default search action
Ala Altaweel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Ala Altaweel, Sidra Aslam, Ibrahim Kamel:
Security attacks in Opportunistic Mobile Networks: A systematic literature review. J. Netw. Comput. Appl. 221: 103782 (2024) - [j9]Ala Altaweel, Sidra Aslam, Ibrahim Kamel:
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks. J. Netw. Comput. Appl. 230: 103953 (2024) - [j8]Mohammad Sagor, Amran Haroon, Radu Stoleru, Suman Bhunia, Ala Altaweel, Mengyuan Chao, Liuyi Jin, Maxwell Maurice, Roger Blalock:
DistressNet-NG: A Resilient Data Storage and Sharing Framework for Mobile Edge Computing in Cyber-Physical Systems. ACM Trans. Cyber Phys. Syst. 8(3): 37:1-37:31 (2024) - 2023
- [j7]Ala Altaweel, Hena Mukkath, Ibrahim Kamel:
GPS Spoofing Attacks in FANETs: A Systematic Literature Review. IEEE Access 11: 55233-55280 (2023) - [j6]Hasan Idhaim, Yousef Kilani, Ayoub Alsarhan, Mohammad Aljaidi, Ala Altaweel, Ahmed Bouridane, Amjad Aldweesh:
Improving Recommender Systems by a Further Factorization of the Factor Matrices. IEEE Access 11: 91539-91549 (2023) - [j5]Aya Abdul Rahman Al-chikh Omar, Bassel Soudan, Ala Altaweel:
A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things. Internet Things 22: 100750 (2023) - [j4]Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity, Suman Bhunia:
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. IEEE Trans. Dependable Secur. Comput. 20(3): 2516-2532 (2023) - [c8]Sidra Aslam, Ala Altaweel, Ibrahim Kamel:
Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis. EICC 2023: 19-25 - [c7]Sidra Aslam, Ala Altaweel, Ibrahim Kamel:
Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks. IIT 2023: 144-149 - [i3]Sidra Aslam, Ala Altaweel, Ali Bou Nassif:
Optimization Algorithms in Smart Grids: A Systematic Literature Review. CoRR abs/2301.07512 (2023) - 2022
- [j3]Ala Altaweel, Chen Yang, Radu Stoleru, Suman Bhunia, Mohammad Sagor, Maxwell Maurice, Roger Blalock:
RSock: A resilient routing protocol for mobile Fog/Edge networks. Ad Hoc Networks 134: 102926 (2022) - [c6]Suman Bhunia, Radu Stoleru, Amran Haroon, Mohammad Sagor, Ala Altaweel, Mengyuan Chao, Maxwell Maurice, Roger Blalock:
EdgeKeeper: resilient and lightweight coordination for mobile edge computing systems. MobiSys 2022: 577-578 - [i2]Mohammad Sagor, Radu Stoleru, Suman Bhunia, Mengyuan Chao, Amran Haroon, Ala Altaweel, Maxwell Maurice, Roger Blalock:
R-Drive: Resilient Data Storage and Sharing for Mobile Edge Computing Systems. CoRR abs/2204.10823 (2022) - [i1]Suman Bhunia, Radu Stoleru, Mohammad Sagor, Ala Haroon, Ala Altaweel, Mengyuan Chao, Maxwell Maurice, Roger Blalock:
EdgeKeeper: Resilient and Lightweight Coordination for Mobile Edge Computing Systems. CoRR abs/2204.11095 (2022) - 2020
- [j2]Mengyuan Chao, Harsha Chenji, Chen Yang, Radu Stoleru, Evdokia Nikolova, Ala Altaweel:
EAR: Energy-aware risk-averse routing for disaster response networks. Ad Hoc Networks 103: 102167 (2020)
2010 – 2019
- 2019
- [c5]Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity:
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks. CNS 2019: 73-81 - 2017
- [c4]Ala Altaweel, Radu Stoleru, Guofei Gu:
EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures. ICCCN 2017: 1-11 - 2015
- [c3]Ala Altaweel, Radu Stoleru, Subhajit Mandal:
On secure shared key establishment for mobile devices using contextual information. IPCCC 2015: 1-10 - [c2]Subhajit Mandal, Chen Yang, Ala Altaweel, Radu Stoleru:
An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds. WiMob 2015: 627-634 - 2014
- [j1]Amin Hassanzadeh, Ala Altaweel, Radu Stoleru:
Traffic-and-resource-aware intrusion detection in wireless mesh networks. Ad Hoc Networks 21: 18-41 (2014) - 2010
- [c1]Muhammad Adnan Tariq, Boris Koldehofe, Ala Altaweel, Kurt Rothermel:
Providing basic security mechanisms in broker-less publish/subscribe systems. DEBS 2010: 38-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint