Ezedin Barka

Orcid: 0000-0002-3995-7198

Affiliations:
  • United Arab Emirates University, Al-Ain, UAE


According to our database1, Ezedin Barka authored at least 57 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-based multi-diagnosis deep learning application for various diseases classification.
Int. J. Inf. Sec., February, 2024

Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research Prospects.
IEEE Open J. Commun. Soc., 2024

AI-powered biometrics for Internet of Things security: A review and future vision.
J. Inf. Secur. Appl., 2024

A Review on Deep Learning Techniques for EEG-Based Driver Drowsiness detection systems.
Informatica (Slovenia), 2024

Empowering Healthcare With Cyber-Physical System - A Systematic Literature Review.
IEEE Access, 2024

A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of Things.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning.
Internet Things, October, 2023

Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
Sensors, July, 2023

Trustworthy Federated Learning: A Survey.
CoRR, 2023

Efficient Hybrid Fault-Management Clustering Algorithm (HFMCA) in WBANs Based on Weighted Bipartite Graph.
IEEE Access, 2023

Federated-Edge Computing Based Cyber-Physical Systems Framework for Enhanced Diabetes Management.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Empowering Trustworthy Client Selection in Edge Federated Learning Leveraging Reinforcement Learning.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2023

AI Techniques for Software Vulnerability Detection and Mitigation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

Integrating Cyber-Physical System with Federated-Edge Computing for Diabetes Detection and Management.
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023

2022
Implementation of a Biometric-Based Blockchain System for Preserving Privacy, Security, and Access Control in Healthcare Records.
J. Sens. Actuator Networks, 2022

Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure.
Trans. Emerg. Telecommun. Technol., 2022

The role of national cybersecurity strategies on the improvement of cybersecurity education.
Comput. Secur., 2022

A New Approach Based on a Multi-Agent System for IDS in Cloud Computing.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

A Smart Approach using Multi-agent System for Big Data Security.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Efforts and Suggestions for Improving Cybersecurity Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

Blockchain Technology for Secure Shared Medical Data.
Proceedings of the International Arab Conference on Information Technology, 2022

2021
V2X-based COVID-19 Pandemic Severity Reduction in Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Integrating Blockchain and IoT/ITS for Safer Roads.
IEEE Netw., 2020

Biometric-Based Blockchain EHR System (BBEHR).
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
SDN_Based Secure Healthcare Monitoring System(SDN-SHMS).
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

A Basic Course Model on Information Security for High School IT Curriculum.
Proceedings of the IEEE Global Engineering Education Conference, 2019

2018
UAV-assisted technique for the detection of malicious and selfish nodes in VANETs.
Veh. Commun., 2018

A Trusted Lightweight Communication Strategy for Flying Named Data Networking.
Sensors, 2018

A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Reputation-aware energy-efficient solution for FANET monitoring.
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017

Usage control for charging/discharging of plug-in electric vehicle (UConPEV).
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A Secure Discharging Protocol for Plug in Electric Vehicle (SDP-V2G) in Smart Grid.
Proceedings of the ICT Innovations 2017, 2017

Secure charging and payment protocol (SCPP) for roaming plug-in electric vehicles.
Proceedings of the 4th International Conference on Control, 2017

2016
Cognitive Radio for Smart Grid with Security Considerations.
Comput., 2016

PSCAN: A Port Scanning Network Covert Channel.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Lightweight encryption algorithm in wireless body area network for e-health monitoring.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016

Secure Spectrum Sensing in Cognitive-Radio-Based Smart Grid Using Role-Based Delegation.
Proceedings of the 8th International Conference on Information Management and Engineering, 2016

Securing Smart Meters Data for AMI Using RBAC.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A secure role-based service discovery technique for emergency intervention operations.
Proceedings of the Fourth International Conference on Future Generation Communication Technology (FGCT 2015), 2015

Securing the Web of Things with Role-Based Access Control.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2013
Mobility analysis in vehicular ad hoc network (VANET).
J. Netw. Comput. Appl., 2013

2011
OMAC: A new access control architecture for overlay multicast communications.
Int. J. Commun. Syst., 2011

2010
Business Model for Emerging Real-time Location-based Services - A Technical Perspective.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010

A role-based protocol for secure multicast communications in mobile ad hoc networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Optimal WiMax planning with security considerations.
Secur. Commun. Networks, 2009

Securing hierarchical multicast communications using roles.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

2008
Integrating Usage Control with SIP-Based Communications.
J. Comput. Networks Commun., 2008

Firewall filtering rules analysis for anomalies detection.
Int. J. Secur. Networks, 2008

Impact of IPSec on the Performance of the IEEE 802.16 Wireless Networks.
Proceedings of the NTMS 2008, 2008

2007
On the Impact of Security on the Performance of WLANs.
J. Commun., 2007

Analysis of the effect of security on data and voice traffic in WLAN.
Comput. Commun., 2007

Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Framework for Agent-Based Role Delegation.
Proceedings of IEEE International Conference on Communications, 2007

2006
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2004
Role-Based Delegation Model/ Hierarchical Roles (RBDM1).
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2000
Framework for Role-based Delegation Models.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000


  Loading...