Physical layer authentication for mobile systems with time-varying carrier frequency offsets W Hou, X Wang, JY Chouinard, A Refaey IEEE Transactions on Communications 62 (5), 1658-1667, 2014 | 215 | 2014 |
Software-defined perimeter (sdp): State of the art secure solution for modern networks A Moubayed, A Refaey, A Shami IEEE network 33 (5), 226-233, 2019 | 112 | 2019 |
ssHealth: toward secure, blockchain-enabled healthcare systems AA Abdellatif, AZ Al-Marridi, A Mohamed, A Erbad, CF Chiasserini, ... IEEE Network 34 (4), 312-319, 2020 | 107 | 2020 |
On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-Defined Perimeter A Sallam, A Refaey, A Shami IEEE Access, 2019 | 69 | 2019 |
Hierarchical security paradigm for iot multiaccess edge computing J Singh, Y Bello, AR Hussein, A Erbad, A Mohamed IEEE Internet of Things Journal 8 (7), 5794-5805, 2020 | 56 | 2020 |
A framework for joint wireless network virtualization and cloud radio access networks for next generation wireless networks M Kalil, A Al-Dweik, MFA Sharkh, A Shami, A Refaey IEEE Access 5, 20814-20827, 2017 | 54 | 2017 |
A blockchain policy and charging control framework for roaming in cellular networks A Refaey, K Hammad, S Magierowski, E Hossain IEEE Network 34 (3), 170-177, 2020 | 50 | 2020 |
A blockchain framework for secure task sharing in multi-access edge computing AV Rivera, A Refaey, E Hossain IEEE Network 35 (3), 176-183, 2021 | 42 | 2021 |
Multilevel security framework for nfv based on software defined perimeter J Singh, A Refaey, A Shami IEEE Network 34 (5), 114-119, 2020 | 34 | 2020 |
Performance analysis of sdp for secure internal enterprises P Kumar, A Moubayed, A Refaey, A Shami, J Koilpillai 2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2019 | 34 | 2019 |
Hailing cloud empowered radio access networks KA Meerja, A Shami, A Refaey IEEE Wireless Communications 22 (1), 122-129, 2015 | 34 | 2015 |
Adoption of the Software-Defined Perimeter (SDP) Architecture for Infrastructure as a Service J Singh, A Refaey, J Koilpillai IEEE Canadian Journal for Electrical and Computer Engineering 43 (4), 357-363, 2020 | 32 | 2020 |
A sidechain-based decentralized authentication scheme via optimized two-way peg protocol for smart community M Li, H Tang, AR Hussein, X Wang IEEE Open Journal of the Communications Society 1, 282-292, 2020 | 32 | 2020 |
On sustained zero trust conceptualization security for mobile core networks in 5g and beyond Y Bello, AR Hussein, M Ulema, J Koilpillai IEEE Transactions on Network and Service Management 19 (2), 1876-1889, 2022 | 28 | 2022 |
Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition K Loukhaoukha, A Refaey, K Zebbiche Journal of Electrical Systems and Information Technology 4 (3), 359-368, 2017 | 27 | 2017 |
An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI P Hao, X Wang, A Refaey 2013 13th Canadian Workshop on Information Theory, 44-48, 2013 | 23 | 2013 |
On IoT applications: a proposed SDP framework for MQTT A Refaey, A Sallam, A Shami Electronics Letters 55 (22), 1201-1203, 2019 | 22 | 2019 |
Virtualization of wireless sensor networks through MAC layer resource scheduling E Uchiteleva, A Shami, A Refaey IEEE Sensors Journal 17 (5), 1562-1576, 2016 | 22 | 2016 |
Optimized provisioning of SDN-enabled virtual networks in geo-distributed cloud computing datacenters K Alhazmi, A Shami, A Refaey IEEE Journal of Communications and Networks 19 (4), 402-415, 2017 | 21 | 2017 |
Tracking pandemics: A MEC-enabled IoT ecosystem with learning capability A Feriani, A Refaey, E Hossain IEEE Internet of Things Magazine 3 (3), 40-45, 2020 | 18 | 2020 |