Items where Author / Artist / Editor is "Aiash, Mahdi"

See full list of headings
Export as [feed] Atom [feed] RSS 1.0
Group by: Item Type | No Grouping
Number of items: 41.

Article

Hassan, Muhammad Ali and Vien, Quoc-Tuan and Aiash, Mahdi (2017) Software defined networking for wireless sensor networks: a survey. Advances in Wireless Communications and Networks, 3 (2). pp. 10-22.

Kos, Jernej and Aiash, Mahdi and Loo, Jonathan and TrĨek, Denis (2015) U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks, 89 . pp. 14-31. ISSN 1389-1286

Aiash, Mahdi (2015) A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2938-2953. ISSN 1532-0626

Loo, Jonathan and Aiash, Mahdi (2015) Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications, 50 . pp. 64-72. ISSN 1084-8045

Aiash, Mahdi and Loo, Jonathan (2015) An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications, 50 . pp. 73-79. ISSN 1084-8045

Aiash, Mahdi and Colson, Robert and Muneer, Mohammad (2015) Introducing a hybrid infrastructure and information-centric approach for secure cloud computing Conference: The 29th IEEE International Conference on Advanced Information Networking and Applications. March 2015. Conference: The 29th IEEE International Conference on Advanced Information Networking and Applications . (Accepted/In press)

Sardis, Fragkiskos and Mapp, Glenford E. and Loo, Jonathan and Aiash, Mahdi and Vinel, Alexey (2013) On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia . ISSN 1520-9210

Aiash, Mahdi and Loo, Jonathan (2013) Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems . ISSN 1074-5351 (Accepted/In press)

Kodagoda, Neesha and Attfield, Simon and Choudhury, Sharmin (Tinni) and Rooney, Chris and Mapp, Glenford E. and Nguyen, Phong H. and Slabbert, Louis and Wong, B. L. William and Aiash, Mahdi and Zheng, Yongjun and Xu, Kai and Lasebae, Aboubaker (2013) Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization . ISSN 1473-8716 (Accepted/In press)

Le, Anhtuan and Loo, Jonathan and Lasebae, Aboubaker and Aiash, Mahdi and Luo, Yuan (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems, 25 (9). pp. 1189-1212. ISSN 1074-5351

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Phan, Raphael and Loo, Jonathan (2012) A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking, 2012 (57). ISSN 1687-1499

Mapp, Glenford E. and Katsriku, Ferdinand and Aiash, Mahdi and Chinnam, Naveen and Lopes, Rigolin and Moreira, Edson and Vanni, Renata M. P. and Augusto, Mario (2012) Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications . ISSN 2090-7141

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker (2011) Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science, 38 (4). pp. 384-393. ISSN 1819-656X

Book Section

Aiash, Mahdi and Ameer, Al-Nemrat and David, Preston (2013) Securing address registration in location/ID split protocol using ID-based cryptography. In: In proceeding of The 11th International Conference on Wired/Wireless Internet Communications WWIC 2013. Lecture Notes in Computer Science . Springer. (Accepted/In press)

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Phan, Raphael and Loo, Jonathan (2013) Integrating mobility, quality-of-service and security in future mobile networks. In: Electrical Engineering and Intelligent Systems. Ao, Sio-Iong and Gelman, Len, eds. Lecture Notes in Electrical Engineering, 130 (130). Springer, New York, pp. 195-206. ISBN 9781461423164

Aiash, Mahdi and Mapp, Glenford E. and Phan, Raphael and Lasebae, Aboubaker and Loo, Jonathan (2012) A formally verified device authentication protocol using Casper/FDR. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Min, Geyong and Wu, Yulei and Liu, Lei (Chris) and Jin, Xiaolong and Jarvis, Stephen and Al-Dubai, Ahmed Y., eds. IEEE, pp. 1293-1298. ISBN 9781467321723

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Loo, Jonathan and Sardis, Fragkiskos and Phan, Raphael and Augusto, Mario and Moreira, Edson and Vanni, Renata M. P. (2012) A survey of potential architectures for communication in heterogeneous networks. In: Wireless telecommunications symposium (WTS), 2012. IEEE, pp. 1-6. ISBN 9781457705809

Mapp, Glenford E. and Aiash, Mahdi and Guardia, Helio C. and Crowcroft, Jon (2011) Exploring multi-homing issues in heterogeneous networks. In: Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference[proceedings]. IEEE, pp. 690-695. ISBN 9781424447466

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Phan, Raphael (2010) Providing security in 4G systems: unveiling the challenges. In: Telecommunications (AICT), 2010 Sixth Advanced International Conference on. Atmaca, Tulin and Palicot, Jacques and Amor, Nafkha and Tsiatsos, Thrasyvoulos and Marot, Michel and Dini, Oana, eds. IEEE, pp. 439-444.

Mapp, Glenford E. and Aiash, Mahdi and Lasebae, Aboubaker and Phan, Raphael (2010) Security models for heterogeneous networking. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT),. Katsikas, Sokratis, ed. IEEE, pp. 1-4. ISBN 9789898425188

Mapp, Glenford E. and Shaikh, Fatema and Aiash, Mahdi and Vanni, Renata M. P. and Augusto, Mario and Moreira, Edson (2009) Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. In: Network-Based Information Systems, 2009. NBIS '09. International Conference. Duresi, Arjan and Barolli, Leonard and Enokido, Tomoya and Uehara, Minoru and Shakshuki, Elhada and Takizawa, Makoto, eds. IEEE, pp. 286-291. ISBN 9781424447466

Conference or Workshop Item

Karthick, Gayathri and Mapp, Glenford E. and Kammueller, Florian and Aiash, Mahdi (2017) Exploring a security protocol for secure service migration in commercial cloud environments. In: 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017), 22-23 Mar 2017, Churchill College, University of Cambridge, United Kingdom. (Published online first)

Kenaza, Tayeb and Bennaceur, Khadidja and Labed, Abennour and Aiash, Mahdi (2016) Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), 23-25 Aug 2016, Tianjin, China.

Azab, Ahmad and Alazab, Mamoun and Aiash, Mahdi (2016) Machine learning based botnet identification traffic. In: 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016), 23-26 August 2016, Tianjin, China.

Kenazag, Tayeb and Aiash, Mahdi (2016) Toward an efficient ontology-based event correlation in SIEM. In: 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016), 23-26 May 2016, Madrid, Spain.

Aiash, Mahdi and Loo, Jonathan (2015) A formally verified access control mechanism for information centric networks. In: The 12th International Conference on Security and Cryptography (SECRYPT 2015), 20-22 Jul 2015, Colmar, Alsace, France.

Aiash, Mahdi and Mapp, Glenford E. and Kallash, Muhammad Muneer (2015) Supporting communication in information centric networks using the location/ID split protocol and time released caching. In: 2015 International Conference on Cloud Computing (ICCC), 26-29 Apr 2015, Riyadh, Saudi Arabia.

Aiash, Mahdi and Colson, Robert and Kallash, Muhammad Muneer (2015) Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. In: IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015), 24-27 Mar 2015, Gwangju, Korea.

Carnielli, Antonio and Aiash, Mahdi (2015) Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. In: IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015), 24-27 Mar 2015, Gwangju, Korea.

Sardis, Fragkiskos and Mapp, Glenford E. and Loo, Jonathan and Aiash, Mahdi (2014) Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. In: 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),, 08-11 Dec 2014, London, UK.

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Loo, Jonathan (2014) A secure framework for communications in heterogeneous networks. In: WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops, 13-16 May 2014, Victoria, BC.

Aiash, Mahdi and Mapp, Glenford E. and Gemikonakli, Orhan (2014) Secure live virtual machines migration: issues and solutions. In: IEEE AINA 2014, 13-16 May 2014, Victoria, BC, Canada.

Mapp, Glenford E. and Aiash, Mahdi and Ondiege, Brian and Clarke, Malcolm (2014) Exploring a new security framework for cloud storage using capabilities. In: 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE, 07-11 Apr 2014, Oxford, United Kingdom.

Lasebae, Aboubaker and Loo, Jonathan and Aiash, Mahdi and Raheem, Ali (2013) From fixed to mobile femtocells in LTE systems: issues and challenges. In: Future Generation Communication Technology (FGCT), 2013 Second International Conference, November 2013, London, United Kingdom.

Lasebae, Aboubaker and Loo, Jonathan and Aiash, Mahdi and Raheem, Ali (2013) Supporting communications in the IOTs using the location/ID split protocol: a security analysis. In: Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013, 12-14 Nov 2013, London, UK.

Aiash, Mahdi (2013) A novel security protocol for resolving addresses in the location/ID split architecture. In: The 7th International Conference on Network and System Security (NSS 2013), 3-4 June 2013, Spain.

Choudhury, Sharmin (Tinni) and Kodagoda, Neesha and Nguyen, Phong H. and Rooney, Chris and Attfield, Simon and Xu, Kai and Zheng, Yongjun and Wong, B. L. William and Chen, Raymond and Mapp, Glenford E. and Slabbert, Louis and Aiash, Mahdi and Lasebae, Aboubaker (2012) M-Sieve: a visualisation tool for supporting network security analysts. In: VisWeek 2012, 14-19 Oct 2012, Seattle, WA, USA.

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Phan, Raphael and Augusto, Mario and Vanni, Renata M. P. and Moreira, Edson (2011) Enhancing naming and location services to support multi-homed devices in heterogeneous environments. In: First Conference on Communication, Science and Information Enginneering (CCSIE 2011), 25 - 27 July 2011, Middlesex University.

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Phan, Raphael (2011) Exploring the concept of scope to provide better security for internet services. In: First Global Conference on Communication, Science and Engineering (CCSIE 2011), 25 - 27 July 2011, Middlesex University.

Aiash, Mahdi and Mapp, Glenford E. and Lasebae, Aboubaker and Augusto, Mario and Vanni, Renata M. P. and Moreira, Edson (2011) A QoS framework for heterogeneous networking. In: Internation Conference on Wireless networks 2011 (ICWN'11), 6th - 8th July 2011, London.

Thesis

Aiash, Mahdi (2012) An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis, Middlesex University.

This list was generated on Sat Sep 23 04:44:39 2017 BST.