), 7867206, 2016
252016
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA
K Hamandi, J Bou Abdo, IH Elhajj, A Kayssi, A Chehab
Computer Communications 98, 20-30, 2017
232017
Exhaustive Study on Medical Sensors
N Boudargham, J Bou Abdo, J Demerjian, C Guyeux
The Eleventh International Conference on Sensor Technologies and …, 2017
222017
Multi-utility framework: blockchain exchange platform for sustainable development
J Bou Abdo, S Zeadally
International Journal of Pervasive Computing and Communications, 2020
21*2020
EC-AKA2 a revolutionary AKA protocol
J Bou Abdo, J Demerjian, H Chaouchi, G Pujolle
2013 International Conference on Computer Applications Technology (ICCAT), 1 - 6, 2013
202013
Efficient hybrid emergency aware MAC protocol for wireless body sensor networks
N Bou Dargham, A Makhoul, J Bou Abdo, J Demerjian, C Guyeux
Sensors 18 (10), 3572, 2018
192018
EPS mutual authentication and Crypt-analyzing SPAKA
J Bou Abdo, J Demerjian, K Ahmad, H Chaouchi, G Pujolle
Computing, Management and Telecommunications (ComManTel), 2013 International …, 2013
19*2013
Evolving malware & ddos attacks: Decadal longitudinal study
OI Falowo, M Ozer, C Li, JB Abdo
IEEE Access, 2024
182024
Toward fast and accurate emergency cases detection in BSNs
N Boudargham, R El Sibai, J Bou Abdo, J Demerjian, C Guyeux, ...
IET Wireless Sensor Systems 10 (1), 47-60, 2019
182019
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20