Items where Author / Artist / Editor is "Aiash, Mahdi"

See full list of headings
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 54.

Article

Kallash, Mohammad Muneer, Loo, Jonathan, Lasebae, Aboubaker and Aiash, Mahdi (2018) A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics, 10 (3). pp. 276-291. ISSN 1751-911X

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi, Loo, Jonathan and Colson, Robert (2017) Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications, 9 (12). pp. 31-42. ISSN 2214-2096

Hassan, Muhammad Ali, Vien, Quoc-Tuan and Aiash, Mahdi (2017) Software defined networking for wireless sensor networks: a survey. Advances in Wireless Communications and Networks, 3 (2). pp. 10-22.

Gandhi, Vaibhav, Yang, Zhijun and Aiash, Mahdi (2017) Project-based cooperative learning to enhance competence while teaching engineering modules. International Journal of Continuing Engineering Education and Life-Long Learning, 27 (3). pp. 198-208. ISSN 1560-4624

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2017) Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector (IJISSS), 9 (4). pp. 60-87. ISSN 1935-5688

Le, Anhtuan, Loo, Jonathan, Chai, Kok Keong and Aiash, Mahdi (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7 (2). p. 25. ISSN 2078-2489

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2016) Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology, 7 (1). pp. 16-33. ISSN 0976-898X

Kos, Jernej, Aiash, Mahdi, Loo, Jonathan and Trček, Denis (2015) U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks, 89 . pp. 14-31. ISSN 1389-1286

Aiash, Mahdi (2015) A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2938-2953. ISSN 1532-0626

Loo, Jonathan and Aiash, Mahdi (2015) Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications, 50 . pp. 64-72. ISSN 1084-8045

Aiash, Mahdi and Loo, Jonathan (2015) An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications, 50 . pp. 73-79. ISSN 1084-8045

Aiash, Mahdi, Colson, Robert and Muneer, Mohammad (2015) Introducing a hybrid infrastructure and information-centric approach for secure cloud computing Conference: The 29th IEEE International Conference on Advanced Information Networking and Applications. March 2015. Conference: The 29th IEEE International Conference on Advanced Information Networking and Applications . (Accepted/In press)

Aiash, Mahdi and Loo, Jonathan (2014) Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems, 27 (12). pp. 3600-3618. ISSN 1074-5351

Kodagoda, Neesha, Attfield, Simon, Choudhury, Sharmin (Tinni), Rooney, Chris, Mapp, Glenford E., Nguyen, Phong H., Slabbert, Louis, Wong, B. L. William, Aiash, Mahdi, Zheng, Yongjun, Xu, Kai and Lasebae, Aboubaker (2014) Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization, 13 (4). pp. 346-360. ISSN 1473-8716

Sardis, Fragkiskos, Mapp, Glenford E., Loo, Jonathan, Aiash, Mahdi and Vinel, Alexey (2013) On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia . ISSN 1520-9210

Le, Anhtuan, Loo, Jonathan, Lasebae, Aboubaker, Aiash, Mahdi and Luo, Yuan (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems, 25 (9). pp. 1189-1212. ISSN 1074-5351

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Phan, Raphael and Loo, Jonathan (2012) A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking, 2012 (57). ISSN 1687-1499

Mapp, Glenford E., Katsriku, Ferdinand, Aiash, Mahdi, Chinnam, Naveen, Lopes, Rigolin, Moreira, Edson, Vanni, Renata M. P. and Augusto, Mario (2012) Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications . ISSN 2090-7141

Aiash, Mahdi, Mapp, Glenford E. and Lasebae, Aboubaker (2011) Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science, 38 (4). pp. 384-393. ISSN 1819-656X

Book Section

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi, Loo, Jonathan, Colson, Robert and Raheem, Ali (2017) Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. In: Advances in Networks, Security and Communications: Reviews - Volume 1. Yurish, Sergey, ed. International Frequency Sensor Association Publishing, pp. 247-310. ISBN 9788469789940

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Phan, Raphael and Loo, Jonathan (2013) Integrating mobility, quality-of-service and security in future mobile networks. In: Electrical Engineering and Intelligent Systems. Ao, Sio-Iong and Gelman, Len, eds. Lecture Notes in Electrical Engineering, 130 (130). Springer, New York, pp. 195-206. ISBN 9781461423164

Aiash, Mahdi, Al-Nemrat, Ameer and Preston, David (2013) Securing address registration in location/ID split protocol using ID-based cryptography. In: Wired/Wireless Internet Communication: 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings. Tsaoussidis, Vassilis, Kassler, Andreas, Koucheryavy, Yevgeni and Mellouk, Abdelhamid, eds. Lecture Notes in Computer Science, 7889 . Springer, pp. 129-139. ISBN 9783642384004

Aiash, Mahdi, Mapp, Glenford E., Phan, Raphael, Lasebae, Aboubaker and Loo, Jonathan (2012) A formally verified device authentication protocol using Casper/FDR. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Min, Geyong, Wu, Yulei, Liu, Lei (Chris), Jin, Xiaolong, Jarvis, Stephen and Al-Dubai, Ahmed Y., eds. IEEE, pp. 1293-1298. ISBN 9781467321723

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Loo, Jonathan, Sardis, Fragkiskos, Phan, Raphael, Augusto, Mario, Moreira, Edson and Vanni, Renata M. P. (2012) A survey of potential architectures for communication in heterogeneous networks. In: Wireless telecommunications symposium (WTS), 2012. IEEE, pp. 1-6. ISBN 9781457705809

Mapp, Glenford E., Aiash, Mahdi, Guardia, Helio C. and Crowcroft, Jon (2011) Exploring multi-homing issues in heterogeneous networks. In: Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference[proceedings]. IEEE, pp. 690-695. ISBN 9781424447466

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker and Phan, Raphael (2010) Providing security in 4G systems: unveiling the challenges. In: Telecommunications (AICT), 2010 Sixth Advanced International Conference on. Atmaca, Tulin, Palicot, Jacques, Amor, Nafkha, Tsiatsos, Thrasyvoulos, Marot, Michel and Dini, Oana, eds. IEEE, pp. 439-444.

Mapp, Glenford E., Aiash, Mahdi, Lasebae, Aboubaker and Phan, Raphael (2010) Security models for heterogeneous networking. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT),. Katsikas, Sokratis, ed. IEEE, pp. 1-4. ISBN 9789898425188

Mapp, Glenford E., Shaikh, Fatema, Aiash, Mahdi, Vanni, Renata M. P., Augusto, Mario and Moreira, Edson (2009) Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. In: Network-Based Information Systems, 2009. NBIS '09. International Conference. Duresi, Arjan, Barolli, Leonard, Enokido, Tomoya, Uehara, Minoru, Shakshuki, Elhada and Takizawa, Makoto, eds. IEEE, pp. 286-291. ISBN 9781424447466

Conference or Workshop Item

Karthick, Gayathri, Mapp, Glenford E., Kammueller, Florian and Aiash, Mahdi (2018) Formalization and analysis of a resource allocation security protocol for secure service migration. In: IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018), 17-20 Dec 2018, Zurich, Switzerland.

Karthick, Gayathri, Mapp, Glenford E., Kammueller, Florian and Aiash, Mahdi (2017) Exploring a security protocol for secure service migration in commercial cloud environments. In: ICC’17, 22 Mar 2019, Cambridge University, Cambridge.

Karthick, Gayathri, Mapp, Glenford E., Kammueller, Florian and Aiash, Mahdi (2017) Exploring a security protocol for secure service migration in commercial cloud environments. In: 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017), 22-23 Mar 2017, Churchill College, University of Cambridge, United Kingdom. (Published online first)

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2016) Interference management for co-channel mobile femtocells technology in LTE networks. In: 2016 12th International Conference on Intelligent Environments (IE), 14-16 Sept 2016, London, United Kingdom.

Kenaza, Tayeb, Bennaceur, Khadidja, Labed, Abennour and Aiash, Mahdi (2016) Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), 23-25 Aug 2016, Tianjin, China.

Azab, Ahmad, Alazab, Mamoun and Aiash, Mahdi (2016) Machine learning based botnet identification traffic. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016), 23-26 August 2016, Tianjin, China.

Kenaza, Tayeb, Aiash, Mahdi, Loo, Jonathan, Lasebae, Aboubaker and Whitney, Gill (2016) A progressive approach to design authentication protocols for mobile heterogeneous networks. In: IEEE Trustcom/BigDataSE/I​SPA, 2016, 23-26 Aug 2016, Tianjin, China.

Kenazag, Tayeb and Aiash, Mahdi (2016) Toward an efficient ontology-based event correlation in SIEM. In: 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016), 23-26 May 2016, Madrid, Spain.

Tharayanil, Midhun Babu, Whitney, Gill, Aiash, Mahdi and Benzaid, Chafika (2015) Virtualization and cyber security: arming future security practitioners. In: IEEE Trustcom/BigDataSE/ISPA, 2015, 20-22 Aug 2015, Helsinki, Finland.

Aiash, Mahdi and Loo, Jonathan (2015) A formally verified access control mechanism for information centric networks. In: The 12th International Conference on Security and Cryptography (SECRYPT 2015), 20-22 Jul 2015, Colmar, Alsace, France.

Aiash, Mahdi, Mapp, Glenford E. and Kallash, Muhammad Muneer (2015) Supporting communication in information centric networks using the location/ID split protocol and time released caching. In: 2015 International Conference on Cloud Computing (ICCC), 26-29 Apr 2015, Riyadh, Saudi Arabia.

Aiash, Mahdi, Colson, Robert and Kallash, Muhammad Muneer (2015) Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. In: IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015), 24-27 Mar 2015, Gwangju, Korea.

Carnielli, Antonio and Aiash, Mahdi (2015) Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. In: IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015), 24-27 Mar 2015, Gwangju, Korea.

Sardis, Fragkiskos, Mapp, Glenford E., Loo, Jonathan and Aiash, Mahdi (2014) Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. In: 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),, 08-11 Dec 2014, London, UK.

Sinti, Jose, Jiffry, Fowzan and Aiash, Mahdi (2014) Investigating the impact of live migration on the network infrastructure in enterprise environments. In: Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on, 13-16 May 2014, Victoria, Canada.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker and Loo, Jonathan (2014) A secure framework for communications in heterogeneous networks. In: WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops, 13-16 May 2014, Victoria, BC.

Aiash, Mahdi, Mapp, Glenford E. and Gemikonakli, Orhan (2014) Secure live virtual machines migration: issues and solutions. In: IEEE AINA 2014, 13-16 May 2014, Victoria, BC, Canada.

Mapp, Glenford E., Aiash, Mahdi, Ondiege, Brian and Clarke, Malcolm (2014) Exploring a new security framework for cloud storage using capabilities. In: 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE, 07-11 Apr 2014, Oxford, United Kingdom.

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2013) From fixed to mobile femtocells in LTE systems: issues and challenges. In: 2013 Second International Conference on Future Generation Communication Technology (FGCT), 12-14 Nov 2013, London, United Kingdom.

Lasebae, Aboubaker, Loo, Jonathan, Aiash, Mahdi and Raheem, Ali (2013) Supporting communications in the IOTs using the location/ID split protocol: a security analysis. In: Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013, 12-14 Nov 2013, London, UK.

Aiash, Mahdi (2013) A novel security protocol for resolving addresses in the location/ID split architecture. In: The 7th International Conference on Network and System Security (NSS 2013), 3-4 June 2013, Spain.

Choudhury, Sharmin (Tinni), Kodagoda, Neesha, Nguyen, Phong H., Rooney, Chris, Attfield, Simon, Xu, Kai, Zheng, Yongjun, Wong, B. L. William, Chen, Raymond, Mapp, Glenford E., Slabbert, Louis, Aiash, Mahdi and Lasebae, Aboubaker (2012) M-Sieve: a visualisation tool for supporting network security analysts. In: VisWeek 2012, 14-19 Oct 2012, Seattle, WA, USA.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Phan, Raphael, Augusto, Mario, Vanni, Renata M. P. and Moreira, Edson (2011) Enhancing naming and location services to support multi-homed devices in heterogeneous environments. In: First Conference on Communication, Science and Information Enginneering (CCSIE 2011), 25 - 27 July 2011, Middlesex University.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker and Phan, Raphael (2011) Exploring the concept of scope to provide better security for internet services. In: First Global Conference on Communication, Science and Engineering (CCSIE 2011), 25 - 27 July 2011, Middlesex University.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Augusto, Mario, Vanni, Renata M. P. and Moreira, Edson (2011) A QoS framework for heterogeneous networking. In: Internation Conference on Wireless networks 2011 (ICWN'11), 6th - 8th July 2011, London.

Thesis

Aiash, Mahdi (2012) An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis, Middlesex University.

This list was generated on Tue Jun 18 04:32:48 2019 BST.