Farah I. Kandah
Orcid: 0000-0002-5729-8536
According to our database1,
Farah I. Kandah
authored at least 37 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Multi-Critics Generative Adversarial Networks for Imbalanced Data in Intrusion Detection System.
Proceedings of the International Conference on Smart Applications, 2024
Proceedings of the 23rd International Symposium on Parallel and Distributed Computing, 2024
B2-C2: Blockchain-based Flow Control Consistency for Multi-Controller SDN Architecture.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
2023
Future Gener. Comput. Syst., July, 2023
2022
Physical Layer-Based IoT Security: An Investigation Into Improving Preamble-Based SEI Performance When Using Multiple Waveform Collections.
IEEE Access, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Mitigating Location-based Attacks Using Predication Models in Vehicular Ad-Hoc Networks.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
IEEE Internet Things J., 2021
2020
Towards trusted and energy-efficient data collection in unattended wireless sensor networks.
Wirel. Networks, 2020
Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM.
CoRR, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
MARS: Machine learning based Adaptable and Robust Network Management for Software-defined Networks.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
Buterin's Scalability Trilemma viewed through a State-change-based Classification for Common Consensus Algorithms.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
2019
Denial of Service Attacks Prevention using Traffic Pattern Recognition over Software-Defined Network.
EAI Endorsed Trans. Ambient Syst., 2019
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
BLAST: Blockchain-based Trust Management in Smart Cities and Connected Vehicles Setup.
Proceedings of the 2019 IEEE High Performance Extreme Computing Conference, 2019
A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019
2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the 2017 International Conference on Computing, 2017
2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
2013
Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks.
Secur. Commun. Networks, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Self-protecting networking using dynamic <i>p</i>-cycle construction within link capacity constraint.
Secur. Commun. Networks, 2012
Diverse Path Routing with Interference and Reusability Consideration in Wireless Mesh Networks.
Mob. Networks Appl., 2012
Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks.
J. Commun., 2012
Int. J. Secur. Networks, 2012
2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010