Items where Author / Artist / Editor is "Aiash, Mahdi"

See full list of headings
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 54.

Article

Kallash, Mohammad Muneer, Loo, Jonathan, Lasebae, Aboubaker and Aiash, Mahdi (2018) A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics, 10 (3). pp. 276-291. ISSN 1751-911X (doi:10.1504/IJESDF.2018.093024)

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi, Loo, Jonathan and Colson, Robert (2017) Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications, 9 (12). pp. 31-42. ISSN 2214-2096 (doi:10.1016/j.vehcom.2017.02.003)

Hassan, Muhammad Ali, Vien, Quoc-Tuan ORCID: https://orcid.org/0000-0001-5490-904X and Aiash, Mahdi (2017) Software defined networking for wireless sensor networks: a survey. Advances in Wireless Communications and Networks, 3 (2). pp. 10-22. (doi:10.11648/j.awcn.20170302.11)

Gandhi, Vaibhav ORCID: https://orcid.org/0000-0003-1121-7419, Yang, Zhijun ORCID: https://orcid.org/0000-0003-2615-4297 and Aiash, Mahdi (2017) Project-based cooperative learning to enhance competence while teaching engineering modules. International Journal of Continuing Engineering Education and Life-Long Learning, 27 (3). pp. 198-208. ISSN 1560-4624 (doi:10.1504/IJCEELL.2017.10003462)

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2017) Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector (IJISSS), 9 (4). pp. 60-87. ISSN 1935-5688 (doi:10.4018/IJISSS.2017100105)

Le, Anhtuan, Loo, Jonathan, Chai, Kok Keong and Aiash, Mahdi (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7 (2). p. 25. ISSN 2078-2489 (doi:10.3390/info7020025)

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2016) Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology, 7 (1). pp. 16-33. ISSN 0976-898X

Kos, Jernej, Aiash, Mahdi, Loo, Jonathan and Trček, Denis (2015) U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks, 89 . pp. 14-31. ISSN 1389-1286 (doi:10.1016/j.comnet.2015.07.006)

Aiash, Mahdi (2015) A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2938-2953. ISSN 1532-0626 (doi:10.1002/cpe.3260)

Loo, Jonathan and Aiash, Mahdi (2015) Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications, 50 . pp. 64-72. ISSN 1084-8045 (doi:10.1016/j.jnca.2014.06.003)

Aiash, Mahdi and Loo, Jonathan (2015) An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications, 50 . pp. 73-79. ISSN 1084-8045 (doi:10.1016/j.jnca.2014.06.004)

Aiash, Mahdi, Colson, Robert and Muneer, Mohammad (2015) Introducing a hybrid infrastructure and information-centric approach for secure cloud computing Conference: The 29th IEEE International Conference on Advanced Information Networking and Applications. March 2015. Conference: The 29th IEEE International Conference on Advanced Information Networking and Applications . (Accepted/In press)

Aiash, Mahdi and Loo, Jonathan (2014) Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems, 27 (12). pp. 3600-3618. ISSN 1074-5351 (doi:10.1002/dac.2561)

Kodagoda, Neesha, Attfield, Simon, Choudhury, Sharmin (Tinni), Rooney, Chris, Mapp, Glenford E., Nguyen, Phong H., Slabbert, Louis, Wong, B. L. William, Aiash, Mahdi, Zheng, Yongjun, Xu, Kai ORCID: https://orcid.org/0000-0003-2242-5440 and Lasebae, Aboubaker (2014) Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization, 13 (4). pp. 346-360. ISSN 1473-8716 (doi:10.1177/1473871613490291)

Sardis, Fragkiskos, Mapp, Glenford E., Loo, Jonathan, Aiash, Mahdi and Vinel, Alexey (2013) On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia . ISSN 1520-9210 (doi:10.1109/TMM.2013.2240286)

Le, Anhtuan, Loo, Jonathan, Lasebae, Aboubaker, Aiash, Mahdi and Luo, Yuan ORCID: https://orcid.org/0000-0002-9812-5543 (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems, 25 (9). pp. 1189-1212. ISSN 1074-5351 (doi:10.1002/dac.2356)

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Phan, Raphael and Loo, Jonathan (2012) A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking, 2012 (57). ISSN 1687-1499 (doi:10.1186/1687-1499-2012-57)

Mapp, Glenford E., Katsriku, Ferdinand, Aiash, Mahdi, Chinnam, Naveen, Lopes, Rigolin, Moreira, Edson, Vanni, Renata M. P. and Augusto, Mario (2012) Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications . ISSN 2090-7141 (doi:10.1155/2012/748163)

Aiash, Mahdi, Mapp, Glenford E. and Lasebae, Aboubaker (2011) Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science, 38 (4). pp. 384-393. ISSN 1819-656X

Book Section

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi, Loo, Jonathan, Colson, Robert and Raheem, Ali (2017) Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. In: Advances in Networks, Security and Communications: Reviews - Volume 1. Yurish, Sergey, ed. International Frequency Sensor Association Publishing, pp. 247-310. ISBN 9788469789940.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Phan, Raphael and Loo, Jonathan (2013) Integrating mobility, quality-of-service and security in future mobile networks. In: Electrical Engineering and Intelligent Systems. Ao, Sio-Iong and Gelman, Len, eds. Lecture Notes in Electrical Engineering, 130 (130). Springer, New York, pp. 195-206. ISBN 9781461423164. (doi:10.1007/978-1-4614-2317-1_16)

Aiash, Mahdi, Al-Nemrat, Ameer and Preston, David (2013) Securing address registration in location/ID split protocol using ID-based cryptography. In: Wired/Wireless Internet Communication: 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings. Tsaoussidis, Vassilis, Kassler, Andreas, Koucheryavy, Yevgeni and Mellouk, Abdelhamid, eds. Lecture Notes in Computer Science, 7889 . Springer, pp. 129-139. ISBN 9783642384004. (doi:10.1007/978-3-642-38401-1_10)

Aiash, Mahdi, Mapp, Glenford E., Phan, Raphael, Lasebae, Aboubaker and Loo, Jonathan (2012) A formally verified device authentication protocol using Casper/FDR. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Min, Geyong, Wu, Yulei, Liu, Lei (Chris), Jin, Xiaolong, Jarvis, Stephen and Al-Dubai, Ahmed Y., eds. IEEE, pp. 1293-1298. ISBN 9781467321723. (doi:10.1109/TrustCom.2012.27)

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Loo, Jonathan, Sardis, Fragkiskos, Phan, Raphael, Augusto, Mario, Moreira, Edson and Vanni, Renata M. P. (2012) A survey of potential architectures for communication in heterogeneous networks. In: Wireless telecommunications symposium (WTS), 2012. IEEE, pp. 1-6. ISBN 9781457705809. (doi:10.1109/WTS.2012.6266121)

Mapp, Glenford E., Aiash, Mahdi, Guardia, Helio C. and Crowcroft, Jon (2011) Exploring multi-homing issues in heterogeneous networks. In: Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference[proceedings]. IEEE, pp. 690-695. ISBN 9781424447466. (doi:10.1109/WAINA.2011.140)

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker and Phan, Raphael (2010) Providing security in 4G systems: unveiling the challenges. In: Telecommunications (AICT), 2010 Sixth Advanced International Conference on. Atmaca, Tulin, Palicot, Jacques, Amor, Nafkha, Tsiatsos, Thrasyvoulos, Marot, Michel and Dini, Oana, eds. IEEE, pp. 439-444. . (doi:10.1109/AICT.2010.24)

Mapp, Glenford E., Aiash, Mahdi, Lasebae, Aboubaker and Phan, Raphael (2010) Security models for heterogeneous networking. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT),. Katsikas, Sokratis, ed. IEEE, pp. 1-4. ISBN 9789898425188.

Mapp, Glenford E., Shaikh, Fatema, Aiash, Mahdi, Vanni, Renata M. P., Augusto, Mario and Moreira, Edson (2009) Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. In: Network-Based Information Systems, 2009. NBIS '09. International Conference. Duresi, Arjan, Barolli, Leonard, Enokido, Tomoya, Uehara, Minoru, Shakshuki, Elhada and Takizawa, Makoto, eds. IEEE, pp. 286-291. ISBN 9781424447466. (doi:10.1109/NBiS.2009.95)

Conference or Workshop Item

Karthick, Gayathri, Mapp, Glenford E., Kammueller, Florian and Aiash, Mahdi (2018) Formalization and analysis of a resource allocation security protocol for secure service migration. In: IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018), 17-20 Dec 2018, Zurich, Switzerland. (doi:10.1109/UCC-Companion.2018.00058)

Karthick, Gayathri, Mapp, Glenford E., Kammueller, Florian and Aiash, Mahdi (2017) Exploring a security protocol for secure service migration in commercial cloud environments. In: ICC’17, 22 Mar 2019, Cambridge University, Cambridge. (doi:10.1145/3018896.3056795)

Karthick, Gayathri, Mapp, Glenford E., Kammueller, Florian and Aiash, Mahdi (2017) Exploring a security protocol for secure service migration in commercial cloud environments. In: 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017), 22-23 Mar 2017, Churchill College, University of Cambridge, United Kingdom. (Published online first) (doi:10.1145/3018896.3056795)

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2016) Interference management for co-channel mobile femtocells technology in LTE networks. In: 2016 12th International Conference on Intelligent Environments (IE), 14-16 Sept 2016, London, United Kingdom. (doi:10.1109/IE.2016.21)

Kenaza, Tayeb, Bennaceur, Khadidja, Labed, Abennour and Aiash, Mahdi (2016) Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), 23-25 Aug 2016, Tianjin, China. (doi:10.1109/TrustCom.2016.0271)

Azab, Ahmad, Alazab, Mamoun and Aiash, Mahdi (2016) Machine learning based botnet identification traffic. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016), 23-26 August 2016, Tianjin, China. (doi:10.1109/TrustCom.2016.0275)

Kenaza, Tayeb, Aiash, Mahdi, Loo, Jonathan, Lasebae, Aboubaker and Whitney, Gill (2016) A progressive approach to design authentication protocols for mobile heterogeneous networks. In: IEEE Trustcom/BigDataSE/I​SPA, 2016, 23-26 Aug 2016, Tianjin, China. (doi:10.1109/trustcom.2016.0273)

Kenazag, Tayeb and Aiash, Mahdi (2016) Toward an efficient ontology-based event correlation in SIEM. In: 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016), 23-26 May 2016, Madrid, Spain. (doi:10.1016/j.procs.2016.04.109)

Tharayanil, Midhun Babu, Whitney, Gill, Aiash, Mahdi and Benzaid, Chafika (2015) Virtualization and cyber security: arming future security practitioners. In: IEEE Trustcom/BigDataSE/ISPA, 2015, 20-22 Aug 2015, Helsinki, Finland. (doi:10.1109/trustcom.2015.537)

Aiash, Mahdi and Loo, Jonathan (2015) A formally verified access control mechanism for information centric networks. In: The 12th International Conference on Security and Cryptography (SECRYPT 2015), 20-22 Jul 2015, Colmar, Alsace, France. (doi:10.5220/0005566303770383)

Aiash, Mahdi, Mapp, Glenford E. and Kallash, Muhammad Muneer (2015) Supporting communication in information centric networks using the location/ID split protocol and time released caching. In: 2015 International Conference on Cloud Computing (ICCC), 26-29 Apr 2015, Riyadh, Saudi Arabia.

Aiash, Mahdi, Colson, Robert and Kallash, Muhammad Muneer (2015) Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. In: IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015), 24-27 Mar 2015, Gwangju, Korea.

Carnielli, Antonio and Aiash, Mahdi (2015) Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. In: IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015), 24-27 Mar 2015, Gwangju, Korea.

Sardis, Fragkiskos, Mapp, Glenford E., Loo, Jonathan and Aiash, Mahdi (2014) Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. In: 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),, 08-11 Dec 2014, London, UK. (doi:10.1109/UCC.2014.39)

Sinti, Jose, Jiffry, Fowzan and Aiash, Mahdi (2014) Investigating the impact of live migration on the network infrastructure in enterprise environments. In: Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on, 13-16 May 2014, Victoria, Canada. (doi:10.1109/WAINA.2014.34)

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker and Loo, Jonathan (2014) A secure framework for communications in heterogeneous networks. In: WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops, 13-16 May 2014, Victoria, BC.

Aiash, Mahdi, Mapp, Glenford E. and Gemikonakli, Orhan ORCID: https://orcid.org/0000-0002-0513-1128 (2014) Secure live virtual machines migration: issues and solutions. In: IEEE AINA 2014, 13-16 May 2014, Victoria, BC, Canada.

Mapp, Glenford E., Aiash, Mahdi, Ondiege, Brian and Clarke, Malcolm (2014) Exploring a new security framework for cloud storage using capabilities. In: 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE, 07-11 Apr 2014, Oxford, United Kingdom. (doi:10.1109/SOSE.2014.69)

Raheem, Rand, Lasebae, Aboubaker, Aiash, Mahdi and Loo, Jonathan (2013) From fixed to mobile femtocells in LTE systems: issues and challenges. In: 2013 Second International Conference on Future Generation Communication Technology (FGCT), 12-14 Nov 2013, London, United Kingdom. (doi:10.1109/FGCT.2013.6767218)

Lasebae, Aboubaker, Loo, Jonathan, Aiash, Mahdi and Raheem, Ali (2013) Supporting communications in the IOTs using the location/ID split protocol: a security analysis. In: Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013, 12-14 Nov 2013, London, UK.

Aiash, Mahdi (2013) A novel security protocol for resolving addresses in the location/ID split architecture. In: The 7th International Conference on Network and System Security (NSS 2013), 3-4 June 2013, Spain.

Choudhury, Sharmin (Tinni), Kodagoda, Neesha, Nguyen, Phong H., Rooney, Chris, Attfield, Simon, Xu, Kai ORCID: https://orcid.org/0000-0003-2242-5440, Zheng, Yongjun, Wong, B. L. William, Chen, Raymond, Mapp, Glenford E., Slabbert, Louis, Aiash, Mahdi and Lasebae, Aboubaker (2012) M-Sieve: a visualisation tool for supporting network security analysts. In: VisWeek 2012, 14-19 Oct 2012, Seattle, WA, USA.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Phan, Raphael, Augusto, Mario, Vanni, Renata M. P. and Moreira, Edson (2011) Enhancing naming and location services to support multi-homed devices in heterogeneous environments. In: First Conference on Communication, Science and Information Enginneering (CCSIE 2011), 25 - 27 July 2011, Middlesex University.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker and Phan, Raphael (2011) Exploring the concept of scope to provide better security for internet services. In: First Global Conference on Communication, Science and Engineering (CCSIE 2011), 25 - 27 July 2011, Middlesex University.

Aiash, Mahdi, Mapp, Glenford E., Lasebae, Aboubaker, Augusto, Mario, Vanni, Renata M. P. and Moreira, Edson (2011) A QoS framework for heterogeneous networking. In: Internation Conference on Wireless networks 2011 (ICWN'11), 6th - 8th July 2011, London.

Thesis

Aiash, Mahdi (2012) An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis, Middlesex University.

This list was generated on Sat Dec 7 05:10:56 2019 GMT.