Mo Adda

Orcid: 0000-0002-8741-6986

According to our database1, Mo Adda authored at least 54 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-Blockchain Model for IoT Devices Forensic Investigations on Spidernet.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2022
Fuzzy Control of Traffic Junctions in Undersaturated Urban Networks.
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022

2021
Forensic Tools for IoT Device Investigations in regards to Human Trafficking.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Are Human Drivers a Liability or an Asset?
Proceedings of the Intelligent Systems and Applications, 2021

Application of the Spectra of Graphs in Network Forensics.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Smart routing: Towards proactive fault handling of software-defined networks.
Comput. Networks, 2020

Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks.
IEEE Access, 2020

Automated Detection of Racial Microaggressions using Machine Learning.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Making Decision on Sharing Forensic Data with the Fuzzy Logic Approach.
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020

Identification of IoT Devices for Forensic Investigation.
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020

Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs).
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020

Towards Secure Data Sharing Processes in Online Social Networks: Trusty.
Proceedings of the 15th International Conference on Software Technologies, 2020

Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance.
PeerJ Prepr., 2019

Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

Intelligent Approach to Minimizing Power Consumption in a Cloud-Based System Collecting Sensor Data and Monitoring the Status of Powered Wheelchairs.
Proceedings of the Intelligent Systems and Applications, 2019

Genetic Algorithm Modeling for Photocatalytic Elimination of Impurity in Wastewater.
Proceedings of the Intelligent Systems and Applications, 2019

DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means.
Proceedings of the IEEE International Symposium on INnovations in Intelligent SysTems and Applications, 2019

Malicious Loop Detection Using Support Vector Machine.
Proceedings of the IEEE International Symposium on INnovations in Intelligent SysTems and Applications, 2019

Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

TrapMP: Malicious Process Detection By Utilising Program Phase Detection.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

A Fuzzy Modeling Approach for Group Decision Making in Social Networks.
Proceedings of the Business Information Systems - 22nd International Conference, 2019

2018
Fault Tolerance and Graceful Performance Degradation in Cloud Data Center.
J. Comput., 2018

ConfMVM: A Hardware-Assisted Model to Confine Malicious VMs.
Proceedings of the 20th UKSim-AMSS International Conference on Computer Modelling and Simulation, 2018

Achieving a Fault Tolerant and Reliable Cloud Data Center Network.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

2017
Routing and Fault Tolerance in Z-Fat Tree.
IEEE Trans. Parallel Distributed Syst., 2017

Fault Tolerance Improvement for Cloud Data Center.
J. Commun., 2017

Optimisation Methods for Fast Restoration of Software-Defined Networks.
IEEE Access, 2017

A Comparison Study on Flush+Reload and Prime+Probe Attacks on AES Using Machine Learning Approaches.
Proceedings of the Advances in Computational Intelligence Systems, 2017

New Computing Model for Securing Mobile Agents in IP Networks.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Locality based approach to improve propagation delay on the Bitcoin peer-to-peer network.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Virtual topology partitioning towards an efficient failure recovery of software defined networks.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fault tolerance capability of cloud data center.
Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing, 2017

2016
Bitcoin Network Measurements for Simulation Validation and Parameterization .
Proceedings of the Eleventh International Network Conference, 2016

Hierarchical classification for dealing with the Class imbalance problem.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

A Bitcoin Model for Evaluation of Clustering to Improve Propagation Delay in Bitcoin Network.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

2014
Fault Classification System for Computer Networks Using Fuzzy Probabilistic Neural Network Classifier (FPNNC).
Proceedings of the Engineering Applications of Neural Networks, 2014

2011
LRPF: an RF coverage reporting protocol for LTE systems.
IEEE Wirel. Commun., 2011

2010
Personality Filter in Mobile Networks with Communication Constraints.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010

J-PMCRI: A Methodology for Inducing Pre-pruned Modular Classification Rules.
Proceedings of the Artificial Intelligence in Theory and Practice III, 2010

Detecting Network Faults with Filtering.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Network fault detection with Wiener filter-based agent.
J. Netw. Comput. Appl., 2009

Convergence of terrestrial and satellite mobile communication systems: an operator's perspective.
Int. J. Mob. Commun., 2009

Parallel Rule Induction with Information Theoretic Pre-Pruning.
Proceedings of the Research and Development in Intelligent Systems XXVI, 2009

PMCRI: A Parallel Modular Classification Rule Induction Framework.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

Achieving 802.11 Wireless Networks Deployment in Noisy Environments.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

Efficiency and Benefits of Wireless Network Segregation.
Proceedings of the Fifth International Conference on Networking and Services, 2009

2008
Analysis of mobile agents in network fault management.
J. Netw. Comput. Appl., 2008

Parallel Induction of Modular Classification Rules.
Proceedings of the Research and Development in Intelligent Systems XXV, 2008

P-Prism: A Computationally Efficient Approach to Scaling up Classification Rule Induction.
Proceedings of the Artificial Intelligence in Theory and Practice II, 2008

2007
Network Segregation for Fixed 802.11 Wireless Networks Utilizing Modulo.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

2006
Self-organising quorum systems for ad hoc networks.
Proceedings of the Third IASTED International Conference on Communication, 2006


  Loading...