A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model HA Abdul-Ghani, D Konstantas, M Mahyoub International Journal of Advanced Computer Science and Applications (IJACSA …, 2018 | 244 | 2018 |
An Efficient RPL-based Mechanism for Node-to-Node Communications in IoT M Mahyoub, ASH Mahmoud, M Abu-Amara, TR Sheltami IEEE Internet of Things Journal 8 (9), 7152-7169, 2021 | 26 | 2021 |
Traffic-aware auto-configuration protocol for service oriented low-power and lossy networks in IoT A Mahmoud, M Mahyoub, T Sheltami, M Abu-Amara Wireless Networks 25, 4231-4246, 2019 | 9 | 2019 |
HPRDG: A scalable framework hypercube-P2P-based for resource discovery in computational Grid HA Ali, MA Ahmed IEEE International Conference on Computer Theory and Applications (ICCTA …, 2012 | 9 | 2012 |
An optimized discovery mechanism for smart objects in IoT M Mahyoub, A Mahmoud, T Sheltami 8th IEEE Annual, Information Technology, Electronics and Mobile …, 2017 | 8 | 2017 |
Security analysis of critical 5g interfaces M Mahyoub, AA AbdulGhaffar, E Alalade, E Ndubisi, A Matrawy IEEE Communications Surveys & Tutorials, 2024 | 3 | 2024 |
On Mitigating DIS Attacks in IoT Networks G Aljufair, M Mahyoub, AS Almazyad 2023 18th Wireless On-Demand Network Systems and Services Conference (WONS …, 2023 | 3 | 2023 |
Content-Based Filter Publish Subscribe Model for Real-Time WSN Applications. M Mahyoub, A Al-Roubaiey, G Ahmed J. Ubiquitous Syst. Pervasive Networks 7 (1), 19-27, 2016 | 3 | 2016 |
A security-aware network function sharing model for 5g slicing M Mahyoub, AA AbdulGhaffar, E Alalade, A Matrawy arXiv preprint arXiv:2303.03492, 2023 | 2 | 2023 |
Reliable and low-latency routing mechanism for IoT-based networks M Mahyoub, A Mahmoud, M Abu-Amara, T Sheltami 2019 IEEE 14th Malaysia International Conference on Communication (MICC), 81-85, 2019 | 2 | 2019 |
Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach ED Alalade, M Mahyoub, A Matrawy arXiv preprint arXiv:2401.09519, 2024 | 1 | 2024 |
Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study M Mahyoub, A Matrawy, K Isleem, O Ibitoye | 1 | 2023 |
A survey of resource discovery in computational grids MAA ▪ Hesham A. Ali, Alaa E. Abdel-Hakim of 8th International Conference on Electrical Engineering (ICEENG 2012) 8 …, 2012 | 1* | 2012 |
On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations AA AbdulGhaffar, M Mahyoub, A Matrawy 2024 20th International Conference on the Design of Reliable Communication …, 2024 | | 2024 |
On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks M Mahyoub, S Hossain, A Matrawy 2024 20th International Conference on the Design of Reliable Communication …, 2024 | | 2024 |