default search action
Ayman I. Kayssi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c133]Jean Paul Chaiban, Imad H. Elhajj, Ayman I. Kayssi, Salam Tabet:
A CNN-Random Forest Hybrid Model for Network Traffic Classification. MENACOMM 2025: 1-8 - [c132]Jason Diab, Hiba Houhou, Mohamad Kahil, Maarouf Yassine, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam, Salam Tabet:
A Novel Approach for Detecting LED Light Blinking Patterns. MENACOMM 2025: 1-6 - 2024
- [c131]Salam Tabet, Ayman I. Kayssi, Imad H. Elhajj:
AI-Enhanced Mobile Diminished Reality for Preserving 3D Visual Privacy. iMETA 2024: 141-148 - [c130]Salam Tabet, Ayman I. Kayssi, Imad H. Elhajj:
Utility-Privacy Aware Mobile Diminished Reality Framework for 3D Visual Privacy. TPS-ISA 2024: 41-48 - 2023
- [c129]Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, Imad H. Elhajj, Ayman I. Kayssi:
Phishing and Smishing Detection Using Machine Learning. CSR 2023: 206-211 - [c128]Salam Tabet, Ayman I. Kayssi, Imad H. Elhajj:
Mobile Diminished Reality for Preserving 3D Visual Privacy. iMETA 2023: 1-7 - [c127]Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:
Feature Relevance in NAT Detection Using Explainable AI. ISCC 2023: 1181-1184 - 2022
- [j51]Ola Salman
, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab
:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. Ann. des Télécommunications 77(5-6): 395-406 (2022) - [j50]Ola Salman, Imad H. Elhajj, Ali Chehab
, Ayman I. Kayssi:
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning. Comput. Networks 204: 108684 (2022) - [j49]Ola Salman
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A machine learning based framework for IoT device identification and abnormal traffic detection. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - 2021
- [j48]Louma Chaddad, Ali Chehab
, Ayman I. Kayssi:
OPriv: Optimizing Privacy Protection for Network Traffic. J. Sens. Actuator Networks 10(3): 38 (2021) - [j47]Ola Salman
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Data representation for CNN based internet traffic classification: a comparative study. Multim. Tools Appl. 80(11): 16951-16977 (2021) - [j46]Louma Chaddad, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Optimal Packet Camouflage Against Traffic Analysis. ACM Trans. Priv. Secur. 24(3): 22:1-22:23 (2021) - [c126]Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:
Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach. AICCSA 2021: 1-7 - [c125]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab
:
Centralization vs. De-Centralization: Where Does the Network Control Plane Stand? SDS 2021: 1-6 - 2020
- [j45]Ola Salman
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A review on machine learning-based approaches for Internet traffic classification. Ann. des Télécommunications 75(11): 673-710 (2020) - [j44]Sarah Abdallah
, Ayman I. Kayssi
, Imad H. Elhajj
, Ali Chehab
:
Performance analysis of SDN vs OSPF in diverse network environments. Concurr. Comput. Pract. Exp. 32(21) (2020) - [c124]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Network Obfuscation for Net Worth Security. SDS 2020: 83-88 - [d2]Peter Beaini, Imad H. Elhajj, Ayman I. Kayssi:
Gaming Network Traffic Dataset. IEEE DataPort, 2020 - [d1]Sameh Farhat, Imad H. Elhajj, Ayman I. Kayssi:
NAT Network Traffic Dataset. IEEE DataPort, 2020
2010 – 2019
- 2019
- [j43]Farah Saab, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Modelling Cognitive Bias in Crowdsourcing Systems. Cogn. Syst. Res. 58: 1-18 (2019) - [j42]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
AdaptiveMutate: a technique for privacy preservation. Digit. Commun. Networks 5(4): 245-255 (2019) - [j41]Riwa Mouawi
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Crowdsourcing for click fraud detection. EURASIP J. Inf. Secur. 2019: 11 (2019) - [c123]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Mobile Traffic Anonymization Through Probabilistic Distribution. ICIN 2019: 242-248 - [c122]Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. MLN 2019: 99-116 - [c121]Ali Hussein, Ola Salman, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Machine Learning for Network Resiliency and Consistency. SDS 2019: 146-153 - 2018
- [j40]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
IoT survey: An SDN and fog computing perspective. Comput. Networks 143: 221-246 (2018) - [j39]Georgi A. Ajaeiya
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi, Marc Kneppers:
Mobile Apps identification based on network flows. Knowl. Inf. Syst. 55(3): 771-796 (2018) - [j38]Maha Shamseddine, Wassim Itani
, Ali Chehab
, Ayman I. Kayssi:
Network Programming and Probabilistic Sketching for Securing the Data Plane. Secur. Commun. Networks 2018: 2905730:1-2905730:23 (2018) - [j37]Vahe Seferian, Rouwaida Kanj
, Ali Chehab
, Ayman I. Kayssi:
Identity Based Key Distribution Framework for Link Layer Security of AMI Networks. IEEE Trans. Smart Grid 9(4): 3166-3179 (2018) - [c120]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Adaptive Optimization for Hybrid Network Control Planes. AICCSA 2018: 1-8 - [c119]Riwa Mouawi, Mariette Awad
, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. IIT 2018: 88-92 - [c118]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
App traffic mutation: Toward defending against mobile statistical traffic analysis. INFOCOM Workshops 2018: 27-32 - [c117]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A Multi-level Internet Traffic Classifier Using Deep Learning. NOF 2018: 68-75 - [c116]Sarah Abdallah, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A Network Management Framework for SDN. NTMS 2018: 1-4 - [c115]Ali Hussein, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
SDN for QUIC: an enhanced architecture with improved connection establishment. SAC 2018: 2136-2139 - [c114]Ali Hussein, Ali Chehab
, Ayman I. Kayssi, Imad H. Elhajj
:
Machine learning for network resilience: The start of a journey. SDS 2018: 59-66 - [c113]Ola Salman, Louma Chaddad, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Pushing intelligence to the network edge. SDS 2018: 87-92 - [c112]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Network convergence in SDN versus OSPF networks. SDS 2018: 130-137 - 2017
- [j36]Khodor Hamandi, Jacques Bou Abdo, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Comput. Commun. 98: 20-30 (2017) - [j35]Sami Malek, Sarah Abdallah, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Low-power and high-speed shift-based multiplier for error tolerant applications. Microprocess. Microsystems 52: 566-574 (2017) - [c111]Ola Salman, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
:
Multi-level security for the 5G/IoT ubiquitous network. FMEC 2017: 188-193 - [c110]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN for MPTCP: An enhanced architecture for large data transfers in datacenters. ICC 2017: 1-7 - [c109]Maha Shamseddine, Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
Virtualized network views for localizing misbehaving sources in SDN data planes. ICC 2017: 1-7 - [c108]Georgi A. Ajaeiya, Nareg Adalian, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Flow-based Intrusion Detection System for SDN. ISCC 2017: 787-793 - [c107]Hussein A. Ammar, Youssef Nasser
, Ayman I. Kayssi:
Dynamic SDN controllers-switches mapping for load balancing and controller failure handling. ISWCS 2017: 216-221 - [c106]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
QoS guarantee over hybrid SDN/non-SDN networks. NOF 2017: 141-143 - [c105]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN VANETs in 5G: An architecture for resilient security services. SDS 2017: 67-74 - [c104]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Software Defined IoT security framework. SDS 2017: 75-80 - [c103]Sarah Abdallah, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Fuzzy decision system for technology choice in hybrid networks. SDS 2017: 106-111 - 2016
- [c102]Raghid Morcel, Hadi Sarieddeen
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs. ACTEA 2016: 178-183 - [c101]Maha Shamseddine, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach. IC2E Workshops 2016: 30-35 - [c100]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN Security Plane: An Architecture for Resilient Security Services. IC2E Workshops 2016: 54-59 - [c99]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN verification plane for consistency establishment. ISCC 2016: 519-524 - [c98]Ola Salman, Sarah Abdallah, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Identity-based authentication scheme for the Internet of Things. ISCC 2016: 1109-1111 - [c97]Maha Shamseddine, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi, Wassim Itani:
NCaaS: network configuration as a service in SDN-driven cloud architectures. SAC 2016: 448-454 - [c96]Farah Saab, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A crowdsourcing game-theoretic intrusion detection and rating system. SAC 2016: 622-625 - [c95]Farah Saab, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Solving sybil attacks using evolutionary game theory. SAC 2016: 2195-2201 - 2015
- [j34]Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
:
G-Route: an energy-aware service routing protocol for green cloud computing. Clust. Comput. 18(2): 889-908 (2015) - [j33]Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Energy-Efficient Security for Voice over IP. Int. J. Netw. Secur. 17(1): 7-22 (2015) - [j32]Khodor Hamandi, Alaa Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Messaging Attacks on Android: Vulnerabilities and Intrusion Detection. Mob. Inf. Syst. 2015: 746930:1-746930:13 (2015) - [j31]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
, Wassim Itani:
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks. Sensors 15(2): 3299-3333 (2015) - [j30]Salwa Adriana Saab, Farah Saab, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
:
Partial mobile application offloading to the cloud for energy-efficiency with security measures. Sustain. Comput. Informatics Syst. 8: 38-46 (2015) - [c94]Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
An architecture for the Internet of Things with decentralized data and centralized control. AICCSA 2015: 1-8 - [c93]Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Edge computing enabling the Internet of Things. WF-IoT 2015: 603-608 - [c92]Riwa Mouawi, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Comparison of in-app ads traffic in different ad networks. WiMob 2015: 581-587 - 2014
- [j29]Wassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab
:
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud. Future Gener. Comput. Syst. 32: 99-117 (2014) - [j28]Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Fast dynamic internet mapping. Future Gener. Comput. Syst. 39: 55-66 (2014) - [j27]Mehiar Dabbagh, Hazem M. Hajj, Wassim El-Hajj
, Mohammad M. Mansour, Ayman I. Kayssi, Ali Chehab
:
An energy-aware design methodology based on kernel optimisations. Int. J. Auton. Adapt. Commun. Syst. 7(3): 271-294 (2014) - [j26]Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Decentralised malicious node detection in WSN. Int. J. Space Based Situated Comput. 4(1): 15-25 (2014) - [c91]Khaled Bakhit, Chantal Chalouhi, Sabine Francis, Sara Mourad, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
3G to Wi-Fi offloading on Android. AICCSA 2014: 247-252 - [c90]Alaa Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Mobile malware exposed. AICCSA 2014: 253-258 - [c89]Khaled Bakhit, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
DAGGER: Distributed architecture for granular mitigation of mobile based attacks. AICCSA 2014: 259-265 - [c88]Farah Saab, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
CrowdApp: Crowdsourcing for application rating. AICCSA 2014: 551-556 - [c87]Joseph Loutfi, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Smartphone sensors as random bit generators. AICCSA 2014: 773-780 - [c86]Jacques Bou Abdo, Imad Sarji, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Application-Aware Fast Dormancy in LTE. AINA 2014: 194-201 - [c85]Alaa Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
DAIDS: An Architecture for Modular Mobile IDS. AINA Workshops 2014: 328-333 - [c84]Ayman Mukaddam, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
IP Spoofing Detection Using Modified Hop Count. AINA 2014: 512-516 - [c83]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
ALPS: The Accountable Cloud Protocol Stack. CLOSER 2014: 467-475 - [c82]Mona Jaber, Nour Kouzayha, Zaher Dawy, Ayman I. Kayssi:
On cellular network planning and operation with M2M signalling and security considerations. ICC Workshops 2014: 429-434 - [c81]Gerard Touma, Rouwaida Kanj, Rajiv V. Joshi, Ayman I. Kayssi, Ali Chehab
:
Robust bias temperature instability refresh design and methodology for memory cell recovery. ICICDT 2014: 1-4 - [c80]Sabine Francis, Rouwaida Kanj, Rajiv V. Joshi, Ayman I. Kayssi, Ali Chehab
:
Statistical methodology for modeling non-IID memory fails events. ISQED 2014: 205-211 - [c79]Vahe Seferian, Rouwaida Kanj, Ali Chehab
, Ayman I. Kayssi:
PUF and ID-based key distribution security framework for advanced metering infrastructures. SmartGridComm 2014: 933-938 - [c78]Khaled Bakhit, Sirine Taleb
, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
CAVE: Hybrid Approach for In-Network Content Caching. UIC/ATC/ScalCom 2014: 649-654 - 2013
- [j25]Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
SNUAGE: an efficient platform-as-a-service security framework for the cloud. Clust. Comput. 16(4): 707-724 (2013) - [j24]Jalal Awed, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Perception-aware packet-loss resilient compression for networked haptic systems. Comput. Commun. 36(15-16): 1621-1628 (2013) - [j23]Faisal Hamady, Ayman I. Kayssi, Ali Chehab
, Nitin Gupte:
Effects of workload variation on the energy distribution in a mobile platform. Microprocess. Microsystems 37(8-D): 1192-1199 (2013) - [j22]Faisal Hamady, Ayman I. Kayssi, Ali Chehab
, Mohammad M. Mansour:
Evaluation of Low-Power Computing when Operating on Subsets of Multicore Processors. J. Signal Process. Syst. 70(2): 193-208 (2013) - [c77]Alaa Atassi, Naoum Sayegh, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Malicious Node Detection in Wireless Sensor Networks. AINA Workshops 2013: 456-461 - [c76]Ramzi Bassil, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Effects of Signaling Attacks on LTE Networks. AINA Workshops 2013: 499-504 - [c75]Khodor Hamandi, Imad Sarji, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme. AINA Workshops 2013: 929-934 - [c74]Khodor Hamandi, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Android SMS Malware: Vulnerability and Mitigation. AINA Workshops 2013: 1004-1009 - [c73]Kim Baraka
, Marc Ghobril, Sami Malek, Rouwaida Kanj, Ayman I. Kayssi:
Low Cost Arduino/Android-Based Energy-Efficient Home Automation System with Smart Task Scheduling. CICSyN 2013: 296-301 - [c72]Naoum Sayegh, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Internal security attacks on SCADA systems. ICCIT 2013: 22-27 - [c71]Wassim Itani, Cesar Ghali, Ali Chehab
, Ayman I. Kayssi, Imad H. Elhajj
:
Accountable energy monitoring for green service routing in the cloud. ICCIT 2013: 103-108 - [c70]Alaa Atassi, Imad Sarji, Ayman I. Kayssi, Ali Chehab
, Imad Elhaj:
Low overhead anonymous routing. ICCIT 2013: 173-178 - [c69]Ramzi Bassil, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A resource reservation attack against LTE networks. ICCIT 2013: 262-268 - [c68]Ibrahim Abdelghany, Wajeb Saab
, Tarek Sakakini, Abdul-Amir Yassine, Ali Chehab
, Ayman I. Kayssi, Imad H. Elhajj
:
Energy-efficient truncated multipliers. ICEAC 2013: 34-39 - [c67]Lama Shaer, Ihab Nahlus, Jawad Merhi, Ayman I. Kayssi, Ali Chehab
:
Low-power digital signal processor design for a hearing aid. ICEAC 2013: 40-44 - [c66]Sarah Abdallah, Ali Chehab
, Ayman I. Kayssi, Imad H. Elhajj
:
TABSH: Tag-based stochastic hardware. ICEAC 2013: 115-120 - [c65]Farah Saab, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Energy-efficient HEVC using stochastic processing. ICEAC 2013: 152-157 - [c64]Salwa Adriana Saab, Ali Chehab
, Ayman I. Kayssi:
Energy efficiency in Mobile Cloud Computing: Total offloading selectively works. Does selective offloading totally work? ICEAC 2013: 164-168 - [c63]Ibrahim Abdelghany, Wajeb Saab
, Tarek Sakakini, Abdul-Amir Yassine, Ali Chehab
, Ayman I. Kayssi, Imad H. Elhajj
:
Energy-efficient truncated multipliers with scaling. IDT 2013: 1-6 - [c62]Faisal Hamady, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
User experience-based mechanism for preserving energy in graphics-intensive applications. NEWCAS 2013: 1-4 - [c61]Khodor Hamandi, Imad Sarji, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi. WTS 2013: 1-6 - 2012
- [c60]Sarah Abdallah, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Stochastic hardware architectures: A survey. ICEAC 2012: 1-6 - [c59]Farah Saab, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Energy efficient JPEG using stochastic processing. ICEAC 2012: 1-6 - [c58]Ramzi Bassil, Roula Hobeica, Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab
:
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System. ICT 2012: 1-6 - [c57]Mostafa Dikmak, Zahraa Sabra, Ayman I. Kayssi, Ali Chehab
:
Optimized conditional privacy preservation in VANETs. ICT 2012: 1-6 - [c56]Khodor Hamandi, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Android SMS botnet: a new perspective. MOBIWAC 2012: 125-130 - [c55]Ramzi Bassil, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Signaling oriented denial of service on LTE networks. MOBIWAC 2012: 153-158 - [c54]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
:
CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. PST 2012: 195-202 - [c53]Wassim Itani, Cesar Ghali, Ramzi Bassil, Ayman I. Kayssi, Ali Chehab
:
BGP-inspired autonomic service routing for the cloud. SAC 2012: 406-411 - [c52]Khodor Hamandi, Farah Saab, Ayman I. Kayssi:
Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization. TrustCom 2012: 1481-1485 - [c51]Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi:
Efficient Internet Mapping in the Presence of Network Load Balancers. TrustCom 2012: 1706-1713 - [c50]Sarah Abdallah, Elias Najjar, Ayman I. Kayssi:
A Round Robin Load Balancing and Redundancy Protocol for Network Routers. TrustCom 2012: 1741-1747 - 2011
- [j21]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
, Hassan Artail:
Fuzzy reputation-based trust model. Appl. Soft Comput. 11(1): 345-355 (2011) - [j20]Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
E2VoIP2: Energy efficient voice over IP privacy. Comput. Secur. 30(8): 815-829 (2011) - [c49]Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab:
Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing. CLOSER 2011: 49-55 - [c48]Faisal Hamady, Nadia Bisher, Ayman I. Kayssi, Cesar Ghali:
MAConf: Passive layer-2 detection mechanism for mobile wireless sensor networks. DCOSS 2011: 1-6 - [c47]Faisal Hamady, Ali Chehab
, Ayman I. Kayssi:
Energy consumption breakdown of a modern mobile platform under various workloads. ICEAC 2011: 1-4 - [c46]Wassim Itani, Ali Chehab
, Ayman I. Kayssi:
Energy-efficient platform-as-a-service security provisioning in the cloud. ICEAC 2011: 1-6 - [c45]Imad Sarji, Cesar Ghali, Ali Chehab
, Ayman I. Kayssi:
CloudESE: Energy efficiency model for cloud computing environments. ICEAC 2011: 1-6 - [c44]Ayman Tajeddine, Ali Chehab
, Ayman I. Kayssi:
H-TRACE: A hybrid energy-aware routing scheme for mobile ad hoc networks. ICEAC 2011: 1-6 - [c43]Ahmed Fawaz, Ameen Jaber, Ali Kassem, Ali Chehab
, Ayman I. Kayssi:
Assessing testing techniques for resistive-open defects in nanometer CMOS adders. ICECS 2011: 165-168 - [c42]Soulaf Saab, Wassim Itani, Ayman I. Kayssi, Ali Chehab, Cesar Ghali:
Secure delay-tolerant communications in the presence of oppressive governments. ICITST 2011: 302-307 - [c41]Ramzi Bassil, Wissam El-Beaino, Ayman I. Kayssi, Ali Chehab:
A PUF-based ultra-lightweight mutual-authentication RFID protocol. ICITST 2011: 495-499 - [c40]Salwa Adriana Saab, Ayman I. Kayssi, Ali Chehab:
A decentralized energy-aware key management scheme for Wireless Sensor Networks. ICITST 2011: 504-508 - [c39]Layla Hamieh, Nader Mehdi, Ghazalah Omeirat, Ali Chehab
, Ayman I. Kayssi:
The effectiveness of delay and IDDT tests in detecting resistive open defects for nanometer CMOS adder circuits. IDT 2011: 53-57 - [c38]Cesar Ghali, Faisal Hamady, Imad H. Elhajj
, Ayman I. Kayssi:
Matryoshka: Tunneled packets breaking the rules. HPCS 2011: 485-490 - [c37]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
:
TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks. IWCMC 2011: 953-958 - [c36]Mehiar Dabbagh, Hazem M. Hajj, Ali Chehab
, Wassim El-Hajj
, Ayman I. Kayssi, Mohammad M. Mansour:
A design methodology for energy aware neural networks. IWCMC 2011: 1333-1340 - [c35]Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing. SECRYPT 2011: 450-456 - [c34]Ihab Nahlus, Lama Shaer, Ali Chehab
, Ayman I. Kayssi, Mohammad M. Mansour:
Low-power adder design techniques for noise-tolerant applications. SiPS 2011: 117-121 - 2010
- [j19]Rima Deghaili, Ali Chehab, Ayman I. Kayssi, Wassim Itani:
STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments. Int. J. Dependable Trust. Inf. Syst. 1(1): 60-81 (2010) - [c33]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
:
A Privacy-Preserving Trust Model for VANETs. CIT 2010: 832-837 - [c32]Cesar Ghali, Ali Chehab
, Ayman I. Kayssi:
CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services. CIT 2010: 1085-1089 - [c31]Mohammad Fawaz, Nader Kobrosli, Ali Chehab
, Ayman I. Kayssi:
Testing techniques for resistive-open defects in future CMOS technologies. APCCAS 2010: 256-259 - [c30]Wassim Itani, Cesar Ghali, Ahmad M. El-Hajj
, Ayman I. Kayssi, Ali Chehab
:
SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks. GLOBECOM 2010: 1-6 - [c29]Mohammad Fawaz, Nader Kobrosli, Ahmad Chkeir, Ali Chehab
, Ayman I. Kayssi:
Transient current and delay analysis for resistive-open defects in future 16 nm CMOS circuits. ICECS 2010: 438-441 - [c28]Wassim Itani, Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks. Q2SWinet 2010: 90-97
2000 – 2009
- 2009
- [j18]Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab:
Policy-driven and Content-based Web Services Security Gateway. Int. J. Netw. Secur. 8(3): 253-265 (2009) - [j17]Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
Smart encryption channels for securing virtual machine-based networked applications. Secur. Commun. Networks 2(6): 507-518 (2009) - [c27]Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. DASC 2009: 711-716 - [c26]Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices. Q2SWinet 2009: 37-43 - [c25]Saleem Wehbe, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
:
Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain. NTMS 2009: 1-5 - [c24]Mohamad El Habbal, Maya El Moghrabi, Omar Monajjed, Ayman I. Kayssi:
Automated device for determination of skin lesion regions. SAC 2009: 859-860 - 2008
- [j16]Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab:
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System. Int. J. Netw. Secur. 6(2): 145-157 (2008) - [j15]Tarek Hassan, Ayman I. Kayssi, Ali Chehab
:
Ring of Masters (ROM): A new ring structure for Bluetooth scatternets with dynamic routing and adaptive scheduling schemes. Pervasive Mob. Comput. 4(4): 546-561 (2008) - 2007
- [j14]Samer Hanna, Ali Chehab, Ayman I. Kayssi, Hassan Artail:
Lighter Weight Mobile Agent System. Int. J. Comput. Their Appl. 14(3): 170-187 (2007) - [c23]Lara Srour, Ayman I. Kayssi, Ali Chehab
:
Personalized Web Page Ranking Using Trust and Similarity. AICCSA 2007: 454-457 - [c22]Camille Gaspard, Batoul Haidar, Ayman I. Kayssi, Ali Chehab
:
SmartSSL: Efficient Policy-Based Web Security. AICCSA 2007: 833-839 - [c21]Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab
:
XPRIDE: Policy-Driven Web Services Security Based on XML Content. GLOBECOM 2007: 553-558 - [c20]Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures. SecureComm 2007: 63-72 - 2006
- [j13]Rania Wehbi, Ayman I. Kayssi, Ali Chehab
, Zaher Dawy:
Network Setup for Secure Routing in Inter-Vehicle Communication Networks. Int. J. Bus. Data Commun. Netw. 2(4): 1-17 (2006) - [j12]Wassim Itani, Ayman I. Kayssi, Ali Chehab, Camille Gaspard:
A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices. Int. J. Netw. Secur. 3(2): 120-131 (2006) - [c19]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
, Hassan Artail:
PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. ATC 2006: 205-216 - [c18]Wassim Itani, Camille Gaspard, Ayman I. Kayssi, Ali Chehab
:
PRIDE: Policy-Driven Web Security for Handheld Wireless Devices. GLOBECOM 2006 - [c17]Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
An enterprise policy-based security protocol for protecting relational database network objects. IWCMC 2006: 343-348 - [c16]Lara Srour, Ayman I. Kayssi, Ali Chehab
:
Reputation-Based Algorithm for Managing Trust in File Sharing Networks. SecureComm 2006: 1-10 - 2005
- [j11]Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab:
Trends in Mobile Agent Applications. J. Res. Pract. Inf. Technol. 37(4) (2005) - [j10]Ghada Derbas, Ayman I. Kayssi, Ali Chehab
, Hassan Artail, Ayman Tajeddine:
A trust model for distributed systems based on reputation. Int. J. Web Grid Serv. 1(3/4): 416-447 (2005) - [c15]Sleiman Itani, Najwa Aaraj, Darine Abdelahad, Ayman I. Kayssi:
Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks. AICCSA 2005: 95 - [c14]Wassim Itani, Ayman I. Kayssi, Ali Chehab
:
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices. SecureComm 2005: 240-242 - 2004
- [j9]Ayman I. Kayssi, Sanaa Sharafeddine
, Houda Karaki:
Computer-based laboratory for data communications and computer networking. Comput. Appl. Eng. Educ. 12(2): 84-97 (2004) - [j8]Wassim Itani, Ayman I. Kayssi:
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications. Comput. Commun. 27(18): 1825-1839 (2004) - [j7]Wassim Itani, Ayman I. Kayssi:
J2ME application-layer end-to-end security for m-commerce. J. Netw. Comput. Appl. 27(1): 13-32 (2004) - [j6]Ayman I. Kayssi:
The average capacitor current method for delay calculation in MOS circuits. IEEE Trans. Educ. 47(3): 330-339 (2004) - [c13]Najwa Aaraj, Anis Nazer, Ali Chehab, Ayman I. Kayssi:
Transient Current Testing of Dynamic CMOS Circuits. DFT 2004: 264-271 - [c12]Ghada Derbas, Ayman I. Kayssi, Hassan Artail, Ali Chehab:
TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation. ICPS 2004: 113-120 - [c11]Wassim Itani, Ayman I. Kayssi:
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications. IPCCC 2004: 753-759 - [c10]Ayman I. Kayssi, Ali El-Haj-Mahmoud:
EmuNET: a real-time network emulator. SAC 2004: 357-362 - 2003
- [j5]Ayman I. Kayssi:
Analytical transient response of MOS current mirrors. Int. J. Circuit Theory Appl. 31(5): 453-464 (2003) - [c9]Ayman I. Kayssi, Houda Karaki, Wissam Abu-Khraybeh:
RTP-Based Caching of Streaming Media. ISCC 2003: 1067-1071 - [c8]Wassim Itani, Ayman I. Kayssi:
J2ME end-to-end security for M-commerce. WCNC 2003: 2015-2020 - 2000
- [j4]Joseph Samaha, Ayman I. Kayssi, Ralph Achkar, Mark Azar:
G3 Integrates Three System Technologies. Computer 33(10): 107-110 (2000) - [j3]Jian Liu, Rafic Z. Makki, Ayman I. Kayssi:
Dynamic Power Supply Current Testing of CMOS SRAMs. J. Electron. Test. 16(5): 499-511 (2000) - [c7]Ayman I. Kayssi, Louis Harik, Rony Ferzli, Mohammad Fawaz:
FPGA-based Internet protocol firewall chip. ICECS 2000: 316-319
1990 – 1999
- 1998
- [c6]Jian Liu, Rafic Z. Makki, Ayman I. Kayssi:
Dynamic Power Supply Current Testing of SRAMs. Asian Test Symposium 1998: 348-353 - [c5]Mohammad M. Mansour, Ayman I. Kayssi:
FPGA-based Internet Protocol Version 6 router. ICCD 1998: 334-339 - 1997
- [c4]V. Chandramouli, Karem A. Sakallah, Ayman I. Kayssi:
Signal Delay in Coupled, Distributed RC Lines in the Presence of Temporal Proximity. ARVLSI 1997: 32-46 - 1996
- [c3]Ayman I. Kayssi:
Macromodeling C- and RC-loaded CMOS inverters for timing analysis. Great Lakes Symposium on VLSI 1996: 272-276 - 1995
- [j2]Ayman I. Kayssi, Karem A. Sakallah:
Timing models for gallium arsenide direct-coupled FET logic circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 14(3): 384-393 (1995) - 1994
- [c2]Ayman I. Kayssi, Karem A. Sakallah:
Macromodel Simplification Using Dimensional Analysis. ISCAS 1994: 335-338 - 1992
- [c1]Ayman I. Kayssi, Karem A. Sakallah:
Delay macromodels for the timing analysis of GaAs DCFL. EURO-DAC 1992: 142-145 - 1991
- [j1]Trevor N. Mudge, Richard B. Brown, William P. Bimingham, Jeffrey A. Dykstra, Ayman I. Kayssi, Ronald J. Lomax, Kunle Olukotun, Karem A. Sakallah, Raymond A. Milano:
The Design of a Microsupercomputer. Computer 24(1): 57-64 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-08 20:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint