default search action
Farag Azzedin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Rakan Alghofaili, Hussah Albinali, Farag Azzedin:
Build-Launch-Consolidate Framework and Toolkit for Impact Analysis on Wireless Sensor Networks. J. Sens. Actuator Networks 13(1): 17 (2024) - [j17]Hussah Albinali, Farag Azzedin:
Toward RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach. IEEE Trans. Netw. Serv. Manag. 21(5): 5215-5238 (2024) - 2023
- [j16]Farag Azzedin:
Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach. IEEE Access 11: 129077-129089 (2023) - [c30]Farag Azzedin, Ibraheem Al-Hejri:
Internet-of-Things Data Security: Challenges, Countermeasures and Opportunities. ICFNDS 2023: 633-640 - [c29]Hussah Albinali, Rakan Alghofaili, Farag Azzedin:
Analytical Study of Local Repair Attack on RPL-Based 6LoWPAN Networks in Internet of Things. ICFNDS 2023: 641-646 - [c28]Farag Azzedin, Mustafa Ghaleb, Yasser El-Alfy, Raed Katib, Md. Hossain:
A Federated Learning Approach to Banking Loan Decisions. ISNCC 2023: 1-7 - 2022
- [j15]Sarah N. Alyami, Randah Alharbi, Farag Azzedin:
Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation. Sensors 22(24): 9825 (2022) - [c27]Farag Azzedin, Ibraheem Alhejri:
A Layered Taxonomy of Internet of Things Attacks. ICFNDS 2022: 631-636 - 2021
- [j14]Mustafa Ghaleb, Farag Azzedin:
Towards Scalable and Efficient Architecture for Modeling Trust in IoT Environments. Sensors 21(9): 2986 (2021) - [c26]Farag Azzedin, Hussah Albinali:
Security in Internet of Things: RPL Attacks Taxonomy. ICFNDS 2021: 820-825 - 2020
- [j13]Farag Azzedin, Salahadin Mohammed, Mustafa Ghaleb, Jaweed Yazdani, Adel Ahmed:
Systematic Partitioning and Labeling XML Subtrees for Efficient Processing of XML Queries in IoT Environments. IEEE Access 8: 61817-61833 (2020)
2010 – 2019
- 2019
- [j12]Farag Azzedin, Mustafa Ghaleb:
Internet-of-Things and Information Fusion: Trust Perspective Survey. Sensors 19(8): 1929 (2019) - [i1]Hafiz ur Rahman, Farag Azzedin, Ahmad Shawahna, Faisal Sajjad, Alyahya Saleh Abdulrahman:
Performance Evaluation of VDI Environment. CoRR abs/1911.01923 (2019) - 2018
- [c25]Basirudin Djamaluddin, Ahmed Alnazeer, Farag Azzedin:
Web Deception Towards Moving Target Defense. ICCST 2018: 1-5 - 2017
- [c24]Farag Azzedin, Husam Suwad, Zaid Alyafeai:
Countermeasureing Zero Day Attacks: Asset-Based Approach. HPCS 2017: 854-857 - 2016
- [j11]Farag Azzedin, Mohammed Onimisi Yahaya:
Modeling BitTorrent choking algorithm using game theory. Future Gener. Comput. Syst. 55: 255-265 (2016) - [j10]Farag Azzedin:
Mitigating the effect of free riders in distributed systems: a trust-based approach. Int. J. Sens. Networks 22(4): 248-258 (2016) - 2014
- [j9]Farag Azzedin:
Taxonomy of reputation assessment in peer-to-peer systems and analysis of their data retrieval. Knowl. Eng. Rev. 29(4): 463-483 (2014) - [c23]Farag Azzedin, Mohammed Onimisi Yahaya:
Analyzing and modeling BitTorrent: A game theory approach. HPCS 2014: 436-443 - [c22]Farag Azzedin, Mohammed Onimisi Yahaya:
BitTorrent vulnerability to free riders: Root causes analysis. HPCS 2014: 978-984 - [c21]Amer AlGhadhban, Ashraf S. Mahmoud, Marwan H. Abu-Amara, Farag Azzedin, Mohammed H. Sqalli:
Interdomain Traffic Engineering Techniques to Overcome Undesirable Connectivity Incidents. NPC 2014: 618-622 - 2013
- [j8]Marwan H. Abu-Amara, Abdulaziz Al-Baiz, Ashraf S. Mahmoud, Mohammed H. Sqalli, Farag Azzedin:
A scalable NAT-based solution to Internet access denial by higher-tier ISPs. Secur. Commun. Networks 6(2): 194-209 (2013) - [c20]Farag Azzedin, Sajjad Mahmood:
A methodology for designing trustworthy e-commerce applications. CTS 2013: 143-148 - [c19]Farag Azzedin:
Towards a scalable HDFS architecture. CTS 2013: 155-161 - [c18]Farag Azzedin, Jaweed Yazdani, Mustafa Ghaleb:
Survey of Disease Outbreak Notification Systems. ICACCI 2013: 787-789 - 2012
- [j7]Farag Azzedin, Khalid Al-Issa:
Handling input/output operations in Web servers: issues and countermeasures. Concurr. Comput. Pract. Exp. 24(7): 699-710 (2012) - 2011
- [c17]Abdulaziz Al-Baiz, Marwan H. Abu-Amara, Ashraf S. Mahmoud, Mohammed H. Sqalli, Farag Azzedin:
Internet access denial by higher-tier ISPS: A NAT-based solution. CCECE 2011: 1004-1008 - [c16]Marwan H. Abu-Amara, Farag Azzedin, Fahd A. Abdulhameed, Ashraf S. Mahmoud, Mohammed H. Sqalli:
Dynamic peer-to-peer (P2P) solution to counter malicious higher Domain Name System (DNS) nameservers. CCECE 2011: 1014-1018 - [c15]Mohammed H. Sqalli, Syed Naeem Firdous, Zubair A. Baig, Farag Azzedin:
An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic. CW 2011: 23-30 - 2010
- [j6]Farag Azzedin, Salman Khwaja:
Towards Trustworthy Peer-To-Peer Environments: An Appraisal Analysis Approach. J. Next Gener. Inf. Technol. 1(1): 61-76 (2010) - [j5]Farag Azzedin:
Classifying and Tracking Free Riders in Multimedia-Based Systems. J. Univers. Comput. Sci. 16(10): 1368-1387 (2010) - [j4]Farag Azzedin, Ahmad Ridha:
Feedback behavior and its role in trust assessment for peer-to-peer systems. Telecommun. Syst. 44(3-4): 253-266 (2010) - [c14]Farag Azzedin, Sajjad Mahmood:
Towards Designing Application Specific Trust Treated Model. CNSA 2010: 548-557 - [c13]Farag Azzedin, Omar Shaaban:
Impact of dishonesty and collusion on free riding in distributed multimedia systems. HPCS 2010: 355-361 - [c12]Farag Azzedin:
Trust-based taxonomy for free riders in distributed multimedia systems. HPCS 2010: 362-369
2000 – 2009
- 2009
- [c11]Farag Azzedin, Khalid Al-Issa:
A self-adapting Web server architecture: Towards higher performance and better utilization. HPCS 2009: 96-105 - 2008
- [c10]Farag Azzedin, Ahmad Ridha:
Performance Evaluation of Recommendation Retrieval in Peer-to-Peer Networks. ISPA 2008: 614-619 - [c9]Farag Azzedin, Ahmad Ridha:
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. PST 2008: 145-150 - [c8]Farag Azzedin, Ahmad Ridha:
Recommendation Retrieval in Reputation Assessment for Peer-to-Peer Systems. STM@IFIPTM 2008: 13-25 - 2006
- [j3]Farag Azzedin, Muthucumaru Maheswaran, Arindam Mitra:
Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids. J. Grid Comput. 4(3): 247-263 (2006) - [c7]Emad A. El-Sebakhy, Kanaan A. Faisal, Tarek Helmy, Farag Azzedin, A. Al-Suhaim:
Evaluation of Breast Cancer Tumor Classification with Unconstrained Functional Networks Classifier. AICCSA 2006: 281-287 - 2004
- [j2]Farag Azzedin, Muthucumaru Maheswaran, Neil Arnason:
A Synchronous Co-Allocation Mechanism for Grid Computing Systems. Clust. Comput. 7(1): 39-49 (2004) - [c6]Farag Azzedin, Muthucumaru Maheswaran:
A Trust Brokering System and Its Application to Resource Management in Public-Resource Grids. IPDPS 2004 - 2003
- [c5]Farag Azzedin, Muthucumaru Maheswaran:
Trust Modeling for Peer-to-Peer Based Computing Systems. IPDPS 2003: 99 - 2002
- [j1]Mauro Migliardi, Muthucumaru Maheswaran, Balasubramaniam Maniymaran, Paul Card, Farag Azzedin:
Mobile interfaces to computational, data, and service grid systems. ACM SIGMOBILE Mob. Comput. Commun. Rev. 6(4): 71-73 (2002) - [c4]Farag Azzedin, Muthucumaru Maheswaran:
Towards Trust-Aware Resource Management in Grid Computing Systems. CCGRID 2002: 452-457 - [c3]Muthucumaru Maheswaran, Balasubramaneyam Maniymaran, Paul Card, Farag Azzedin:
Invisible Network: Concepts and Architecture. CCGRID 2002: 464-469 - [c2]Muthucumaru Maheswaran, Balasubramaneyam Maniymaran, Paul Card, Farag Azzedin:
MetaGrid: A Scalable Framework for Wide-Area Service Deployment and Management . HPCS 2002: 61-70 - [c1]Farag Azzedin, Muthucumaru Maheswaran:
Integrating Trust into Grid Resource Management Systems. ICPP 2002: 47-54
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint