Mahdi Aiash

Orcid: 0000-0002-3984-6244

According to our database1, Mahdi Aiash authored at least 59 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain.
Internet Things, December, 2023

IoT-Based Emergency Vehicle Services in Intelligent Transportation System.
Sensors, 2023

Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

2022
An Introduction of a Modular Framework for Securing 5G Networks and Beyond.
Network, 2022

Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems.
Comput. Intell., 2022

Formalization and evaluation of EAP-AKA' protocol for 5G network access security.
Array, 2022

2021
DCSS Protocol for Data Caching and Sharing Security in a 5G Network.
Network, 2021

Formal verification of secondary authentication protocol for 5G secondary authentication.
Int. J. Secur. Networks, 2021

2020
Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

The Case for Federated Identity Management in 5G Communications.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

2019
Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) Communications.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
A security framework for node-to-node communications based on the LISP architecture.
Int. J. Electron. Secur. Digit. Forensics, 2018

Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

ZKPVM: A Zero-knowledge Authentication Protocol for VMs' Live Migration in Mobile Cloud Computing.
Proceedings of the 13th International Conference on Software Technologies, 2018

2017
Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement.
Veh. Commun., 2017

Mobility Management for Vehicular User Equipment in LTE/Mobile Femtocell Networks.
Int. J. Inf. Syst. Serv. Sect., 2017

2016
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology.
Inf., 2016

Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Machine Learning Based Botnet Identification Traffic.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Interference Management for Co-channel Mobile Femtocells Technology in LTE Networks.
Proceedings of the 12th International Conference on Intelligent Environments, 2016

Toward an Efficient Ontology-Based Event Correlation in SIEM.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Challenges and solutions for secure information centric networks: A case study of the NetInf architecture.
J. Netw. Comput. Appl., 2015

Special issue on information-centric network architecture, protocols, algorithms and applications.
J. Netw. Comput. Appl., 2015

An integrated authentication and authorization approach for the network of information architecture.
J. Netw. Comput. Appl., 2015

Investigating a Mobility-Aware QoS Model for Multimedia Streaming Rate Adaptation.
J. Electr. Comput. Eng., 2015

A formal analysis of authentication protocols for mobile devices in next generation networks.
Concurr. Comput. Pract. Exp., 2015

U-Sphere: Strengthening scalable flat-name routing for decentralized networks.
Comput. Networks, 2015

Virtualization and Cyber Security: Arming Future Security Practitioners.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Formally Verified Access Control Mechanism for Information Centric Networks.
Proceedings of the SECRYPT 2015, 2015

Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud Computing.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness.
Inf. Vis., 2014

Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR.
Int. J. Commun. Syst., 2014

Dynamic Traffic Management for Interactive Cloud Services: Localising Traffic Based on Network Throughput and User Mobility.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Exploring a New Security Framework for Cloud Storage Using Capabilities.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Dynamic Edge-Caching for Mobile Users: Minimising Inter-AS traffic by Moving Cloud Services and VMs.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

A Secure Framework for Communications in Heterogeneous Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Secure Live Virtual Machines Migration: Issues and Solutions.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
On the Investigation of Cloud-Based Mobile Media Environments With Service-Populating and QoS-Aware Mechanisms.
IEEE Trans. Multim., 2013

Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013

A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR.
Proceedings of the Network and System Security - 7th International Conference, 2013

A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.
Proceedings of the Network and System Security - 7th International Conference, 2013

From fixed to mobile femtocells in LTE systems: Issues and challenges.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Supporting communications in the IoTs using the location/ID split protocol: A security analysis.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Security analysis of the constrained application protocol in the Internet of Things.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

2012
Exploiting Location and Contextual Information to Develop a Comprehensive Framework for Proactive Handover in Heterogeneous Environments.
J. Comput. Networks Commun., 2012

6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach.
Int. J. Commun. Syst., 2012

A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR.
EURASIP J. Wirel. Commun. Netw., 2012

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
CoRR, 2012

A survey of potential architectures for communication in heterogeneous networks.
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012

A Formally Verified Device Authentication Protocol Using Casper/FDR.
Proceedings of the 11th IEEE International Conference on Trust, 2012

M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: "Subject matter expert's award".
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2011
Exploring Multi-homing Issues in Heterogeneous Environments.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Security Models for Heterogeneous Networking.
Proceedings of the SECRYPT 2010, 2010

Providing Security in 4G Systems: Unveiling the Challenges.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks.
Proceedings of the NBiS 2009, 2009


  Loading...