On-the-fly (D) DoS attack mitigation in SDN using Deep Neural Network-based rate limiting A El Kamel, H Eltaief, H Youssef Computer Communications 182, 153-169, 2022 | 23 | 2022 |
MLCC: A new hash‐chained mechanism for multicast source authentication H Eltaief, H Youssef International Journal Of Communication Systems 22 (9), 1069-1087, 2009 | 16 | 2009 |
A collaborative key management scheme for distributed smart objects F Hendaoui, H Eltaief, H Youssef Transactions on Emerging Telecommunications Technologies 29 (6), e3198, 2018 | 14 | 2018 |
UAP: A unified authentication platform for IoT environment F Hendaoui, H Eltaief, H Youssef Computer Networks 188, 107811, 2021 | 12 | 2021 |
RMLCC: Recovery-based multi-layer connected chain mechanism for multicast source authentication H Eltaief, H Youssef IEEE Local Computer Network Conference, 432-439, 2010 | 10 | 2010 |
FID: Fuzzy based intrusion detection for distributed smart devices F Hendaoui, H Eltaief, H Youssef 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 9 | 2017 |
Cgk: A collaborative group key management scheme F Hendaoui, H Eltaief, H Youssef, A Trad 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014 | 5 | 2014 |
Efficient sender authentication and signing of multicast streams over lossy channels H Eltaief, H Youssef ACS/IEEE International Conference on Computer Systems and Applications …, 2010 | 5 | 2010 |
Flex-CC: A flexible connected chains scheme for multicast source authentication in dynamic SDN environment H Eltaief Computer Networks 214, 109179, 2022 | 4 | 2022 |
Secure east-west communication to approve service access continuity for mobile devices in a distributed SDN M Moatemri, H Eltaief, AE Kamel, H Youssef International Conference on Computational Science and Its Applications, 283-297, 2022 | 3 | 2022 |
Secure East-West Communication to Authenticate Mobile Devices in a Distributed and Hierarchical SDN M Moatemri, H Eltaief, A El Kamel, H Youssef International Conference on Hybrid Intelligent Systems, 1244-1253, 2022 | 2 | 2022 |
AMLCC: Adaptive Multi-Layer Connected Chains mechanism for multicast sender authentication of media-streaming H Eltaief, H Youssef Fourth International Workshop on Verification and Evaluation of Computer and …, 2010 | 2 | 2010 |
Securing East-West Communication in a Distributed SDN H Eltaief, K Thabet, E Kamel Ali International Conference on Hybrid Intelligent Systems, 1225-1234, 2022 | 1 | 2022 |
Improving the Routing Process in SDN Using a Combination of the Evidence Theory and ML A El Kamel, H Eltaief, H Youssef International Conference on Intelligent Systems Design and Applications, 270-280, 2022 | 1 | 2022 |
A localization algorithm using a mobile beacon in wireless sensor networks M Manel, E Hamdi 2014 Global Summit on Computer & Information Technology (GSCIT), 1-5, 2014 | 1 | 2014 |
ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication H Eltaief, A El Kamel, H Youssef 2013 9th International Conference on Information Assurance and Security (IAS …, 2013 | 1 | 2013 |
Enhancing data authentication in software-defined networking (SDN) using multiparty computation F Hendaoui, H Eltaief, H Youssef Cluster Computing, 1-20, 2024 | | 2024 |
Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol M Moatemri, H Eltaief, H Youssef 2024 International Wireless Communications and Mobile Computing (IWCMC), 993-998, 2024 | | 2024 |
MSA-SDMN: multicast source authentication scheme for multi-domain software defined mobile networks H Eltaief, A El Kamel, H Youssef Journal of Information and Telecommunication 8 (1), 33-56, 2024 | | 2024 |
Selective Hash-based Approach for Multicast Source Authentication in SDMN H Eltaief, A El Kamel, H Youssef | | 2023 |