default search action
Ezedin Barka
Person information
- affiliation: United Arab Emirates University, Al-Ain, UAE
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j25]Mohamad Khayat
, Ezedin Barka
, Mohamed Adel Serhani
, Farag M. Sallabi
, Khaled Shuaib
, Heba M. Khater
:
Empowering Security Operation Center With Artificial Intelligence and Machine Learning - A Systematic Literature Review. IEEE Access 13: 19162-19197 (2025) - [j24]Mohamad Khayat
, Ezedin Barka
, Mohamed Adel Serhani
, Farag M. Sallabi
, Khaled Shuaib
, Heba M. Khater
:
Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop. IEEE Access 13: 24736-24748 (2025) - 2024
- [j23]Heba M. Khater
, Farag M. Sallabi
, Mohamed Adel Serhani
, Ezedin Barka, Khaled Shuaib
, Asadullah Tariq
, Mohamad Khayat
:
Empowering Healthcare With Cyber-Physical System - A Systematic Literature Review. IEEE Access 12: 83952-83993 (2024) - [j22]Abir Raza Baig
, Elarbi Badidi
, Mohammad Hayajneh
, Ezedin Barka
, Omar El Harrouss:
Blockchain-Based Reputation and Trust Management for Smart Grids, Healthcare, and Transportation: A Review. IEEE Access 12: 196887-196913 (2024) - [j21]Hakima Rym Rahal, Sihem Slatnia, Okba Kazar
, Ezedin Barka, Saad Harous
:
Blockchain-based multi-diagnosis deep learning application for various diseases classification. Int. J. Inf. Sec. 23(1): 15-30 (2024) - [j20]Imene Latreche, Sihem Slatnia, Okba Kazar, Ezedin Barka, Saad Harous:
A Review on Deep Learning Techniques for EEG-Based Driver Drowsiness detection systems. Informatica (Slovenia) 48(3) (2024) - [j19]Ali Ismail Awad
, Aiswarya Babu
, Ezedin Barka
, Khaled Shuaib:
AI-powered biometrics for Internet of Things security: A review and future vision. J. Inf. Secur. Appl. 82: 103748 (2024) - [j18]Asadullah Tariq
, Mohamed Adel Serhani
, Farag M. Sallabi
, Ezedin Salem Barka, Tariq Qayyum
, Heba M. Khater
, Khaled A. Shuaib
:
Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research Prospects. IEEE Open J. Commun. Soc. 5: 4920-4998 (2024) - [c35]Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka:
A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of Things. CSR 2024: 1-8 - [c34]Asadullah Tariq, Farag M. Sallabi, Mohamed Adel Serhani, Ezedin Barka:
A Trust and Data Quality-Based Dynamic Node Selection and Aggregation Optimization in Federated Learning. IWCMC 2024: 1424-1430 - 2023
- [j17]Heba M. Khater
, Farag M. Sallabi
, Mohamed Adel Serhani
, Sherzod Turaev
, Ezedin Barka:
Efficient Hybrid Fault-Management Clustering Algorithm (HFMCA) in WBANs Based on Weighted Bipartite Graph. IEEE Access 11: 57977-57990 (2023) - [j16]Mohammed M. Alani
, Ali Ismail Awad
, Ezedin Barka:
ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning. Internet Things 23: 100861 (2023) - [j15]Amir Djenna
, Ezedin Barka, Achouak Benchikh, Karima Khadir:
Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics. Sensors 23(14): 6302 (2023) - [c33]Heba M. Khater
, Asadullah Tariq
, Farag M. Sallabi
, Mohamed Adel Serhani
, Ezedin Barka
:
Integrating Cyber-Physical System with Federated-Edge Computing for Diabetes Detection and Management. BDSIC 2023: 16-22 - [c32]Heba M. Khater, Mohamad Khayat
, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Barka, Farag M. Sallabi:
AI Techniques for Software Vulnerability Detection and Mitigation. DSC 2023: 1-10 - [c31]Asadullah Tariq
, Abderrahmane Lakas
, Farag M. Sallabi
, Tariq Qayyum
, Mohamed Adel Serhani
, Ezedin Barka
:
Empowering Trustworthy Client Selection in Edge Federated Learning Leveraging Reinforcement Learning. SEC 2023: 372-377 - [c30]Heba M. Khater, Asadullah Tariq, Farag M. Sallabi, Mohamed Adel Serhani, Ezedin Barka:
Federated-Edge Computing Based Cyber-Physical Systems Framework for Enhanced Diabetes Management. IIT 2023: 67-72 - [i1]Asadullah Tariq, Mohamed Adel Serhani, Farag M. Sallabi, Tariq Qayyum, Ezedin Salem Barka, Khaled A. Shuaib:
Trustworthy Federated Learning: A Survey. CoRR abs/2305.11537 (2023) - 2022
- [j14]Saleh H. Aldaajeh
, Heba Saleous
, Saed Alrabaee
, Ezedin Barka, Frank Breitinger
, Kim-Kwang Raymond Choo:
The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119: 102754 (2022) - [j13]Ezedin Barka, Chaker Abdelaziz Kerrache
, Hadjer Benkraouda, Khaled Shuaib, Farhan Ahmad, Fatih Kurugollu:
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure. Trans. Emerg. Telecommun. Technol. 33(8) (2022) - [j12]Ezedin Barka, Mohammed Al Baqari
, Chaker Abdelaziz Kerrache
, Jorge Herrera-Tapia
:
Implementation of a Biometric-Based Blockchain System for Preserving Privacy, Security, and Access Control in Healthcare Records. J. Sens. Actuator Networks 11(4): 85 (2022) - [c29]M'hamed Mancer
, Mohamed Akram Khelili, Ezedin Barka, Okba Kazar
, Sihem Slatnia, Saad Harous
, Belkacem Athamena
, Zina Houhamdi:
Blockchain Technology for Secure Shared Medical Data. ACIT 2022: 1-6 - [c28]Saed Alrabaee, Mousa Al-Kfairy
, Ezedin Barka:
Efforts and Suggestions for Improving Cybersecurity Education. EDUCON 2022: 1161-1168 - [c27]Dounya Kassimi, Okba Kazar
, Ezedin Barka, Abdelhak Merizig, Zina Houhamdi, Belkacem Athamena
, Zaoui Meftah:
A Smart Approach using Multi-agent System for Big Data Security. IOTSMS 2022: 1-7 - [c26]Dounya Kassimi, Okba Kazar
, Ezedin Barka, Abdelhak Merizig, Zina Houhamdi, Belkacem Athamena
, Zaoui Meftah:
A New Approach Based on a Multi-Agent System for IDS in Cloud Computing. SDS 2022: 1-8 - 2021
- [c25]Sofiane Dahmane
, Mohamed Bachir Yagoubi, Pascal Lorenz
, Ezedin Barka, Abderrahmane Lakas
, Nasreddine Lagraa, Chaker Abdelaziz Kerrache:
V2X-based COVID-19 Pandemic Severity Reduction in Smart Cities. GLOBECOM 2021: 1-6 - 2020
- [j11]Najah Abu Ali
, Abd-Elhamid M. Taha, Ezedin Barka:
Integrating Blockchain and IoT/ITS for Safer Roads. IEEE Netw. 34(1): 32-37 (2020) - [c24]Mohammed Al Baqari, Ezedin Barka:
Biometric-Based Blockchain EHR System (BBEHR). IWCMC 2020: 2228-2234
2010 – 2019
- 2019
- [c23]Zouheir Trabelsi, Ezedin Barka:
A Basic Course Model on Information Security for High School IT Curriculum. EDUCON 2019: 63-70 - [c22]Mohamad Khayat
, Ezedin Barka, Farag M. Sallabi
:
SDN_Based Secure Healthcare Monitoring System(SDN-SHMS). ICCCN 2019: 1-7 - 2018
- [j10]Ezedin Barka, Chaker Abdelaziz Kerrache
, Rasheed Hussain
, Nasreddine Lagraa, Abderrahmane Lakas
, Safdar Hussain Bouk
:
A Trusted Lightweight Communication Strategy for Flying Named Data Networking. Sensors 18(8): 2683 (2018) - [j9]Chaker Abdelaziz Kerrache
, Abderrahmane Lakas
, Nasreddine Lagraa, Ezedin Barka:
UAV-assisted technique for the detection of malicious and selfish nodes in VANETs. Veh. Commun. 11: 1-11 (2018) - [c21]Ezedin Barka, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas
:
Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments. CCNC 2018: 1-7 - [c20]Saif Saad Mohammed, Rasheed Hussain
, Oleg Senko, Bagdat Bimaganbetov, Jooyoung Lee, Fatima Hussain, Chaker Abdelaziz Kerrache, Ezedin Barka, Md. Zakirul Alam Bhuiyan:
A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network. WiMob 2018: 1-8 - 2017
- [c19]Khaled Shuaib, Ezedin Barka, Juhar Ahmed Abdella
, Farag M. Sallabi
:
Secure charging and payment protocol (SCPP) for roaming plug-in electric vehicles. CoDIT 2017: 173-178 - [c18]Khaled Shuaib, Juhar Ahmed Abdella
, Ezedin Barka, Farag M. Sallabi
:
A Secure Discharging Protocol for Plug in Electric Vehicle (SDP-V2G) in Smart Grid. ICT Innovations 2017: 15-26 - [c17]Ezedin Barka, Juhar Ahmed Abdella
, Khaled Shuaib:
Usage control for charging/discharging of plug-in electric vehicle (UConPEV). IWCMC 2017: 1693-1699 - [c16]Chaker Abdelaziz Kerrache, Ezedin Barka, Nasreddine Lagraa, Abderrahmane Lakas
:
Reputation-aware energy-efficient solution for FANET monitoring. WMNC 2017: 1-6 - 2016
- [j8]Khaled Shuaib, Ezedin Barka, Nedaa Al Hussien
, Mohammed Abdel-Hafez
, Mahmoud A. Alahmad
:
Cognitive Radio for Smart Grid with Security Considerations. Comput. 5(2): 7 (2016) - [c15]Ezedin Barka, Nedaa Al Hussien
, Khaled Shuaib:
Securing Smart Meters Data for AMI Using RBAC. AsiaJCIS 2016: 1-8 - [c14]Nedaa Al Hussien
, Ezedin Barka, Mohammed Abdel-Hafez
, Khaled Shuaib:
Secure Spectrum Sensing in Cognitive-Radio-Based Smart Grid Using Role-Based Delegation. ICIME 2016: 25-29 - [c13]Azza Zayed Alshamsi, Ezedin Salem Barka, Mohamed Adel Serhani:
Lightweight encryption algorithm in wireless body area network for e-health monitoring. IIT 2016: 1-7 - [c12]Emad Eldin Mohamed, Adel Ben Mnaouer
, Ezedin Barka:
PSCAN: A Port Scanning Network Covert Channel. LCN 2016: 631-634 - 2015
- [c11]Ezedin Barka, Sujith Samuel Mathew
, Yacine Atif
:
Securing the Web of Things with Role-Based Access Control. C2SI 2015: 14-26 - [c10]Mohamed Adel Serhani, Ezedin Barka, Yasser Gadallah:
A secure role-based service discovery technique for emergency intervention operations. FGCT 2015: 1-6 - 2013
- [j7]Liren Zhang, Abderrahmane Lakas
, Hesham El-Sayed, Ezedin Barka:
Mobility analysis in vehicular ad hoc network (VANET). J. Netw. Comput. Appl. 36(3): 1050-1056 (2013) - 2011
- [j6]Emad Eldin Mohamed
, Ezedin Barka:
OMAC: A new access control architecture for overlay multicast communications. Int. J. Commun. Syst. 24(6): 761-775 (2011) - 2010
- [c9]Ezedin E. Barka, Yasser Gadallah:
A role-based protocol for secure multicast communications in mobile ad hoc networks. IWCMC 2010: 701-705 - [c8]Farag M. Sallabi, George Ditsa, Ezedin Barka, Hazem El Khatib:
Business Model for Emerging Real-time Location-based Services - A Technical Perspective. WINSYS 2010: 183-188
2000 – 2009
- 2009
- [j5]Wassim El-Hajj
, Hazem M. Hajj, Ezedin Barka, Zaher Dawy, Omar El Hmaissy, Dima Ghaddar, Youssef Aitour:
Optimal WiMax planning with security considerations. Secur. Commun. Networks 2(5): 401-412 (2009) - [c7]Ezedin E. Barka, Emad Eldin Mohamed:
Securing hierarchical multicast communications using roles. IWCMC 2009: 101-105 - 2008
- [j4]Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed Anis Benelbahri:
Firewall filtering rules analysis for anomalies detection. Int. J. Secur. Networks 3(3): 161-172 (2008) - [j3]Ezedin Barka, Abderrahmane Lakas:
Integrating Usage Control with SIP-Based Communications. J. Comput. Networks Commun. 2008: 380468:1-380468:8 (2008) - [c6]Ezedin Barka, Khaled Shuaib, H. Chamas:
Impact of IPSec on the Performance of the IEEE 802.16 Wireless Networks. NTMS 2008: 1-6 - 2007
- [j2]Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas
:
Analysis of the effect of security on data and voice traffic in WLAN. Comput. Commun. 30(11-12): 2468-2477 (2007) - [j1]Ezedin Barka, Mohammed Boulmalf:
On the Impact of Security on the Performance of WLANs. J. Commun. 2(4): 10-17 (2007) - [c5]Ezedin Barka, Ravi S. Sandhu:
Framework for Agent-Based Role Delegation. ICC 2007: 1361-1367 - [c4]Ezedin Barka, Mohammed Boulmalf:
Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g. WCNC 2007: 2691-2697 - 2006
- [c3]Ezedin Barka, Emad Eldin Mohamed, Kadhim Hayawi
:
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices. IWCMC 2006: 1295-1300 - 2004
- [c2]Ezedin Barka, Ravi S. Sandhu:
Role-Based Delegation Model/ Hierarchical Roles (RBDM1). ACSAC 2004: 396-404 - 2000
- [c1]Ezedin Barka, Ravi S. Sandhu:
Framework for Role-based Delegation Models. ACSAC 2000: 168-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint