Mahdi Aiash
Orcid: 0000-0002-3984-6244
According to our database1,
Mahdi Aiash
authored at least 59 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain.
Internet Things, December, 2023
Sensors, 2023
Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
Network, 2022
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems.
Comput. Intell., 2022
Array, 2022
2021
Formal verification of secondary authentication protocol for 5G secondary authentication.
Int. J. Secur. Networks, 2021
2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020
2019
Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) Communications.
Proceedings of the 2019 IEEE SmartWorld, 2019
2018
Int. J. Electron. Secur. Digit. Forensics, 2018
Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018
ZKPVM: A Zero-knowledge Authentication Protocol for VMs' Live Migration in Mobile Cloud Computing.
Proceedings of the 13th International Conference on Software Technologies, 2018
2017
Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement.
Veh. Commun., 2017
Int. J. Inf. Syst. Serv. Sect., 2017
2016
Inf., 2016
Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 12th International Conference on Intelligent Environments, 2016
Proceedings of the 7th International Conference on Ambient Systems, 2016
2015
Challenges and solutions for secure information centric networks: A case study of the NetInf architecture.
J. Netw. Comput. Appl., 2015
Special issue on information-centric network architecture, protocols, algorithms and applications.
J. Netw. Comput. Appl., 2015
An integrated authentication and authorization approach for the network of information architecture.
J. Netw. Comput. Appl., 2015
J. Electr. Comput. Eng., 2015
A formal analysis of authentication protocols for mobile devices in next generation networks.
Concurr. Comput. Pract. Exp., 2015
Comput. Networks, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the SECRYPT 2015, 2015
Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud Computing.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness.
Inf. Vis., 2014
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR.
Int. J. Commun. Syst., 2014
Dynamic Traffic Management for Interactive Cloud Services: Localising Traffic Based on Network Throughput and User Mobility.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Dynamic Edge-Caching for Mobile Users: Minimising Inter-AS traffic by Moving Cloud Services and VMs.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
On the Investigation of Cloud-Based Mobile Media Environments With Service-Populating and QoS-Aware Mechanisms.
IEEE Trans. Multim., 2013
Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR.
Proceedings of the Network and System Security - 7th International Conference, 2013
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Supporting communications in the IoTs using the location/ID split protocol: A security analysis.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
2012
Exploiting Location and Contextual Information to Develop a Comprehensive Framework for Proactive Handover in Heterogeneous Environments.
J. Comput. Networks Commun., 2012
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach.
Int. J. Commun. Syst., 2012
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR.
EURASIP J. Wirel. Commun. Netw., 2012
CoRR, 2012
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: "Subject matter expert's award".
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012
2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Security Models for Heterogeneous Networking.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
2009
Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks.
Proceedings of the NBiS 2009, 2009