Ola Salman

Orcid: 0000-0002-1011-8665

According to our database1, Ola Salman authored at least 50 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Explainable artificial intelligence of tree-based algorithms for fault detection and diagnosis in grid-connected photovoltaic systems.
Eng. Appl. Artif. Intell., 2025

2024
A deep learning object detection method to improve cluster analysis of two-dimensional data.
Multim. Tools Appl., August, 2024

Wind turbine fault detection and identification using a two-tier machine learning framework.
Intell. Syst. Appl., 2024

Leveraging the power of machine learning and data balancing techniques to evaluate stability in smart grids.
Eng. Appl. Artif. Intell., 2024

2023
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms.
J. Inf. Secur. Appl., August, 2023

LESCA: LightwEight Stream Cipher Algorithm for emerging systems.
Ad Hoc Networks, 2023

A deep learning scheme for efficient multimedia IoT data compression.
Ad Hoc Networks, 2023

2022
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems.
Veh. Commun., 2022

DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm.
J. Supercomput., 2022

Novel one round message authentication scheme for constrained IoT devices.
J. Ambient Intell. Humaniz. Comput., 2022

A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices.
IEEE Internet Things J., 2022

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations.
Internet Things, 2022

Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations.
Int. J. Inf. Sec., 2022

A machine learning based framework for IoT device identification and abnormal traffic detection.
Trans. Emerg. Telecommun. Technol., 2022

Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning.
Comput. Networks, 2022

Mutated traffic detection and recovery: an adversarial generative deep learning approach.
Ann. des Télécommunications, 2022

Efficient and secure selective cipher scheme for MIoT compressed images.
Ad Hoc Networks, 2022

Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

A Novel Lightweight and Robust Source-Channel Coding Solution for MIoT Communication Based on DL Denoising/Super Resolution Model.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

An Efficient and Robust MIoT Communication Solution using a Deep Learning Approach.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
TRESC: Towards redesigning existing symmetric ciphers.
Microprocess. Microsystems, November, 2021

Data representation for CNN based internet traffic classification: a comparative study.
Multim. Tools Appl., 2021

A Deep Learning Scheme for Efficient Multimedia IoT Data Compression.
CoRR, 2021

A Deep Learning Object Detection Method for an Efficient Clusters Initialization.
CoRR, 2021

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations.
CoRR, 2021

A Survey on Ethical Hacking: Issues and Challenges.
CoRR, 2021

2020
Efficient & secure image availability and content protection.
Multim. Tools Appl., 2020

Cyber-physical systems security: Limitations, issues and future trends.
Microprocess. Microsystems, 2020

Security analysis of drones systems: Attacks, limitations, and recommendations.
Internet Things, 2020

LoRaWAN security survey: Issues, threats and possible mitigation techniques.
Internet Things, 2020

Securing internet of medical things systems: Limitations, issues and recommendations.
Future Gener. Comput. Syst., 2020

A review on machine learning-based approaches for Internet traffic classification.
Ann. des Télécommunications, 2020

DistLog: A distributed logging scheme for IoT forensics.
Ad Hoc Networks, 2020

Efficient and Secure Statistical Port Scan Detection Scheme.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Efficient and Secure Cipher Scheme for Limited IoT Devices.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Efficient and Secure Statistical DDoS Detection Scheme.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Towards Securing LoRaWAN ABP Communication System.
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020

2019
Preserving data security in distributed fog computing.
Ad Hoc Networks, 2019

Machine Learning for Network Resiliency and Consistency.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery.
Proceedings of the Machine Learning for Networking, 2019

2018
IoT survey: An SDN and fog computing perspective.
Comput. Networks, 2018

Pushing intelligence to the network edge.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

A Multi-level Internet Traffic Classifier Using Deep Learning.
Proceedings of the 9th International Conference on the Network of the Future, 2018

2017
Software Defined IoT security framework.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

QoS guarantee over hybrid SDN/non-SDN networks.
Proceedings of the 8th International Conference on the Network of the Future, 2017

Multi-level security for the 5G/IoT ubiquitous network.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017

2016
Identity-based authentication scheme for the Internet of Things.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Edge computing enabling the Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

An architecture for the Internet of Things with decentralized data and centralized control.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015


  Loading...