Azzam Mourad

Orcid: 0000-0001-9434-5322

According to our database1, Azzam Mourad authored at least 156 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Projected Natural Gradient Method: Unveiling Low-Power Perturbation Vulnerabilities in Deep-Learning-Based Automatic Modulation Classification.
IEEE Internet Things J., November, 2024

LearnChain: Transparent and cooperative reinforcement learning on Blockchain.
Future Gener. Comput. Syst., January, 2024

Crowdsourced vehicles and UAVs for last-mile delivery application using blockchain-hosted matching mechanism.
Veh. Commun., 2024

CRAS-FL: Clustered resource-aware scheme for federated learning in vehicular networks.
Veh. Commun., 2024

Proactive and Intelligent Monitoring and Orchestration of Cloud-Native IP Multimedia Subsystem.
IEEE Open J. Commun. Soc., 2024

Optimizing CP-ABE Decryption in Urban VANETs: A Hybrid Reinforcement Learning and Differential Evolution Approach.
IEEE Open J. Commun. Soc., 2024

CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication.
J. Netw. Comput. Appl., 2024

Digital twins and dynamic NFTs for blockchain-based crowdsourced last-mile delivery.
Inf. Process. Manag., 2024

Federated Learning and Evolutionary Game Model for Fog Federation Formation.
CoRR, 2024

On-Demand Model and Client Deployment in Federated Learning with Deep Reinforcement Learning.
CoRR, 2024

Trust Driven On-Demand Scheme for Client Deployment in Federated Learning.
CoRR, 2024

Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities.
CoRR, 2024

The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions.
IEEE Commun. Surv. Tutorials, 2024

Resource-Aware Split Federated Learning for Fall Detection in the Metaverse.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

2023
A Survey on Explainable Artificial Intelligence for Cybersecurity.
IEEE Trans. Netw. Serv. Manag., December, 2023

Management of Digital Twin-Driven IoT Using Federated Learning.
IEEE J. Sel. Areas Commun., November, 2023

Reward shaping using convolutional neural network.
Inf. Sci., November, 2023

Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management.
IEEE Trans. Netw. Serv. Manag., September, 2023

On-Demand-FL: A Dynamic and Efficient Multicriteria Federated Learning Client Deployment Scheme.
IEEE Internet Things J., September, 2023

ModularFed: Leveraging modularity in federated learning frameworks.
Internet Things, July, 2023

Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources.
IEEE Trans. Netw. Serv. Manag., June, 2023

Dynamic Fog Federation Scheme for Internet of Vehicles.
IEEE Trans. Netw. Serv. Manag., June, 2023

Reinforcement learning based scheme for on-demand vehicular fog formation.
Veh. Commun., April, 2023

Data independent warmup scheme for non-IID federated learning.
Inf. Sci., April, 2023

Adaptive Upgrade of Client Resources for Improving the Quality of Federated Learning Model.
IEEE Internet Things J., March, 2023

A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions.
IEEE Internet Things J., March, 2023

Reinforcement Learning Framework for Server Placement and Workload Allocation in Multiaccess Edge Computing.
IEEE Internet Things J., January, 2023

A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations.
IEEE Trans. Serv. Comput., 2023

Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Continuous Authentication for Mobile and IoT Systems Using Warmup-Based Federated Learning.
IEEE Netw., 2023

On the feasibility of Federated Learning towards on-demand client deployment at the edge.
Inf. Process. Manag., 2023

FedMint: Intelligent Bilateral Client Selection in Federated Learning With Newcomer IoT Devices.
IEEE Internet Things J., 2023

Perception, performance, and detectability of conversational artificial intelligence across 32 university courses.
CoRR, 2023

A Survey on Explainable Artificial Intelligence for Network Cybersecurity.
CoRR, 2023

Towards Mutual Trust-Based Matching For Federated Learning Client Selection.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Blockchain-based Reputation Management Framework for Crowdsourced Last-mile Delivery.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Towards On-Demand Deployment of Multiple Clients and Heterogeneous Models in Federated Learning.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Towards Trust Driven On-Demand Client Deployment in Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Towards Instant Clustering Approach for Federated Learning Client Selection.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Towards Boosting Federated Learning Convergence: A Computation Offloading & Clustering Approach.
Proceedings of the IEEE International Conference on Communications, 2023

Towards Stable Federated Fog Formation Using Federated Learning and Evolutionary Game Theory.
Proceedings of the IEEE Global Communications Conference, 2023

Overcoming Resource Bottlenecks in Vehicular Federated Learning: A Cluster-Based and QoS-Aware Approach.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement.
IEEE Trans. Serv. Comput., 2022

On Demand Fog Federations for Horizontal Federated Learning in IoV.
IEEE Trans. Netw. Serv. Manag., 2022

SVM-Based Task Admission Control and Computation Offloading Using Lyapunov Optimization in Heterogeneous MEC Network.
IEEE Trans. Netw. Serv. Manag., 2022

LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT.
IEEE Trans. Dependable Secur. Comput., 2022

Joint theme and event based rating model for identifying relevant influencers on Twitter: COVID-19 case study.
Online Soc. Networks Media, 2022

Graph convolutional recurrent networks for reward shaping in reinforcement learning.
Inf. Sci., 2022

Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication.
CoRR, 2022

ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme.
CoRR, 2022

A Federated Learning Scheme for Neuro-developmental Disorders: Multi-Aspect ASD Detection.
CoRR, 2022

Reinforcement Learning Framework for Server Placement and Workload Allocation in Multi-Access Edge Computing.
CoRR, 2022

Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC.
Comput. Networks, 2022

Data-Driven Federated Autonomous Driving.
Proceedings of the Mobile Web and Intelligent Information Systems, 2022

Reinforcement Learning Based Scheme for On-Demand Vehicular Fog Formation and Micro Services Placement.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Machine Learning Based Container Placement in On-Demand Clustered Fogs.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Towards Bilateral Client Selection in Federated Learning Using Matching Game Theory.
Proceedings of the IEEE Global Communications Conference, 2022

On the Feasibility of Federated Learning for Neurodevelopmental Disorders: ASD Detection Use-Case.
Proceedings of the IEEE Global Communications Conference, 2022

Independent and Identically Distributed (IID) Data Assessment in Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Task coalition formation for Mobile CrowdSensing based on workers' routes preferences.
Veh. Commun., 2021

Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading.
IEEE/ACM Trans. Netw., 2021

AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach.
IEEE Trans. Netw. Serv. Manag., 2021

Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game.
IEEE Trans. Dependable Secur. Comput., 2021

A Novel Federated Fog Architecture Embedding Intelligent Formation.
IEEE Netw., 2021

A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond.
IEEE Internet Things J., 2021

FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning.
IEEE Internet Things J., 2021

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection.
IEEE Internet Things J., 2021

Stable federated fog formation: An evolutionary game theoretical approach.
Future Gener. Comput. Syst., 2021

Ontology based recommender system using social network data.
Future Gener. Comput. Syst., 2021

Federated Machine Learning: Survey, Multi-Level Classification, Desirable Criteria and Future Directions in Communication and Networking Systems.
IEEE Commun. Surv. Tutorials, 2021

2020
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud.
IEEE Trans. Serv. Comput., 2020

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services.
IEEE/ACM Trans. Netw., 2020

FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory.
IEEE/ACM Trans. Netw., 2020

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment.
IEEE Trans. Netw. Serv. Manag., 2020

Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions.
IEEE Trans. Netw. Serv. Manag., 2020

Reinforcement R-learning model for time scheduling of on-demand fog placement.
J. Supercomput., 2020

Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning?
IEEE Netw., 2020

An endorsement-based trust bootstrapping approach for newcomer cloud services.
Inf. Sci., 2020

AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions.
IEEE Internet Things Mag., 2020

Cloud federation formation using genetic and evolutionary game theoretical models.
Future Gener. Comput. Syst., 2020

A two-level solution to fight against dishonest opinions in recommendation-based trust systems.
CoRR, 2020

A rewriting system for the assessment of XACML policies relationship.
Comput. Secur., 2020

Intelligent Performance-Aware Adaptation of Control Policies for Optimizing Banking Teller Process Using Machine Learning.
IEEE Access, 2020

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Towards Trust-Aware IoT Hashing Offloading in Mobile Edge Computing.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Optical Spatial Modulation with Improved Energy Harvesting for MIMO FSO Communications.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A Framework for Automated Monitoring and Orchestration of Cloud-Native applications.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading.
IEEE Trans. Netw. Serv. Manag., 2019

Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability.
IEEE Trans. Cloud Comput., 2019

On the Detection of Passive Malicious Providers in Cloud Federations.
IEEE Commun. Lett., 2019

Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing.
Comput. Electr. Eng., 2019

An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation.
IEEE Access, 2019

Sampling Online Social Networks with Tailored Mining Strategies.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

2018
A novel on-demand vehicular sensing framework for traffic condition monitoring.
Veh. Commun., 2018

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game.
IEEE Trans. Serv. Comput., 2018

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach.
IEEE Access, 2018

Towards Proactive Social Learning Approach for Traffic Event Detection based on Arabic Tweets.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
Smart mobile computation offloading: Centralized selective and multi-objective approach.
Expert Syst. Appl., 2017

I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

On the Effects of User Ratings on the Profitability of Cloud Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks.
Expert Syst. Appl., 2016

A Stackelberg game for distributed formation of business-driven services communities.
Expert Syst. Appl., 2016

From model-driven specification to design-level set-based analysis of XACML policies.
Comput. Electr. Eng., 2016

Towards ad-hoc cloud based approach for mobile intrusion detection.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service.
Proceedings of the 7th International Conference on Ambient Systems, 2016

An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability.
Proceedings of the 7th International Conference on Ambient Systems, 2016

How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud?
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services.
Expert Syst. Appl., 2015

A survey on trust and reputation models for Web services: Single, composite, and communities.
Decis. Support Syst., 2015

AOMD approach for context-adaptable and conflict-free Web services composition.
Comput. Electr. Eng., 2015

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies.
Comput. Electr. Eng., 2015

Analyzing Social Web Services' Capabilities.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

Misbehavior Detection Framework for Community-Based Cloud Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Towards an offloading approach that augments multi-persona performance and viability.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol.
Wirel. Pers. Commun., 2014

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol.
Wirel. Pers. Commun., 2014

Assuring consistency in mixed models.
J. Comput. Sci., 2014

A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles.
Comput. Commun., 2014

Towards efficient evaluation of XACML policies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
XrML-RBLicensing approach adapted to the BPEL process of composite web services.
Serv. Oriented Comput. Appl., 2013

Common weaving approach in mainstream languages for software security hardening.
J. Syst. Softw., 2013

New XACML-AspectBPEL approach for composite web services security.
Int. J. Web Grid Serv., 2013

VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks.
Comput. Commun., 2013

Detecting attacks in QoS-OLSR protocol.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Botnet detection: A cooperative game theoretical correlation-based model.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

2012
A synergy between context-aware policies and AOP to achieve highly adaptable Web services.
Serv. Oriented Comput. Appl., 2012

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security.
Int. J. Web Grid Serv., 2012

Towards a BPEL model-driven approach for Web services security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Towards Smart Anti-Malwares for Battery-Powered Devices.
Proceedings of the 5th International Conference on New Technologies, 2012

2011
Towards context-adaptable Web service policies.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

New Approach Targeting Security Patterns Development and Deployment.
Inf. Secur. J. A Glob. Perspect., 2011

A cluster-based model for QoS-OLSR protocol.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Toward an abstract language on top of XACML for web services security.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Toward Systematic Integration of Security Policies into Web Services.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Security Evaluation and Hardening of Free and Open Source Software (FOSS).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

A Novel Approach for the Development and Deployment of Security Patterns.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

New approach for the dynamic enforcement of Web services security.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité.
Tech. Sci. Informatiques, 2009

New aspect-oriented constructs for security hardening concerns.
Comput. Secur., 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

2008
Wireless Applications: Middleware Security.
Encyclopedia of Wireless and Mobile Communications, 2008

A High-level Aspect-oriented-based Framework for Software Security Hardening.
Inf. Secur. J. A Glob. Perspect., 2008

An aspect-oriented approach for the systematic security hardening of code.
Comput. Secur., 2008

Towards Language-Independent Approach for Security Concerns Weaving.
Proceedings of the SECRYPT 2008, 2008

Cross-Language Weaving Approach Targeting Software Security Hardening.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

2007
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns.
Proceedings of the Security in Information Systems, 2007

A High-Level Aspect-Oriented based Language for Software Security Hardening.
Proceedings of the SECRYPT 2007, 2007

Control Flow Based Pointcuts for Security Hardening Concerns.
Proceedings of the Trust Management, 2007

A Security Hardening Language Based on Aspect-Orientation.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Towards an Aspect Oriented Approach for the Security Hardening of Code.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors.
Sci. Comput. Program., 2006

Security hardening of open source software.
Proceedings of the 2006 International Conference on Privacy, 2006

Security Design Patterns: Survey and Evaluation.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Accelerating embedded Java for mobile devices.
IEEE Commun. Mag., 2005

Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005


  Loading...