Ahmad Fadlallah

Orcid: 0000-0002-2284-5034

According to our database1, Ahmad Fadlallah authored at least 21 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GDLC: A new Graph Deep Learning framework based on centrality measures for intrusion detection in IoT networks.
Internet Things, 2024

Shielding the Connected Cars: A Dataset-Powered Defense Against DDoS.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

How Does Distributed Denial of Service Affect the Connected Cars Environment?
Proceedings of the 10th International Conference on Control, 2024

2023
Detecting DDoS attacks using adversarial neural network.
Comput. Secur., April, 2023

Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform.
Future Internet, February, 2023

Intrusion Detection System for IoT Based on Complex Networks and Machine Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
LASII: Lightweight Authentication Scheme using IOTA in IoT Platforms.
Proceedings of the 20th Mediterranean Communication and Computer Networking Conference, 2022

Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

A Secure Scheme for Vehicle-to-Vehicle (V2V) Routing Protocol.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

2021
A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks.
Comput. Networks, 2021

2020
On the Cyber Security of Lebanon: A Large Scale Empirical Study of Critical Vulnerabilities.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

2019
A Survey of Internet of Things (IoT) Authentication Schemes.
Sensors, 2019

Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs).
Proceedings of the 2019 International Conference on Wireless Networks and Mobile Communications, 2019

2018
Analysis of Cryptographic Algorithms on IoT Hardware platforms.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

2017
A New Model for Rating Users' Profiles in Online Social Networks.
Comput. Inf. Sci., 2017

Analysis of authentication techniques in Internet of Things (IoT).
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
Scalable extensible middleware framework for context-aware mobile applications (SCAMMP).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Mobile user signature extraction based on user behavioural pattern (MUSEP).
Int. J. Pervasive Comput. Commun., 2016

2013
Efficient FPGA implementation of H.264 CAVLC entropy decoder.
Proceedings of the 8th International Design and Test Symposium, 2013

2006
PSAT: Proactive Signaling Architecture for IP Traceback.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

2005
A signaling architecture against dos attacks.
Proceedings of the ICETE 2005, 2005


  Loading...