S. Tabet, A. Kayssi and I. H. Elhajj, "Adaptive Mobile Diminished Reality Framework for 3D Visual Privacy," in Proc. 2024 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, May 2024. https://doi.org/10.1109/ISCV60512.2024.10620084Â
S. Tabet, A. Kayssi, and I. H. Elhajj, "Mobile Diminished Reality for Preserving 3D Visual Privacy," in Proc. 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA), Tartu, Estonia, September 2023. https://doi.org/10.1109/iMETA59369.2023.10294436Â
H. E. Karhani, R. A. Jamal, Y. B. Samra, I. H. Elhajj and A. Kayssi, "Phishing and Smishing Detection Using Machine Learning," in Proc. 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, August 2023. https://doi.org/10.1109/CSR57506.2023.10224954Â
R. Nassar, I. H. Elhajj, A. Kayssi and S. Salam, "Feature Relevance in NAT Detection Using Explainable AI," in Proc. 2023 IEEE Symposium on Computers and Communications (ISCC), Gammarth, Tunisia, July 2023. https://doi.org/10.1109/ISCC58397.2023.10217968Â
R. Nassar, I. H. Elhajj, A. Kayssi and S. Salam, "A Generalizable Machine Learning Model for NAT Detection," in Proc. 2023 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS), Valencia, Spain, June 2023. https://doi.org/10.1109/ICCNS58795.2023.10193410Â
O. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, "Mutated Traffic Detection and Recovery: An Adversarial Generative Deep Learning Approach," Annals of Telecommunications, pp. 1-12, April 2022. https://doi.org/10.1007/s12243-022-00909-8
O. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, "Towards Efficient Real-Time Traffic Classifier: A Confidence Measure with Ensemble Deep Learning," Computer Networks, vol. 204, February 2022. https://doi.org/10.1016/j.comnet.2021.108684
S. Abdallah, A. Kayssi, I. H. Elhajj, and A. Chehab, "Centralization vs. De-Centralization: Where Does the Network Control Plane Stand?," in Proc. Eighth International Conference on Software Defined Systems (SDS), Gandia, Spain, December 2021. https://doi.org/10.1109/SDS54264.2021.9731848
R. Nassar, I. H. Elhajj, A. Kayssi, and S. Salam, "Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach," in Proc. ACS/IEEE International Conference on Computer Systems and Applications, Tangier, Morocco, November 2021. https://doi.org/10.1109/AICCSA53542.2021.9686910
L. Chaddad, A. Chehab, I. H. Elhajj, and A. Kayssi, "Optimal Packet Camouflage Against Traffic Analysis," ACM Transactions on Privacy and Security, vol. 24, no. 3, pp. 1-23, August 2021. https://doi.org/10.1145/3442697
L. Chaddad, A. Chehab, and A. Kayssi, "OPriv: Optimizing Privacy Protection for Network Traffic," Journal of Sensor and Actuator Networks, vol. 10, no. 3, June 2021. https://doi.org/10.3390/jsan10030038
A. Hussein, A. Chehab, A. Kayssi, and I. H. Elhajj, "An Artificial Intelligence Resiliency System (ARS)," in: Hassanien AE., Taha M.H.N., Khalifa N.E.M. (eds) Enabling AI Applications in Data Science. Studies in Computational Intelligence, vol. 911, September 2020. https://doi.org/10.1007/978-3-030-52067-0_28
O. Salman, I. H. Elhajj, A. Kayssi, and A. Chehab, "Data Representation for CNN Based Internet Traffic Classification: A Comparative Study," Multimedia Tools and Applications, pp. 1-27, August 2020. https://doi.org/10.1007/s11042-020-09459-4
O. Salman, I. H. Elhajj, A. Kayssi, and A. Chehab, "A Review on Machine Learning-Based Approaches for Internet Traffic Classification," Annals of Telecommunications, pp. 1-38, June 2020. https://doi.org/10.1007/s12243-020-00770-7
L. Chaddad, A. Chehab, I. H. Elhajj, and A. Kayssi, "Network Obfuscation for Network Security," in Proc. Seventh International Conference on Software Defined Systems (SDS), pp. 83-88, Paris, France, April 2020. https://doi.org/10.1109/SDS49854.2020.9143919
O. Salman, I. H. Elhajj, A. Kayssi, and A. Chehab, "Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery," in Proc. International Conference on Machine Learning for Networking, pp. 99-116, December 2019. https://doi.org/10.1007/978-3-030-45778-5_8
F. Saab, I. H. Elhajj, A. Kayssi, and A. Chehab, "Modelling Cognitive Bias in Crowdsourcing Systems," Cognitive Systems Research, vol. 58, pp. 1-18, December 2019. https://doi.org/10.1016/j.cogsys.2019.04.004
L. Chaddad, A. Chehab, I. H. Elhajj, and A. Kayssi, "AdaptiveMutate: A Technique for Privacy Preservation," Digital Communications and Networks, vol. 5, no. 4, pp. 245-255, November 2019. https://doi.org/10.1016/j.dcan.2019.09.002
O. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, "A Machine Learning Based Framework for IoT Device Identification and Abnormal Traffic Detection," Transactions on Emerging Communications Technologies, pp. e3743, September 2019. https://doi.org/10.1002/ett.3743
A. Hussein, L. Chaddad, N. Adelian, A. Chehab, I. H. Elhajj, and A. Kayssi, "Software-Defined Networking (SDN): The Security Review," Journal of Cyber Security Technology, pp. 1-66, August 2019. https://doi.org/10.1080/23742917.2019.1629529
R. Mouawi, I. H. Elhajj, A. Chehab, and A. Kayssi, "Crowdsourcing for Click Fraud Detection," EURASIP Journal on Information Security, vol. 2019, no. 11, July 2019. https://doi.org/10.1186/s13635-019-0095-1
S. Abdallah, A. Kayssi, I. H. Elhajj, and A. Chehab, "Performance Analysis of SDN vs OSPF in Diverse Network Environments," Concurrency and Computation: Practice and Experience, pp. e5410, June 2019. https://doi.org/10.1002/cpe.5410
A. Hussein, O. Salman, A. Chehab, I. H. Elhajj, and A. Kayssi, "Machine Learning for Network Resiliency and Consistency," in Proc. Sixth International Conference on Software Defined Systems (SDS), pp. 146-153, Rome, Italy, June 2019. https://doi.org/10.1109/SDS.2019.8768668
L. Chaddad, A. Chehab, I. H. Elhajj, and A. Kayssi, "Mobile Traffic Anonymization Through Probabilistic Distribution," in Proc. 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp. 242-248, Paris, France, February 2019. https://doi.org/10.1109/ICIN.2019.8685871
O. Salman, I. Elhajj, A. Chehab, and A. Kayssi, "A Multi-level Internet Traffic Classifier Using Deep Learning," in Proc. 9th International Conference on the Network of the Future (NOF), pp. 68-75, Poznan, Poland, November 2018. https://doi.org/10.1109/NOF.2018.8598055
R. Mouawi, M. Awad, A. Chehab, I. Elhajj, and A. Kayssi, "Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing," in Proc. International Conference on Innovations in Information Technology, pp. 88-92, Al-Ain, UAE, November 2018. https://doi.org/10.1109/INNOVATIONS.2018.8605973
S. Abdallah, A. Kayssi, I. Elhajj, and A. Chehab, "Adaptive Optimization for Hybrid Network Control Planes," in Proc. IEEE/ACS 15th International Conference on Computer Systems and Applications (AICSSA), pp. 1-8, Aqaba, Jordan, October 2018. https://doi.org/10.1109/AICCSA.2018.8612869
O. Salman, I. Elhajj, A. Chehab, and A. Kayssi, "IoT survey: An SDN and Fog Computing Perspective," Computer Networks, vol. 143, pp. 221-246, October 2018. https://doi.org/10.1016/j.comnet.2018.07.020
V. Seferian, R. Kanj, A. Chehab, and A. Kayssi, "Identity Based Key Distribution Framework for Link Layer Security of AMI Networks," IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 3166-3179, July 2018. https://doi.org/10.1109/TSG.2016.2628090
G. Ajaeiya, I. H. Elhajj, A. Chehab, A. Kayssi, and M. Kneppers, "Mobile Apps Identification Based on Network Flows," Knowledge and Information Systems, vol. 55, no. 3, pp. 771-796, June 2018. https://doi.org/10.1007/s10115-017-1111-8
M. Shamseddine, W. Itani, A. Chehab, and A. Kayssi, "Network Programming and Probabilistic Sketching for Securing the Data Plane," Security and Communication Networks, vol. 2018, pp. 1-23, June 2018. https://doi.org/10.1155/2018/2905730
L. Chaddad, A. Chehab, I. Elhajj, and A. Kayssi, "App Traffic Mutation: Toward Defending against Mobile Statistical Traffic Analysis," in Proc. IEEE INFOCOM - IEEE Conference on Computer Communications Workshops, pp. 27-32, Honolulu, Hawaii, April 2018. https://doi.org/10.1109/INFCOMW.2018.8406899
A. Hussein, A. Chehab, A. Kayssi, and I. Elhajj, "Machine Learning for Network Resilience: The Start of a Journey," in Proc. Fifth International Conference on Software Defined Systems (SDS), pp. 59-66, Barcelona, Spain, April 2018. https://doi.org/10.1109/SDS.2018.8370423
S. Abdallah, A. Kayssi, I. Elhajj, and A. Chehab, "Network Convergence in SDN versus OSPF Networks," in Proc. Fifth International Conference on Software Defined Systems (SDS), pp. 130-137, Barcelona, Spain, April 2018. https://doi.org/10.1109/SDS.2018.8370434
O. Salman, L. Chaddad, I. Elhajj, A. Chehab, and A. Kayssi, "Pushing Intelligence to the Network Edge," in Proc. Fifth International Conference on Software Defined Systems (SDS), pp. 87-92, Barcelona, Spain, April 2018. https://doi.org/10.1109/SDS.2018.8370427
A. Hussein, A. Kayssi, I. Elhajj, and A. Chehab, "SDN for QUIC: An Enhanced Architecture with Improved Connection Establishment," in Proc. 33rd Annual ACM Symposium on Applied Computing, pp. 2136-2139, Pau, France, April 2018. https://doi.org/10.1145/3167132.3167438
S. Abdallah, I. Elhajj, A. Chehab, and A. Kayssi, "A Network Management Framework for SDN," in Proc. 9th IFIP International Conference on New Technologies, Mobility and Security, pp. 1-4, Paris, France, February 2018. https://doi.org/10.1109/NTMS.2018.8328672
L. A. Chaddad, A. Chehab, I. Elhajj, and A. Kayssi, "Power-Aware Workload Allocation for Green Data Centers," Management of Environmental Quality: An International Journal, vol. 29, no. 4, pp. 678-703, 2018. https://doi.org/10.1108/MEQ-11-2017-0146
O. Salman, I. Elhajj, A. Chehab, and A. Kayssi, "QoS Guarantee over Hybrid SDN/non-SDN Networks," in Proc. 8th International Conference on the Network of the Future (NOF), pp. 141-143, London, UK, November 2017. https://doi.org/10.1109/NOF.2017.8251237
H. Ammar, Y. Nasser, and A. Kayssi, "Dynamic SDN Controllers-Switches Mapping for Load Balancing and Controller Failure Handling," in Proc. 14th International Symposium on Wireless Communication Systems (ISWCS), pp. 216-221, Bologna, Italy, August 2017. https://doi.org/10.1109/ISWCS.2017.8108113
A. Hussein, O. Salman, S. Abdallah, I. Elhajj, A. Chehab, and A. Kayssi, "SDN and Edge Computing: Key Enablers Toward the 5G Evolution," in Access, Fronthaul and Backhaul Networks for 5G and Beyond (Eds. M. A. Imran, S. A. R. Zaidi and M. Z. Shakir), chapt. 16, pp. 389-418, August 2017. https://doi.org/10.1049/PBTE074E_ch16
G. Ajaeiya, N. Adalian, I. H. Elhajj, A. Kayssi, and A. Chehab, "Flow-Based Intrusion Detection System for SDN," in Proc. IEEE Symposium on Computers and Communications (ISCC), pp. 787-793, Heraklion, Greece, July 2017. https://doi.org/10.1109/ISCC.2017.8024623
S. Malek, S. Abdallah, A. Chehab, I. H. Elhajj, and A. Kayssi, "Low-Power and High-Speed Shift-Based Multiplier for Error Tolerant Applications," Microprocessors and Microsystems, vol. 52, pp. 566-574, July 2017. https://doi.org/10.1016/j.micpro.2017.07.002
S. Abdallah, I. H. Elhajj, A. Chehab, and A. Kayssi, "Fuzzy Decision System for Technology Choice in Hybrid Networks," in Proc. Fourth International Conference on Software Defined Systems, pp. 106-111, Valencia, Spain, May 2017. https://doi.org/10.1109/SDS.2017.7939149
O. Salman, A. Kayssi, A. Chehab, and I. Elhajj, "Multi-Level Security for the 5G/IoT Ubiquitous Network," in Proc. Second International Conference on Fog and Mobile Edge Computing (FMEC), pp. 188-193, Valencia, Spain, May 2017. https://doi.org/10.1109/FMEC.2017.7946429
A. Hussein, I. Elhajj, A. Chehab, and A. Kayssi, "SDN for MPTCP: An Enhanced Architecture for Large Data Transfers in Datacenters," in Proc. IEEE International Conference on Communications (ICC), pp. 1-7, Paris, France, May 2017. https://doi.org/10.1109/ICC.2017.7996653
A. Hussein, I. Elhajj, A. Chehab, and A. Kayssi, "SDN VANETs in 5G: An Architecture for Resilient Security Services," in Proc. Fourth International Conference on Software Defined Systems, pp. 67-74, Valencia, Spain, May 2017. https://doi.org/10.1109/SDS.2017.7939143
O. Salman, I. Elhajj, A. Chehab, and A. Kayssi, "Software Defined IoT Security Framework," in Proc. Fourth International Conference on Software Defined Systems, pp. 75-80, Valencia, Spain, May 2017. https://doi.org/10.1109/SDS.2017.7939144
M. Shamseddine, W. Itani, A. Kayssi, and A. Chehab, "Virtualized Network Views for Localizing Misbehaving Sources in SDN Data Planes," in Proc. IEEE International Conference on Communications (ICC), pp. 1-7, Paris, France, May 2017. https://doi.org/10.1109/ICC.2017.7997296
K. Hamandi, J. Bou Abdo, I. H. Elhajj, A. Kayssi, and A. Chehab, "A Privacy-Enhanced Computationally-Efficient and Comprehensive LTE-AKA," Computer Communications, vol. 98, pp. 20-30, January 2017. https://doi.org/10.1016/j.comcom.2016.09.009
M. Shamseddine, A. Chehab, A. Kayssi, and W. Itani, "On-Demand Network Virtualization and Provisioning Services in SDN-Driven Cloud Platforms," in Network-as-a-Service for Next Generation Internet (Eds. Q. Duan and S. Wang), chapt. 13, pp. 313-338, 2017. https://doi.org/10.1049/PBTE073E_ch13
W. Itani, A. Kayssi, and A. Chehab, "Wireless Body Sensor Networks: Security, Privacy, and Energy Efficiency in the Era of Cloud Computing," International Journal of Reliable and Quality E-Healthcare, vol. 5, no. 2, pp. 1-30, April-June 2016. https://doi.org/10.4018/IJRQEH.2016040101
O. Salman, M. Awad, F. Saab, I. Elhajj, A. Chehab, and A. Kayssi, "A Game-Theoretic Approach to Resource Allocation in the Cloud," in Proc. IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 132-137, Beirut, Lebanon, November 2016. https://doi.org/10.1109/IMCET.2016.7777440
M. Shamseddine, I. Elhajj, A. Chehab, and A. Kayssi, "A Virtual QoS-Adaptive Network Connectivity Service: an SDN Approach," in Proc. IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 92-96, Beirut, Lebanon, November 2016. https://doi.org/10.1109/IMCET.2016.7777433
O. Salman, R. Morcel, O. Al Zoubi, I. Elhajj, A. Kayssi, and A. Chehab, "Analysis of Topology Based Routing Protocols for VANETs in Different Environments," in Proc. IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 27-31, Beirut, Lebanon, November 2016. https://doi.org/10.1109/IMCET.2016.7777421
N. Adalian, G. Ajaeiya, Z. Dawy, I. Elhajj, A. Kayssi, and A. Chehab, "Load Balancing in LTE Core Networks Using SDN," in Proc. IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 213-217, Beirut, Lebanon, November 2016. https://doi.org/10.1109/IMCET.2016.7777454
A. Hussein, I. H. Elhajj, A. Chehab, and A. Kayssi, "Securing Diameter: Comparing TLS, DTLS, and IPSec," in Proc. IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 1-8, Beirut, Lebanon, November 2016. https://doi.org/10.1109/IMCET.2016.7777417
R. Morcel, H. Sarieddeen, I. H. Elhajj, A. Kayssi, and A. Chehab, "Proactive Channel Allocation for Multimedia Applications over CSMA/CA-Based CRNs," in Proc. International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), pp. 178-183, Zouk Mosbeh, Lebanon, July 2016. https://doi.org/10.1109/ACTEA.2016.7560135
O. Salman, S. Abdallah, I. H. Elhajj, A. Chehab, and A. Kayssi, "Identity-Based Authentication Scheme for the Internet of Things," in Proc. 21st IEEE Symposium on Computers and Communications (ISCC), pp. 1109-1111, Messina, Italy, June 2016. https://doi.org/10.1109/ISCC.2016.7543884
F. Saab, A. Kayssi, I. Elhajj, and A. Chehab, "Playing with Sybil," ACM SIGAPP Applied Computing Review, vol. 16, no. 2, pp. 16-25, June 2016. https://doi.org/10.1145/2993231.2993233
A. Hussein, I. H. Elhajj, A. Chehab, and A. Kayssi, "SDN Verification Plane for Consistency Establishment," in Proc. 21st IEEE Symposium on Computers and Communications (ISCC), pp. 519-524, Messina, Italy, June 2016. https://doi.org/10.1109/ISCC.2016.7543791
F. Saab, I. Elhajj, A. Kayssi, and A. Chehab, "A Crowdsourcing Game-Theoretic Intrusion Detection and Rating System," in Proc. 31st ACM Symposium on Applied Computing, pp. 622-625, Pisa, Italy, April 2016. https://doi.org/10.1145/2851613.2851933
L. Shaer, T. Sakakini, R. Kanj, A. Chehab, and A. Kayssi, "A Low Power Reconfigurable LFSR," in Proc. IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 1-4, Limassol, Cyprus, April 2016. https://doi.org/10.1109/MELCON.2016.7495422
M. Shamseddine, I. Elhajj, A. Chehab, A. Kayssi, and W. Itani, "NCaaS: Network Configuration as a Service in SDN-Driven Cloud Architectures," in Proc. 31st ACM Symposium on Applied Computing, pp. 448-454, Pisa, Italy, April 2016. https://doi.org/10.1145/2851613.2851629
O. Salman, I. Elhajj, A. Kayssi, and A. Chehab, "SDN Controllers: A Comparative Study," in Proc. IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 1-6, Limassol, Cyprus, April 2016. https://doi.org/10.1109/MELCON.2016.7495430
A. Hussein, I. H. Elhajj, A. Chehab, and A. Kayssi, "SDN Security Plane: An Architecture for Resilient Security Services," in Proc. IEEE International Conference on Cloud Engineering Workshops (IC2EW), pp. 54-59, Berlin, Germany, April 2016. https://doi.org/10.1109/IC2EW.2016.15
F. Saab, A. Kayssi, I. Elhajj, and A. Chehab, "Solving Sybil Attacks Using Evolutionary Game Theory," in Proc. 31st ACM Symposium on Applied Computing, pp. 2195-2201, Pisa, Italy, April 2016. https://doi.org/10.1145/2851613.2851848
M. Shamseddine, I. Elhajj, A. Chehab, and A. Kayssi, "VNCS: Virtual Network Connectivity as a Service A Software-Defined Networking Approach," in Proc. IEEE International Conference on Cloud Engineering Workshops (IC2EW), pp. 30-35, Berlin, Germany, April 2016. https://doi.org/10.1109/IC2EW.2016.37
O. Salman, I. H. Elhajj, A. Kayssi, and A. Chehab, "Edge Computing Enabling the Internet of Things," in Proc. IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 603-608, Milan, Italy, December 2015. https://doi.org/10.1109/WF-IoT.2015.7389122
S. A. Saab, F. Saab, A. Kayssi, A. Chehab, and I. H. Elhajj, "Partial Mobile Application Offloading to the Cloud for Energy-Efficiency with Security Measures," Sustainable Computing: Informatics and Systems, vol. 8, pp. 38-46, December 2015. https://doi.org/10.1016/j.suscom.2015.09.002
O. Salman, I. Elhajj, A. Kayssi, and A. Chehab, "An Architecture for the Internet of Things with Decentralized Data and Centralized Control," in Proc. 12th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 1-8, Marrakesh, Morocco, November 2015. https://doi.org/10.1109/AICCSA.2015.7507265
R. Mouawi, I. H. Elhajj, A. Chehab, and A. Kayssi, "Comparison of in-App Ads Traffic in Different Ad Networks," in Proc. 11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 581-587, Abu Dhabi, UAE, October 2015. https://doi.org/10.1109/WiMOB.2015.7348014
W. Itani, C. Ghali, A. Kayssi, A. Chehab, and I. Elhajj, "G-Route: An Energy-Aware Service Routing Protocol for Green Cloud Computing," Cluster Computing, vol. 18, no. 2, pp. 889-908, March 2015. https://doi.org/10.1007/s10586-015-0443-y
A. Tajeddine, A. Kayssi, A. Chehab, I. Elhajj, and W. Itani, "CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks," Sensors, vol. 15, no. 2, pp. 3299-3333, February 2015. https://doi.org/10.3390/s150203299
H. M. Dermanilian, F. Saab, I. H. Elhajj, A. Kayssi, and A. Chehab, "Energy-Efficient Security for Voice over IP," International Journal of Network Security, vol. 17, no. 1, pp. 7-22, January 2015. https://doi.org/10.6633/IJNS.201501.17(1).02
W. Itani, A. Kayssi, and A. Chehab, "Efficient Healthcare Integrity Assurance in the Cloud with Incremental Cryptography and Trusted Computing," in Cloud Technology: Concepts, Methodologies, Tools, and Applications, vol. 2, chapt. 39, pp. 845-857, 2015. https://doi.org/10.4018/978-1-4666-6539-2.ch039
K. Hamandi, A. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, "Messaging Attacks on Android: Vulnerabilities and Intrusion Detection," Mobile Information Systems, vol. 2015, pp. 1-13, 2015. https://doi.org/10.1155/2015/746930
K. Bakhit, S. Taleb, A. Kayssi, I. Elhajj, and A. Chehab, "CAVE: Hybrid Approach for In-Network Content Caching," in Proc. 14th IEEE International Conference on Scalable Computing and Communications (ScalCom), pp. 649-654, Bali, Indonesia, December 2014. https://doi.org/10.1109/UIC-ATC-ScalCom.2014.54
K. Bakhit, C. Chalouhi, S. Francis, S. Mourad, I. Elhajj, A. Kayssi, and A. Chehab, "3G to Wi-Fi Offloading on Android," in Proc. 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 247-252, Doha, Qatar, November 2014. https://doi.org/10.1109/AICCSA.2014.7073205
F. Saab, I. Elhajj, A. Chehab, and A. Kayssi, "CrowdApp: Crowdsourcing for Application Rating," in Proc. 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 551-556, Doha, Qatar, November 2014. https://doi.org/10.1109/AICCSA.2014.7073247
K. Bakhit, I. Elhajj, A. Chehab, and A. Kayssi, "DAGGER: Distributed Architecture for Granular Mitigation of Mobile Based Attacks," in Proc. 11th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 259-265, Doha, Qatar, November 2014. https://doi.org/10.1109/AICCSA.2014.7073207
A. Salman, I. Elhajj, A. Chehab, and A. Kayssi, "Mobile Malware Exposed," in Proc. IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), pp. 253-258, Doha, Qatar, November 2014. https://doi.org/10.1109/AICCSA.2014.7073206
V. Seferian, R. Kanj, A. Chehab, and A. Kayssi, "PUF and ID-Based Key Distribution Security Framework for Advanced Metering Infrastructures," in Proc. IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 933-938, Venice, Italy, November 2014. https://doi.org/10.1109/SmartGridComm.2014.7007768
J. Loutfi, A. Chehab, I. Elhajj, and A. Kayssi, "Smartphone Sensors as Random Bit Generators," in Proc. IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), pp. 773-780, Doha, Qatar, November 2014. https://doi.org/10.1109/AICCSA.2014.7073279
M. Dabbagh, H. Hajj, W. El-Hajj, M. Mansour, A. Kayssi, and A. Chehab, "An Energy-Aware Design Methodology Based on Kernel Optimizations," International Journal of Autonomous and Adaptive Communications Systems, vol. 7, no. 3, pp. 271-294, October 2014. https://doi.org/10.1504/IJAACS.2014.065197
M. Dabbagh, N. Sayegh, A. Kayssi, I. Elhajj, and A. Chehab, "Fast Dynamic Internet Mapping," Future Generation Computer Systems, vol. 39, pp. 55-66, October 2014. https://doi.org/10.1016/j.future.2014.04.006
S. I. Khaddaj, D. A. Fares, M. K. Joujou, K. Y. Kabalan, and A. Kayssi, "How Best You Can Utilize Your Computer to Tackle Engineering Problems," International Journal of Information and Education Technology, vol. 4, no. 5, pp. 405-410, October 2014. https://doi.org/10.7763/IJIET.2014.V4.439
F. Saab, I. H. Elhajj, A. Kayssi, and A. Chehab, "Profiling of HEVC Encoder," Electronics Letters, vol. 50, no. 15, pp. 1061-1063, July 2014. https://doi.org/10.1049/el.2014.1010
M. Jaber, N. Kouzayha, Z. Dawy, and A. Kayssi, "On Cellular Network Planning and Operation with M2M Signalling and Security Considerations," in Proc. IEEE International Conference on Communications (ICC) Workshop on M2M Communications for Next Generation IoT, pp. 429-434, Sydney, Australia, June 2014. https://doi.org/10.1109/ICCW.2014.6881236
J. Bou Abdo, I. Sarji, I. H. Elhajj, A. Chehab, and A. Kayssi, "Application-Aware Fast Dormancy in LTE," in Proc. 28th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 194-201, Victoria, Canada, May 2014. https://doi.org/10.1109/AINA.2014.28
A. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, "DAIDS: An Architecture for Modular Mobile IDS," in Proc. IEEE 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 328-333, Victoria, Canada, May 2014. https://doi.org/10.1109/WAINA.2014.54
A. Mukaddam, I. Elhajj, A. Kayssi, and A. Chehab, "IP Spoofing Detection Using Modified Hop Count," in Proc. IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 512-516, Victoria, Canada, May 2014. https://doi.org/10.1109/AINA.2014.62
G. Touma, R. Kanj, R. Joshi, A. Kayssi, and A. Chehab, "Robust Bias Temperature Instability Refresh Design and Methodology for Memory Cell Recovery," in Proc. IEEE International Conference on Integrated Circuit Design and Technology (ICICDT), pp. 1-4, Austin, Texas, May 2014. https://doi.org/10.1109/ICICDT.2014.6838603
W. Itani, A. Kayssi, and A. Chehab, "ALPS: The Accountable Cloud Protocol Stack," in Proc. 4th International Conference on Cloud Computing and Services Science (CLOSER), pp. 467-475, Barcelona, Spain, April 2014. https://www.dropbox.com/s/rspl6j22waczuok/p03.pdf
A. Tajeddine, A. Kayssi, A. Chehab, and I. Elhajj, "Authentication Schemes for Wireless Sensor Networks," in Proc. 17th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 367-372, Beirut, Lebanon, April 2014. https://doi.org/10.1109/MELCON.2014.6820562
F. Saab, I. H. Elhajj, A. Kayssi, and A. Chehab, "Energy Analysis of HEVC Compression with Stochastic Processing," in Proc. 17th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 170-176, Beirut, Lebanon, April 2014. https://doi.org/10.1109/MELCON.2014.6820526
N. Sayegh, I. H. Elhajj, A. Kayssi, and A. Chehab, "SCADA Intrusion Detection System Based on Temporal Behavior of Frequent Patterns," in Proc. 17th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 432-438, Beirut, Lebanon, April 2014. https://doi.org/10.1109/MELCON.2014.6820573
W. Itani, C. Ghali, R. Bassil, A. Kayssi, and A. Chehab, "ServBGP: BGP-Inspired Autonomic Service Routing for Multi-Provider Collaborative Architectures in the Cloud," Future Generation Computer Systems, vol. 32, no. 1, pp. 99-117, March 2014. https://doi.org/10.1016/j.future.2012.05.013
S. Francis, R. Kanj, R. Joshi, A. Kayssi, and A. Chehab, "Statistical Methodology for Modeling Non-IID Memory Fail Events," in Proc. Fifteenth International Symposium on Quality Electronic Design (ISQED), pp. 205-211, Santa Clara, California, March 2014. https://doi.org/10.1109/ISQED.2014.6783326
A. Atassi, I. H. Elhajj, A. Chehab, and A. Kayssi, "Intrusion Detection for SCADA Systems," in The State of the Art in Intrusion Prevention and Detection (Ed. Al-Sakib Khan Pathan), chapt. 9, pp. 228-249, January 2014. https://doi.org/10.1201/b16390
W. Itani, C. Ghali, A. Kayssi, and A. Chehab, "Reputation as a Service: A System for Ranking Service Providers in Cloud Systems," in Security, Privacy and Trust in Cloud Systems (Eds. S. Nepal & M. Pathan), chapt. 13, pp. 375-406, 2014. https://doi.org/10.1007/978-3-642-38586-5_13
J. Awed, I. H. Elhajj, A. Chehab, and A. Kayssi, "Perception-aware Packet-loss Resilient Compression for Networked Haptic Systems," Computer Communications, vol. 36, no. 15/16, pp. 1621-1628, September-October 2013. https://doi.org/10.1016/j.comcom.2013.06.006
S. A. Saab, A. Chehab, and A. Kayssi, "Energy Efficiency in Mobile Cloud Computing: Total Offloading Selectively Works. Does Selective Offloading Totally Work?," in Proc. 4th International Conference on Energy Aware Computing Systems & Applications (ICEAC), pp. 164-168, Istanbul, Turkey, December 2013. https://doi.org/10.1109/ICEAC.2013.6737657
F. Saab, I. H. Elhajj, A. Chehab, and A. Kayssi, "Energy-Efficient HEVC Using Stochastic Processing," in Proc. 4th International Conference on Energy Aware Computing Systems & Applications (ICEAC), pp. 152-157, Istanbul, Turkey, December 2013. https://doi.org/10.1109/ICEAC.2013.6737655
I. Abdelghany, W. Saab, T. Sakakini, A. Yassine, A. Chehab, A. Kayssi, and I. H. Elhajj, "Energy-Efficient Truncated Multipliers," in Proc. 4th International Conference on Energy Aware Computing Systems & Applications (ICEAC), pp. 34-39, Istanbul, Turkey, December 2013. https://doi.org/10.1109/ICEAC.2013.6737633
I. Abdelghany, W. Saab, T. Sakakini, A. Yassine, A. Chehab, A. Kayssi, and I. H. Elhajj, "Energy-Efficient Truncated Multipliers with Scaling," in Proc. 8th IEEE International Design and Test Symposium (IDT), pp. 1-6, Marrakesh, Morocco, December 2013. https://doi.org/10.1109/IDT.2013.6727101
L. Shaer, I. Nahlus, J. Merhi, A. Kayssi, and A. Chehab, "Low-Power Digital Signal Processor Design for a Hearing Aid," in Proc. 4th International Conference on Energy Aware Computing Systems & Applications (ICEAC), pp. 40-44, Istanbul, Turkey, December 2013. https://doi.org/10.1109/ICEAC.2013.6737634
W. Itani, A. Kayssi, and A. Chehab, "SNUAGE: An Efficient Platform-as-a-Service Security Framework for the Cloud," Cluster Computing, vol. 16, no. 4, pp. 707-724, December 2013. https://doi.org/10.1007/s10586-012-0223-x
S. Abdallah, A. Chehab, A. Kayssi, and I. H. Elhajj, "TABSH: Tag-Based Stochastic Hardware," in Proc. 4th International Conference on Energy Aware Computing Systems & Applications (ICEAC), pp. 115-120, Istanbul, Turkey, December 2013. https://doi.org/10.1109/ICEAC.2013.6737648
F. Hamady, A. Kayssi, A. Chehab, and N. Gupte, "Effects of Workload Variation on the Energy Distribution in a Mobile Platform," Microprocessors and Microsystems, vol. 37, no. 8, pp. 1192-1199, November 2013. https://doi.org/10.1016/j.micpro.2013.08.003
R. Bassil, I. H. Elhajj, A. Chehab, and A. Kayssi, "A Resource Reservation Attack against LTE Networks," in Proc. Third International Conference on Communications and Information Technology (ICCIT), pp. 262-268, Beirut, Lebanon, June 2013. https://doi.org/10.1109/ICCITechnology.2013.6579561
W. Itani, C. Ghali, A. Chehab, A. Kayssi, and I. Elhajj, "Accountable Energy Monitoring for Green Service Routing in the Cloud," in Proc. Third International Conference on Communications and Information Technology (ICCIT), pp. 103-108, Beirut, Lebanon, June 2013. https://doi.org/10.1109/ICCITechnology.2013.6579531
N. Sayegh, A. Chehab, I. H. Elhajj, and A. Kayssi, "Internal Security Attacks on SCADA Systems," in Proc. Third International Conference on Communications and Information Technology (ICCIT), pp. 22-27, Beirut, Lebanon, June 2013. https://doi.org/10.1109/ICCITechnology.2013.6579516
K. Baraka, M. Ghobril, S. Malek, R. Kanj, and A. Kayssi, "Low Cost Arduino/Android-Based Energy-Efficient Home Automation System with Smart Task Scheduling," in Proc. Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 296-301, Madrid, Spain, June 2013. https://doi.org/10.1109/CICSYN.2013.47
A. Atassi, I. Sarji, A. Kayssi, A. Chehab, and I. H. Elhajj, "Low Overhead Anonymous Routing," in Proc. Third International Conference on Communications and Information Technology (ICCIT), pp. 173-178, Beirut, Lebanon, June 2013. https://doi.org/10.1109/ICCITechnology.2013.6579544
F. Hamady, A. Chehab, I. Elhajj, and A. Kayssi, "User Experience-Based Mechanism for Preserving Energy in Graphics-Intensive Applications," in Proc. IEEE 11th International New Circuits and Systems Conference (NEWCAS), pp. 1-4, Paris, France, June 2013. https://doi.org/10.1109/NEWCAS.2013.6573598
K. Hamandi, I. Sarji, I. H. Elhajj, A. Chehab, and A. Kayssi, "W-AKA: Privacy-Enhanced LTE-AKA Using Secured Channel over Wi-Fi," in Proc. 12th Wireless Telecommunications Symposium (WTS 2013), pp. 1-6, Phoenix, Arizona, April 2013. https://doi.org/10.1109/WTS.2013.6566240
K. Hamandi, A. Chehab, I. H. Elhajj, and A. Kayssi, "Android SMS Malware: Vulnerability and Mitigation," in Proc. 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 1004-1009, Barcelona, Spain, March 2013. https://doi.org/10.1109/WAINA.2013.134
R. Bassil, I. H. Elhajj, A. Chehab, and A. Kayssi, "Effects of Signaling Attacks on LTE Networks," in Proc. 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 499-504, Barcelona, Spain, March 2013. https://doi.org/10.1109/WAINA.2013.136
A. Atassi, N. Sayegh, I. Elhajj, A. Chehab, and A. Kayssi, "Malicious Node Detection in Wireless Sensor Networks," in Proc. 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 456-461, Barcelona, Spain, March 2013. https://doi.org/10.1109/WAINA.2013.135
K. Hamandi, I. Sarji, A. Chehab, I. H. Elhajj, and A. Kayssi, "Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme," in Proc. 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 929-934, Barcelona, Spain, March 2013. https://doi.org/10.1109/WAINA.2013.133
F. Hamady, A. Kayssi, A. Chehab, and M. Mansour, "Evaluation of Low-Power Computing when Operating on Subsets of Multicore Processors," Journal of Signal Processing Systems, vol. 70, no. 2, pp. 193-208, February 2013. https://doi.org/10.1007/s11265-012-0697-z
W. Itani, A. Kayssi, and A. Chehab, "Hardware-Based Security for Ensuring Data Privacy in the Cloud," in Security Engineering for Cloud Computing: Approaches and Tools (Eds. D. G. Rosado, D. Mellado, E. Fernandez-Medina, and M. Piatini), chapt. 8, pp. 147-170, 2013. https://doi.org/10.4018/978-1-4666-2125-1.ch008
F. Saab, I. Elhajj, A. Chehab, and A. Kayssi, "Energy Efficient JPEG Using Stochastic Processing," in Proc. International Conference on Energy Aware Computing, pp. 1-6, Guzelyurt, North Cyprus, December 2012. https://doi.org/10.1109/ICEAC.2012.6471025
S. Abdallah, A. Chehab, I. Elhajj, and A. Kayssi, "Stochastic Hardware Architectures: A Survey," in Proc. International Conference on Energy Aware Computing (ICEAC), pp. 1-6, Guzelyurt, North Cyprus, December 2012. https://doi.org/10.1109/ICEAC.2012.6471024
K. Hamandi, I. H. Elhajj, A. Chehab, and A. Kayssi, "Android SMS Botnet: A New Perspective," in Proc. 10th ACM International Symposium on Mobility Management and Wireless Access (MobiWac), pp. 125-130, Paphos, Cyprus, October 2012. https://doi.org/10.1145/2386995.2387016
R. Bassil, A. Chehab, I. H. Elhajj, and A. Kayssi, "Signaling Oriented Denial of Service on LTE Networks," in Proc. 10th ACM International Symposium on Mobility Management and Wireless Access (MobiWac), pp. 153-158, Paphos, Cyprus, October 2012. https://doi.org/10.1145/2386995.2387024
A. Tajeddine, A. Kayssi, and A. Chehab, "CENTER: A Centralized Trust-Based Efficient Routing Protocol for Wireless Sensor Networks," in Proc. 10th International Conference on Privacy, Security and Trust (PST 2012), pp. 195-202, Paris, France, July 2012. https://doi.org/10.1109/PST.2012.6297940
S. Abdallah, E. Najjar, and A. Kayssi, "A Round Robin Load Balancing and Redundancy Protocol for Network Routers," in Proc. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1741-1747, Liverpool, UK, June 2012. https://doi.org/10.1109/TrustCom.2012.54
M. Dabbagh, N. Sayegh, and A. Kayssi, "Efficient Internet Mapping in the Presence of Network Load Balancers," in Proc. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1706-1713, Liverpool, UK, June 2012. https://doi.org/10.1109/TrustCom.2012.140
K. Hamandi, F. Saab, and A. Kayssi, "Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization," in Proc. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1481-1485, Liverpool, UK, June 2012. https://doi.org/10.1109/TrustCom.2012.147
M. Dikmak, Z. Sabra, A. Kayssi, and A. Chehab, "Optimized Conditional Privacy Preservation in VANETs," in Proc. 19th International Conference on Telecommunications (ICT), pp. 1-6, Jounieh, Lebanon, April 2012. https://doi.org/10.1109/ICTEL.2012.6221234
R. Bassil, R. Hobeica, W. Itani, C. Ghali, A. Kayssi, and A. Chehab, "Security Analysis and Solution for Thwarting Cache Poisoning Attacks in the Domain Name System," in Proc. 19th International Conference on Telecommunications (ICT), pp. 1-6, Jounieh, Lebanon, April 2012. https://doi.org/10.1109/ICTEL.2012.6221233
W. Itani, C. Ghali., R. Bassil, A. Kayssi, and A. Chehab, "BGP-Inspired Autonomic Service Routing for the Cloud," in Proc. 27th Annual ACM Symposium on Applied Computing, pp. 406-411, Trento, Italy, March 2012. https://doi.org/10.1145/2245276.2245356
W. Itani, A. Kayssi, and A. Chehab, "Security and Privacy in Body Sensor Networks: Challenges, Solutions and Research Directions," in E-Healthcare Systems and Wireless Communications: Current and Future Challenges (Ed. M. Watfa), chapt. 5, pp. 100-127, 2012. https://doi.org/10.4018/978-1-61350-123-8.ch005
S. A. Saab, A. Kayssi, and A. Chehab, "A Decentralized Energy-Aware Key Management Scheme for Wireless Sensor Networks," in Proc. 6th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 504-508, Abu Dhabi, UAE, December 2011. https://ieeexplore.ieee.org/document/6148490
R. Bassil, W. El-Beaino, A. Kayssi, and A. Chehab, "A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol," in Proc. 6th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 495-499, Abu Dhabi, UAE, December 2011. https://ieeexplore.ieee.org/document/6148488
A. Fawaz, A. Jaber, A. Kassem, A. Chehab, and A. Kayssi, "Assessing Testing Techniques for Resistive-Open Defects in Nanometer CMOS Adders," in Proc. IEEE 18th International Conference on Electronics, Circuits, and Systems (ICECS), pp. 165-168, Beirut, Lebanon, December 2011. https://doi.org/10.1109/ICECS.2011.6122240
S. Saab, W. Itani, A. Kayssi, A. Chehab, and C. Ghali, "Secure Delay-Tolerant Communications in the Presence of Oppressive Governments," in Proc. 6th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 302-307, Abu Dhabi, UAE, December 2011. https://ieeexplore.ieee.org/document/6148461
L. Hamieh, N. Mehdi, G. Omeirat, A. Chehab, and A. Kayssi, "The Effectiveness of Delay and iDDT Tests in Detecting Resistive Open Defects for Nanometer CMOS Adder Circuits," in Proc. 6th International IEEE Design and Test Workshop (IDT), pp. 53-57, Beirut, Lebanon, December 2011. https://doi.org/10.1109/IDT.2011.6123101
Z. Moudallal, I. Issa, M. Mansour, A. Chehab, and A. Kayssi, "A Low-Power Methodology for Configurable Wide Kogge-Stone Adders," in Proc. Second International Conference on Energy Aware Computing (ICEAC 2011), pp. 1-5, Istanbul, Turkey, November 2011. https://doi.org/10.1109/ICEAC.2011.6403621
I. Sarji, C. Ghali, A. Chehab, and A. Kayssi, "CloudESE: Energy Efficiency Model for Cloud Computing Environments," in Proc. Second International Conference on Energy Aware Computing (ICEAC), pp. 1-6, Istanbul, Turkey, November 2011. https://doi.org/10.1109/ICEAC.2011.6136680
E. Abou Charanek, H. Dermanilian, I. Elhajj, A. Kayssi, and A. Chehab, "E2VoIP2: Energy Efficient Voice over IP Privacy," Computers & Security, vol. 30, no. 8, pp. 815-829, November 2011. https://doi.org/10.1016/j.cose.2011.07.002
F. Hamady, A. Chehab, and A. Kayssi, "Energy Consumption Breakdown of a Modern Mobile Platform under Various Workloads," in Proc. Second International Conference on Energy Aware Computing (ICEAC), pp. 1-4, Istanbul, Turkey, November 2011. https://doi.org/10.1109/ICEAC.2011.6136684
W. Itani, A. Chehab, and A. Kayssi, "Energy-Efficient Platform-as-a-Service Security Provisioning in the Cloud," in Proc. Second International Conference on Energy Aware Computing (ICEAC), pp. 1-6, Istanbul, Turkey, November 2011. https://doi.org/10.1109/ICEAC.2011.6136686
A. Tajeddine, A. Chehab, and A. Kayssi, "H-TRACE: A Hybrid Energy-Aware Routing Scheme for Mobile Ad Hoc Networks," in Proc. Second International Conference on Energy Aware Computing (ICEAC), pp. 1-6, Istanbul, Turkey, November 2011. https://doi.org/10.1109/ICEAC.2011.6136690
I. Nahlus, L. Shaer, A. Chehab, A. Kayssi, and M. Mansour, "Low-Power Adder Design Techniques for Noise-Tolerant Applications," in Proc. IEEE Workshop on Signal Processing Systems (SiPS), pp. 117-121, Beirut, Lebanon, October 2011. https://doi.org/10.1109/SiPS.2011.6088960
M. Dabbagh, H. Hajj, A. Chehab, W. El Hajj, A. Kayssi, and M. Mansour, "A Design Methodology for Energy Aware Neural Networks," in Proc. International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1333-1340, Istanbul, Turkey, July 2011. https://doi.org/10.1109/IWCMC.2011.5982732
C. Ghali, F. Hamady, I. Elhajj, and A. Kayssi, "Matryoshka: Tunneled Packets Breaking the Rules," in Proc. International Conference on High Performance Computing and Simulation, pp. 485-490, Istanbul, Turkey, July 2011. https://doi.org/10.1109/HPCSim.2011.5999864
W. Itani, A. Kayssi, and A. Chehab, "Policy-Based Security Channels for Protecting Network Communication in Mobile Cloud Computing," in Proc. International Conference on Security and Cryptography - International Workshop on Model-Based and Policy-Based Engineering in Information Security (MPEIS), pp. 450-456, Seville, Spain, July 2011. https://www.dropbox.com/s/toxoa2mc2lzl84a/p02.pdf
A. Tajeddine, A. Kayssi, and A. Chehab, "TRACE: A Centralized Trust and Competence-Based Energy-Efficient Routing Scheme for Wireless Sensor Networks," in Proc. 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 953-958, Istanbul, Turkey, July 2011. https://doi.org/10.1109/IWCMC.2011.5982530
F. Hamady, N. Bisher, A. Kayssi, and C. Ghali, "MAConf: Passive Layer-2 Detection Mechanism for Mobile Wireless Sensor Networks," in Proc. International Conference on Distributed Computing in Sensor Systems and Workshops - Second International Workshop on Interconnections of Wireless Sensor Networks (IWSN), pp. 1-6, Barcelona, Spain, June 2011. https://doi.org/10.1109/DCOSS.2011.5982216
W. Itani, C. Ghali, A. Kayssi, and A. Chehab, "Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing," in Proc. 1st International Conference on Cloud Computing and Services Science (CLOSER), pp. 49-55, Noordwijkerhout, The Netherlands, May 2011. https://doi.org/10.5220/0003384100490055
S. Khaddaj, K. Joujou, A. Kayssi, and K. Kabalan, "DSP Experiments and Design Projects in an Introduction to ECE Course at the American University of Beirut," in Proc. IEEE Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE), pp. 95-100, Sedona, Arizona, January 2011. https://doi.org/10.1109/DSP-SPE.2011.5739193
A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, "Fuzzy Reputation-Based Trust Model," Applied Soft Computing, vol. 11, no. 1, pp. 345-355, January 2011. https://doi.org/10.1016/j.asoc.2009.11.025
A. Tajeddine, A. Kayssi, and A. Chehab, "A Centralized Energy-Aware Trust-Based Routing Scheme for Wireless Sensor Networks," in Proc. First International Conference on Energy Aware Computing (ICEAC), pp. 1-2, Cairo, Egypt, December 2010. https://doi.org/10.1109/ICEAC.2010.5702278
M. Kassem, M. Mansour, A. Chehab, and A. Kayssi, "A Sub-Threshold SRAM Based PUF," in Proc. First International Conference on Energy Aware Computing (ICEAC), pp. 1-4, Cairo, Egypt, December 2010. https://doi.org/10.1109/ICEAC.2010.5702285
M. Fawaz, N. Kobrosli, J. Rizakallah, M. Mansour, A. Chehab, A. Kayssi, and H. Hajj, "Energy Minimization Feedback Loop for Ripple Carry Adders," in Proc. First International Conference on Energy Aware Computing (ICEAC), pp. 1-2, Cairo, Egypt, December 2010. https://doi.org/10.1109/ICEAC.2010.5702297
W. Itani, A. Kayssi, and A. Chehab, "Energy-Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing," in Proc. First International Conference on Energy Aware Computing (ICEAC), pp. 1-2, Cairo, Egypt, December 2010. https://doi.org/10.1109/ICEAC.2010.5702296
F. Hamady, M. Sabra, Z. Sabra, A. Kayssi, A. Chehab, and M. Mansour, "Enhancement of the S-MAC Protocol for Wireless Sensor Networks," in Proc. First International Conference on Energy Aware Computing (ICEAC), pp. 1-4, Cairo, Egypt, December 2010. https://doi.org/10.1109/ICEAC.2010.5702298
W. Itani, C. Ghali, A. El Hajj, A. Kayssi, and A. Chehab, "SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks," in Proc. IEEE Global Telecommunications Conference GLOBECOM, pp. 1-6, Miami, Florida, December 2010. https://doi.org/10.1109/GLOCOM.2010.5684305
M. Fawaz, N. Kobrosli, A. Chehab, and A. Kayssi, "Testing Techniques for Resistive-Open Defects in Future CMOS Technologies," in Proc. IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), pp. 256-259, Kuala Lumpur, Malaysia, December 2010. https://doi.org/10.1109/APCCAS.2010.5774897
M. Fawaz, N. Kobrosli, A. Chkeir, A. Chehab, and A. Kayssi, "Transient Current and Delay Analysis for Resistive-Open Defects in Future 16 nm CMOS Circuits," in Proc. IEEE International Conference on Electronics, Circuits, and Systems (ICECS), pp. 438-441, Athens, Greece, December 2010. https://doi.org/10.1109/ICECS.2010.5724543
F. Yahya, M. Mansour, A. Kayssi, and H. Hajj, "Using BIST Circuitry to Measure DRV of Large SRAM Arrays," in Proc. First International Conference on Energy Aware Computing (ICEAC), pp. 1-4, Cairo, Egypt, December 2010. https://doi.org/10.1109/ICEAC.2010.5702323
W. Itani, A. Tajeddine, A. Kayssi, and A. Chehab, "Slow but Certain Wins the Race: Authenticated Bundle Communication in Delay Tolerant Networks," in Proc. 6th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, pp. 90-97, Bodrum, Turkey, October 2010. https://doi.org/10.1145/1868630.1868646
A. Tajeddine, A. Kayssi, and A. Chehab, "A Privacy-Preserving Trust Model for VANETs," in Proc. 10th IEEE International Conference on Computer and Information Technology, pp. 832-837, Bradford, UK, June 2010. https://doi.org/10.1109/CIT.2010.157
C. Ghali, A. Chehab, and A. Kayssi, "CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web Services," in Proc. 10th IEEE International Conference on Computer and Information Technology, pp. 1085-1089, Bradford, UK, June 2010. https://doi.org/10.1109/CIT.2010.198
B. R. Saab, B. Tabshouri, M. El Habbal, M. El Moghrabi, O. Monajjed, and A. Kayssi, "An Electronic Gadget for Excisional Biopsies," in Proc. 19th WONCA World Conference, Cancun, Mexico, May 2010.
R. Deghaili, A. Chehab, and A. Kayssi, "Trust-Privacy Tradeoffs in Distributed Computing," in Collaborative Computer Security and Trust Management (Eds. J. M. Seigneur and A. Slagell), chapt. 11, pp. 216-226, 2010. https://doi.org/10.4018/978-1-60566-414-9.ch011
W. Itani, A. Kayssi, and A. Chehab, "Smart Encryption Channels for Securing Virtual Machine-Based Networked Applications," Security and Communication Networks, vol. 2, no. 6, pp. 507-518, November-December 2009. https://doi.org/10.1002/sec.90
S. Wehbe, A. Kayssi, A. Chehab, and I. Elhajj, "Mutual Authentication Scheme for EPC Tags-Readers in the Supply Chain," in Proc. Third International Conference on New Technologies, Mobility and Security, pp. 1-5, Cairo, Egypt, December 2009. https://doi.org/10.1109/NTMS.2009.5384805
W. Itani, A. Kayssi, and A. Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures," in Proc. Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 711-716, Chengdu, China, December 2009. https://doi.org/10.1109/DASC.2009.139
C. Serhal, A. Chehab, and A. Kayssi, "Clustering Techniques for Improving Transient Current Testing," in Proc. 4th IEEE International Design and Test Workshop, pp. 1-6, Riyadh, Saudi Arabia, November 2009. https://doi.org/10.1109/IDT.2009.5404121
S. Chehade, A. Chehab, and A. Kayssi, "Modeling of Gate Oxide Short Defects in MOSFETs," in Proc. 4th IEEE International Design and Test Workshop, pp. 1-4, Riyadh, Saudi Arabia, November 2009. https://doi.org/10.1109/IDT.2009.5404118
M. Abou Rjeily, A. Chehab, and A. Kayssi, "Transient Current Testing for Future CMOS Technologies," in Proc. 4th IEEE International Design and Test Workshop (IDT), pp. 1-6, Riyadh, Saudi Arabia, November 2009. https://doi.org/10.1109/IDT.2009.5404128
A. Ghandour, K. Fawaz, A. Chehab, and A. Kayssi, "Wavelet Transform-Based Transient Current Analysis for Detection of Gate-Oxide Shorts in CMOS," in Proc. 4th IEEE International Design and Test Workshop (IDT), pp. 1-6, Riyadh, Saudi Arabia, November 2009. https://doi.org/10.1109/IDT.2009.5404123
W. Itani, A. Kayssi, and A. Chehab, "PETRA: A Secure and Energy-Efficient Software Update Protocol for Severely-Constrained Network Devices," in Proc. 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, pp. 37-43, Tenerife, Spain, October 2009. https://doi.org/10.1145/1641944.1641952
Z. Radwan, C. Gaspard, A. Kayssi, and A. Chehab, "Policy-Driven and Content-Based Web Services Security Gateway," International Journal of Network Security, vol. 8, no. 3, pp. 253-265, May 2009. https://doi.org/10.6633/IJNS.200905.8(3).07
M. El Habbal, M. El Moghrabi, O. Monajjed, and A. Kayssi, "Automated Device for Determination of Skin Lesion Regions," in Proc. ACM symposium on Applied Computing, pp. 859-860, Honolulu, Hawaii, March 2009. https://doi.org/10.1145/1529282.1529466
R. Wehbi, A. Kayssi, A. Chehab, and Z. Dawy, "Network Setup for Secure Routing in Inter-Vehicle Communication Networks," in Breakthrough Perspectives in Network and Data Communications Security, Design and Applications (Ed. I Bose), chapt. 18, pp. 272-285, 2009. https://doi.org/10.4018/978-1-60566-148-3.ch018
B. Haidar, A. Chehab, and A. Kayssi, "Host Protection in Grid Computing," in Proc. Fifth International Conference on Innovations in Information Technology, pp. 613-617, Al-Ain, UAE, December 2008. https://doi.org/10.1109/INNOVATIONS.2008.4781653
H. Daou, A. Kayssi, and A. Chehab, "RFID Security Protocols," in Proc. Fifth International Conference on Innovations in Information Technology, pp. 593-597, Al-Ain, UAE, December 2008. https://doi.org/10.1109/INNOVATIONS.2008.4781675
R. Deghaili, A. Chehab, and A. Kayssi, "Trust-Privacy Tradeoffs in Distributed Systems," in Proc. Fifth International Conference on Innovations in Information Technology, pp. 39-43, Al-Ain, UAE, December 2008. https://doi.org/10.1109/INNOVATIONS.2008.4781674
T. Hassan, A. Kayssi, and A. Chehab, "Ring of Masters (ROM): A New Ring Structure for Bluetooth Scatternets with Dynamic Routing and Adaptive Scheduling Schemes," Pervasive and Mobile Computing, vol. 4, no. 4, pp. 546-561, August 2008. https://doi.org/10.1016/j.pmcj.2008.02.003
A. Nazer, A. Chehab, and A. Kayssi, "Dynamic Current Testing for CMOS Domino Circuits," International Journal of Electronics, vol. 95, no. 6, pp. 577-592, June 2008. https://doi.org/10.1080/00207210802091450
M. Eid, H. Artail, A. Kayssi, and A. Chehab, "LAMAIDS: A Lightweight Adaptive Mobile Agent-Based Intrusion Detection System," International Journal of Network Security, vol. 6, no. 2, pp. 145-157, March 2008. https://doi.org/10.6633/IJNS.200803.6(2).04
W. Itani, A. Kayssi, and A. Chehab, "Policy-Based Security for M-Commerce Networks," in Global Mobile Commerce: Strategies, Implementation and Case Studies (Eds. W. Huang, Y. Wang and J. Day), chapt. 4, pp. 53-67, 2008. https://doi.org/10.4018/978-1-59904-558-0.ch004
A. Chehab, A. Kayssi, and A. Ghandour, "Transient Current Testing of Gate-Oxide Shorts in CMOS," in Proc. International Design and Test Workshop (IDT), pp. 77-81, Cairo, Egypt, December 2007. https://doi.org/10.1109/IDT.2007.4437433
Z. Radwan, C. Gaspard, A. Kayssi, and A. Chehab, "XPRIDE: Policy-Driven Web Services Security Based on XML Content," in Proc. IEEE Global Telecommunications Conference - GLOBECOM, pp. 553-558, Washington, DC, November 2007. https://doi.org/10.1109/GLOCOM.2007.109
W. Itani, A. Kayssi, and A. Chehab, "An Efficient and Scalable Security Protocol for Protecting Fixed-Content Objects in Content Addressable Storage Architectures," in Proc. Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007 - International Workshop on the Value of Security through Collaboration (SECOVAL 07), pp. 63-72, Nice, France, September 2007. https://doi.org/10.1109/SECCOM.2007.4550309
A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, "PATROL: A Comprehensive Reputation-Based Trust Model," International Journal of Internet Technology and Secured Transactions, vol. 1, no. 1/2, pp. 108-131, August 2007. https://doi.org/10.1504/IJITST.2007.014837
L. Srour, A. Kayssi, and A. Chehab, "Personalized Web Page Ranking Using Trust and Similarity," in Proc. IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 454-457, Amman, Jordan, May 2007. https://doi.org/10.1109/AICCSA.2007.370921
C. Gaspard, B. Haidar, A. Kayssi, and A. Chehab, "SmartSSL: Efficient Policy-Based Web Security," in Proc. IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 833-839, Amman, Jordan, May 2007. https://doi.org/10.1109/AICCSA.2007.370729
R. Wehbi, A. Kayssi, A. Chehab, and Z. Dawy, "Network Setup for Secure Routing in Inter-Vehicle Communication Networks," International Journal of Business Data Communications and Networking, vol. 2, no. 4, pp. 1-17, October-December 2006. https://doi.org/10.4018/jbdcn.2006100101
C. Gaspard, A. Kayssi, and A. Chehab, "ODYSSEY: Policy-Driven Anonymizer for Handheld Wireless Devices Privacy," in Proc. Third International Conference on Innovations in Information Technology, pp. 1-5, Dubai, UAE, November 2006. https://doi.org/10.1109/INNOVATIONS.2006.301891
W. Itani, C. Gaspard, A. Kayssi, and A. Chehab, "PRIDE: Policy-Driven Web Security for Handheld Wireless Devices," in Proc. IEEE Global Telecommunications Conference - GLOBECOM, pp. 1-6, San Francisco, California, November 2006. https://doi.org/10.1109/GLOCOM.2006.316
W. Itani, A. Kayssi, and A. Chehab, "SECERN: A Secure Enterprise Backup and Recovery System for Mission-Critical Relational Database Servers," in Proc. Third International Conference on Innovations in Information Technology, pp. 1-5, Dubai, UAE, November 2006. https://doi.org/10.1109/INNOVATIONS.2006.301956
W. Itani, A. Kayssi, A. Chehab, and C. Gaspard, "A Policy-Driven, Content-Based Security Protocol for Protecting Audit Logs on Wireless Devices," International Journal of Network Security, vol. 3, no. 2, pp. 120-131, September 2006. https://doi.org/10.6633/IJNS.200609.3(2).03
A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, "PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems," Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science., vol. 4158, pp. 205-216, September 2006. https://doi.org/10.1007/11839569_20
L. Srour, A. Kayssi, and A. Chehab, "Reputation-Based Algorithm for Managing Trust in File Sharing Networks," in Proc. Securecomm and Workshops, pp. 1-10, Baltimore, Maryland, September 2006. https://doi.org/10.1109/SECCOMW.2006.359538
A. Nazer, A. Chehab, and A. Kayssi, "Dynamic Current Testing for CMOS Domino Circuits," in Proc. 49th IEEE International Midwest Symposium on Circuits Systems (MWSCAS), vol. 2, pp. 259-263, San Juan, Puerto Rico, August 2006. https://doi.org/10.1109/MWSCAS.2006.382260
W. Itani, A. Kayssi, and A. Chehab, "An Enterprise Policy-Based Security Protocol for Protecting Relational Database Network Objects," in Proc. International Wireless Communications and Mobile Computing Conference, pp. 343-348, Vancouver, Canada, July 2006. https://doi.org/10.1145/1143549.1143618
G. Derbas, A. Kayssi, A. Chehab, H. Artail, and A. Tajeddine, "A Trust Model For Distributed Systems Based On Reputation," International Journal of Web and Grid Services, vol. 1, no. 3/4, pp. 416-447, December 2005. https://doi.org/10.1504/IJWGS.2005.008396
M. Eid, H. Artail, A. Kayssi, and A. Chehab, "Trends in Mobile Agent Applications," Journal of Research and Practice in Information Technology, vol. 37, no. 4, pp. 323-351, November 2005. https://www.dropbox.com/s/afnhmfbh770tw8o/p01.pdf
A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, "A Comprehensive Reputation-Based Trust Model for Distributed Systems," in Proc. Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 116-125, Athens, Greece, September 2005. https://doi.org/10.1109/SECCMW.2005.1588304
R. El Kaissi, A. Kayssi, A. Chehab, and Z. Dawy, "DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks," in Proc. Second International Conference on Innovations in Information Technology, pp. 1-10, Dubai, UAE, September 2005. https://www.dropbox.com/s/x873vwo0gtl4iwk/p10.pdf
Y. Shaer, A. Kayssi, and A. Chehab, "SERAX: Secure Range Extensions in IEEE 802.11i," in Proc. Second International Conference on Innovations in Information Technology, pp. 1-10, Dubai, UAE, September 2005. https://www.dropbox.com/s/legif7q1bndzrko/p09.pdf
R. Wehbi, A. Kayssi, A. Chehab, and Z. Dawy, "SERVEN: Network Setup for Secure Routing in Inter-Vehicle Communication Networks," in Proc. Second International Conference on Innovations in Information Technology, pp. 1-10, Dubai, UAE, September 2005. https://www.dropbox.com/s/t431b6b9eo4oegi/p04.pdf
W. Itani, A. Kayssi, and A. Chehab, "Short Paper: PATRIOT - a Policy-Based, Multi-Level Security Protocol for Safekeeping Audit Logs on Wireless Devices," in Proc. First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), pp. 240-242, Athens, Greece, September 2005. https://doi.org/10.1109/SECURECOMM.2005.45
A. Dalghan, A. Chehab, and A. Kayssi, "WiSec: VPN over WLAN 802.11: Design and Implementation of a Secure Virtual Wireless Environment," in Proc. Second International Conference on Innovations in Information Technology, pp. 1-8, Dubai, UAE, September 2005. https://www.dropbox.com/s/b408fywfaux326o/p08.pdf
W. Itani, A. Kayssi, and A. Chehab, "SPARTA: a Secure, Policy-Driven Architecture for Content Distribution and Storage in Centralized Wireless Networks," in Proc. Fist International Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing (SecPerU'05), Santorini, Greece, July 2005. https://www.dropbox.com/s/c2il8deguz15hmh/p13.pdf
A. Nazer, A. Chehab, A. Kayssi, and R. Makki, "Evaluation of iDDT Testing for CMOS Domino Circuits," in Proc. IEEE International Workshop on Current and Defect Based Testing (DBT), pp. 58-63, Palm Springs, CA, May 2005. https://doi.org/10.1109/DBT.2005.1531305
S. Kumar, S. Thomas, R. Makki, A. Chehab, and A. Kayssi, "Simulation Modeling and Testing of SRAMs Using Dynamic Current," in Proc. IEEE International Workshop on Current and Defect Based Testing (DBT), pp. 64-70, Palm Springs, CA, May 2005. https://doi.org/10.1109/DBT.2005.1531306
S. Karaki, A. Kayssi, and H. Karaki, "Capacitor Placement for Switching Noise Reduction Using Genetic Algorithms and Distributed Computing," Electrical Engineering, vol. 87, no. 1, pp. 11-18, January 2005. https://doi.org/10.1007/s00202-003-0215-1
S. Itani, N. Aaraj, D. Abdelahad, and A. Kayssi, "Neighbor Stranger Discrimination: A New Defense Mechanism Against Internet DDoS Attacks," in Proc. 3rd ACS/IEEE International Conference on Computer Systems and Applications, pp. 95-100, Cairo, Egypt, January 2005. https://doi.org/10.1109/AICCSA.2005.1387086
W. Itani and A. Kayssi, "SPECSA: a Scalable, Policy-Driven, Extensible, and Customizable Security Architecture for Wireless Enterprise Applications," Computer Communications, vol. 27, no. 18, pp. 1825-1839, December 2004. https://doi.org/10.1016/j.comcom.2004.07.001
A. Chehab, A. Kayssi, A. Nazer, and N. Aaraj, "Transient Current Testing of Dynamic CMOS Circuits in the Presence of Leakage and Process Variation," in Proc. International Conference on Microelectronics (ICM), pp. 381-387, Tunis, Tunisia, December 2004. https://doi.org/10.1109/ICM.2004.1434593
M. Eid, H. Artail, A. Kayssi, and A. Chehab, "An Adaptive Intrusion Detection and Defense System Based on Mobile Agents," in Proc. International Research Conference on Innovations in Information Technology, pp. 14-22, Dubai, UAE, October 2004. https://www.dropbox.com/s/e3vfc4hdw4xaqw7/p06.pdf
A. Fares, A. Khachan, A. Bakri Kasbah, M. Zeidan, and A. Kayssi, "GSM RF Equipment Testing and Performance Analysis," in Proc. IEEE International Symposium on Communications and Information Technologies, vol. 2, pp. 807-811, Sapporo, Japan, October 2004. https://doi.org/10.1109/ISCIT.2004.1413828
S. Hanna, A. Chehab, A. Kayssi, and H. Artail, "Lighter Weight Mobile Agent System," in Proc. International Research Conference on Innovations in Information Technology, pp. 99-107, Dubai, UAE, October 2004. https://www.dropbox.com/s/iduv8rhknlz6dzr/p05.pdf
T. Hassan, A. Kayssi, and A. Chehab, "New Dynamic Routing and Adaptive Scheduling Schemes for Bluetooth Ring Scatternets," in Proc. International Research Conference on Innovations in Information Technology, pp. 14-22, Dubai, UAE, October 2004. https://www.dropbox.com/s/w8wyj0zasam8ld7/p07.pdf
N. Aaraj, A. Nazer, A. Chehab, and A. Kayssi, "Transient Current Testing of Dynamic CMOS Circuits," in Proc. IEEE 19th International Symposium on Defect and Fault Tolerance in VLSI Systems, pp. 264-271, Cannes, France, October 2004. https://doi.org/10.1109/DFTVS.2004.1347848
A. Kayssi, "The Average Capacitor Current Method for Delay Calculation in MOS Circuits," IEEE Transactions on Education, vol. 47, no. 3, pp. 330-339, August 2004. https://doi.org/10.1109/TE.2004.825219
A. Kayssi, S. Sharafeddine, and H. Karaki, "Computer-Based Laboratory for Data Communications and Computer Networking," Computer Applications in Engineering Education, vol. 12, no. 2, pp. 84-97, July 2004. https://doi.org/10.1002/cae.20002
G. Derbas, A. Kayssi, H. Artail, and A. Chehab, "TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation," in Proc. IEEE/ACS International Conference on Pervasive Services, pp. 113-120, Beirut, Lebanon, July 2004. https://doi.org/10.1109/PERSER.2004.1356779
A. Chehab, A. Kayssi, A. Nazer, and R. Makki, "An Improved Method for iDDT Testing in the Presence of Leakage and Process Variation," in Proc. IEEE International Workshop on Current and Defect Based Testing, pp. 11-16, Napa Valley, California, April 2004. https://doi.org/10.1109/DBT.2004.1408946
W. Itani and A. Kayssi, "SPECSA: a Scalable, Policy-driven, Extensible, and Customizable Security Architecture for Wireless Enterprise Applications," in Proc. IEEE International Performance, Computing and Communications Conference, pp. 753-759, Phoenix, Arizona, April 2004. https://doi.org/10.1109/PCCC.2004.1395173
A. Kayssi and A. El-Haj-Mahmoud, "EmuNET: A Real-Time Network Emulator," in Proc. 19th ACM Symposium on Applied Computing, vol. 1, pp. 357-362, Nicosia, Cyprus, March 2004. https://doi.org/10.1145/967900.967977
W. Itani and A. Kayssi, "J2ME Application-Layer End-to-End Security for M-Commerce," Journal of Network and Computer Applications, vol. 27, no. 1, pp. 13-32, January 2004. https://doi.org/10.1016/S1084-8045(03)00030-4
A. Kayssi, "Analytical Transient Response of MOS Current Mirrors," Wiley International Journal of Circuit Theory and Applications, vol. 31, no. 5, pp. 453-464, September-October 2003. https://doi.org/10.1002/cta.244
T. Hassan and A. Kayssi, "Ring of Masters (ROM): A New Ring Structure for Bluetooth Scatternets," in Proc. 46th IEEE Midwest Symposium on Circuits and Systems (MWCAS), vol. 3, pp. 1279-1282, Cairo, Egypt, December 2003. https://doi.org/10.1109/MWSCAS.2003.1562528
M. Azarian, N. Knudsen, and A. Kayssi, "Software Linearization of D/A Converters," in Proc. 46th IEEE Midwest Symposium on Circuits and Systems (MWCAS), vol. 1, pp. 9-12, Cairo, Egypt, December 2003. https://doi.org/10.1109/MWSCAS.2003.1562206
A. Kayssi, "Delay Modeling of CMOS Clock Drivers," Electrical Engineering, vol. 85, no. 5, pp. 247-253, November 2003. https://doi.org/10.1007/s00202-003-0173-7
M. Nizam, M. Hajo, K. Merhi, A. Kayssi, and M. Zeidan, "Bluetooth RF Layer Simulation Using LabVIEW," in Proc. WNCG First Annual Wireless Networking Symposium, Austin, Texas, October 2003. https://www.dropbox.com/s/emiayuj9vfp7eyh/p14.pdf
N. Naoufal, M. Shell, H. Abdelnoor, A. El-Haj-Mahmoud, A. Kayssi, and A. Chehab, "Distributed Network Emulator with Graphical User Interface," in Proc. International Conference on Communication Systems and Networks (CSN), pp. 391-395, Benalmadena, Spain, September 2003. https://www.dropbox.com/s/e9h313g43honq1n/p15.pdf
R. Dahrouj, W. Renno, T. Tohme, A. Chehab, and A. Kayssi, "SONET Frame Generator for Test-bench Applications," in Proc. International Conference on Communication Systems and Networks (CSN), pp. 445-449, Benalmadena, Spain, September 2003. https://www.dropbox.com/s/2fa2cbwt1j0u9rl/p16.pdf
A. Kayssi, H. Karaki, and W. Abu-Khraybeh, "RTP-Based Caching of Streaming Media," in Proc. IEEE International Symposium on Computers and Communications (ISCC 2003), pp. 1067-1071, Kemer-Antalya, Turkey, June 2003. https://doi.org/10.1109/ISCC.2003.1214256
W. Itani and A. Kayssi, "J2ME End-to-End Security for M-Commerce," in Proc. IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, pp. 2015-2020, New Orleans, Louisiana, March 2003. https://doi.org/10.1109/WCNC.2003.1200696
S. Karaki, A. Kayssi, B. Abdouni, and M. Raad, "Capacitor Placement Using Genetic Algorithms to Reduce Switching Noise," in Proc. 14th International Conference on Microelectronics (ICM), pp. 242-246, Beirut, Lebanon, December 2002. https://doi.org/10.1109/ICM-02.2002.1161539
L. Harik and A. Kayssi, "FPGA-Based Load Balancer for Internet Servers," in Proc. 14th International Conference on Microelectronics (ICM), pp. 190-193, Beirut, Lebanon, December 2002. https://doi.org/10.1109/ICM-02.2002.1161527
R. Khalaf, A. El-Haj-Mahmoud, and A. Kayssi, "Performance Comparison of The AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks," in Proc. International Conference on Communication Systems and Networks (CSN), pp. 41-46, Malaga, Spain, September 2002. https://www.dropbox.com/s/pfopu2ag6isv3rh/p18.pdf
S. Itani and A. Kayssi, "Securing Mobile Banking Transactions Using WAP Application-Layer Security," in Proc. International Conference on Communication Systems and Networks (CSN), pp. 416-420, Malaga, Spain, September 2002. https://www.dropbox.com/s/7t7nf3p1n5otpcd/p17.pdf
A. Kayssi, L. Harik, R. Ferzli, and M. Fawaz, "FPGA-Based Internet Protocol Firewall Chip," in Proc. IEEE International Conference on Electronics, Circuits, and Systems (ICECS), vol. 1, pp. 316-319, Kaslik, Lebanon, December 2000. https://doi.org/10.1109/ICECS.2000.911545
J. Liu, R. Makki, and A. Kayssi, "Dynamic Power Supply Current Testing of CMOS SRAMs," Journal of Electronic Testing: Theory and Applications (JETTA), vol. 16, no. 5, pp. 499-511, October 2000. https://doi.org/10.1023/A:1008324900917
J. Samaha, A. Kayssi, R. Achkar, and M. Azar, "G3 Integrates Three System Technologies," IEEE Computer, vol. 33, no. 10, pp. 107-110, October 2000. https://doi.org/10.1109/MC.2000.10088
M. El-Helou, A. Kayssi, and M. Badran, "Phinique: An Intelligent Web Agent," in Proc. Fourth International Conference on Recent Trends in Computer Science Applications and Information Systems, Amman, Jordan, July 1999.
M. Badran, S. Louis, F. Khoury, and A. Kayssi, "Modular Distributed Computing," in Proc. International Conference on Scientific Computation, Beirut, Lebanon, March 1999.
A. Kayssi, A. El-Hajj, M. El Assir, and R. Sayyid, "Web-Based Tutoring and Testing in a Computer Networks Course," Computer Applications in Engineering Education, vol. 7, no. 1, pp. 1-7, January 1999. https://doi.org/10.1002/(SICI)1099-0542(1999)7:1<1::AID-CAE1>3.0.CO;2-2
J. Liu, R. Z. Makki, and A. Kayssi, "Dynamic Power Supply Current Testing of CMOS SRAMs," in Proc. Seventh Asian Test Symposium (ATS), pp. 348-353, Singapore, Singapore, December 1998. https://doi.org/10.1109/ATS.1998.741637
M. Mansour and A. Kayssi, "FPGA-Based Internet Protocol Version 6 Router," in Proc. International Conference on Computer Design (ICCD), pp. 334-339, Austin, Texas, October 1998. https://doi.org/10.1109/ICCD.1998.727071
A. I. Kayssi, "Macromodel Construction and Verification: Enhancing the Process with Dimensional Analysis," IEEE Circuits and Devices Magazine, vol. 14, no. 3, pp. 34-39, May 1998. https://doi.org/10.1109/101.678954
V. Chandramouli, A. Kayssi, and K. Sakallah, "Signal Delay in Coupled, Distributed RC Lines in the Presence of Temporal Proximity," in Proc. Seventeenth Conference on Advanced Research in VLSI, pp. 32-46, Ann Arbor, Michigan, September 1997. https://doi.org/10.1109/ARVLSI.1997.634844
A. Kassem, A. Kayssi, J. Davidson, J. Houle, and M. Mansour, "Simulation and Implementation of DCT for Image Processing Applications," in Proc. Second LAAS International Conference on Computer Simulation, pp. 451-454, Beirut, Lebanon, September 1997.
J. Liu, R. Z. Makki, A. Kayssi, and S. T. Su, "An Economical Method for Detecting Disturb Faults in CMOS SRAMs," in Proc. IEEE Workshop on the Economics of Design, Test and Manufacture, pp. 39-47, Washington, DC, October 1996.
A. Kayssi, "Macromodeling C- and RC-Loaded CMOS Inverters for Timing Analysis," in Proc. Sixth IEEE Great Lakes Symposium on VLSI (GLSVLSI), pp. 272-276, Ames, Iowa, March 1996. https://doi.org/10.1109/GLSV.1996.497632
A. Kayssi and K. A. Sakallah, "Macromodeling and Simulation of RC Interconnection Circuits," in Proc. First LAAS International Conference on Computer Simulation, pp. 207-212, Beirut, Lebanon, September 1995.
A. I. Kayssi and K. A. Sakallah, "Timing Models for Gallium Arsenide Direct-Coupled FET Logic Circuits," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 14, no. 3, pp. 384-393, March 1995. https://doi.org/10.1109/43.365129
A. I. Kayssi and K. A. Sakallah, "Delay Macromodels for Point-to-Point MCM Interconnections," IEEE Transactions on Components, Packaging, and Manufacturing Technology: Part B, vol. 17, no. 2, pp. 147-152, May 1994. https://doi.org/10.1109/96.330436
A. Kayssi and K. A. Sakallah, "Macromodel Simplification Using Dimensional Analysis," in Proc. IEEE International Symposium on Circuits and Systems (ISCAS), vol. 1, pp. 335-338, London, England, May 1994. https://doi.org/10.1109/ISCAS.1994.408864
A. Kayssi and K. A. Sakallah, "Delay Modeling for GaAs DCFL Circuits," in Proc. IEEE GaAs IC Symposium, pp. 67-70, San Jose, California, October 1993. https://doi.org/10.1109/GAAS.1993.394498
A. I. Kayssi, K. A. Sakallah, and T. N. Mudge, "The Impact of Signal Transition Time on Path Delay Computation," IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 40, no. 5, pp. 302-309, May 1993. https://doi.org/10.1109/82.227370
R. B. Brown, P. Barker, A. Chandna, T. R. Huff, A. I. Kayssi, R. J. Lomax, T. N. Mudge, D. Nagle, K. A. Sakallah, P. J. Sherhart, R. Uhlig, and M. Upton, "GaAs RISC Processors," in Proc. IEEE GaAs IC Symposium, pp. 81-84, Miami Beach, Florida, October 1992. https://doi.org/10.1109/GAAS.1992.247218
A. Kayssi and K. A. Sakallah, "Delay Macromodels for the Timing Analysis of GaAs DCFL," in Proc. European Design Automation Conference (EuroDAC), pp. 142-145, Hamburg, Germany, September 1992. https://doi.org/10.1109/EURDAC.1992.246251
A. Kayssi, K. A. Sakallah, R. B. Brown, R. J. Lomax, T. N. Mudge, and T. R. Huff, "Impact of MCMs on System Performance Optimization," in Proc. IEEE International Symposium on Circuits and Systems (ISCAS), vol. 2, pp. 919-922, San Diego, California, May 1992. https://doi.org/10.1109/ISCAS.1992.230071
A. Kayssi and K. A. Sakallah, "Delay Macromodels for Point-to-Point MCM Interconnections," in Proc. Multi-chip Module Conference (MCMC-92), pp. 79-82, Santa Cruz, California, March 1992. https://doi.org/10.1109/MCMC.1992.201452
A. I. Kayssi, K. A. Sakallah, and T. M. Burks, "Analytical Transient Response of CMOS Inverters," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 39, no. 1, pp. 42-45, January 1992. https://doi.org/10.1109/81.109241
A. Kayssi, K. A. Sakallah, R. B. Brown, R. J. Lomax, T. N. Mudge, and T. R. Huff, "Impact of MCM's on System Performance," in Proc. MCM Workshop, pp. 58-65, Santa Cruz, California, March 1991.
T. N. Mudge, R. B. Brown, W. P. Birmingham, J. A. Dykstra, A. I. Kayssi, R. J. Lomax, O. A. Olukotun, and K. A. Sakallah, "The Design of a GaAs Micro-Supercomputer," in Proc. 24th Hawaii International Conference on System Sciences, vol. 1, pp. 421-432, Kauai, Hawaii, January 1991. https://doi.org/10.1109/HICSS.1991.183912
T. N. Mudge, R. B. Brown, W. P. Birmingham, J. A. Dykstra, A. I. Kayssi, R. J. Lomax, O. A. Olukotun, K. A. Sakallah, and R. Milano, "The Design of a Microsupercomputer," IEEE Computer, vol. 24, no. 1, pp. 57-64, January 1991. https://doi.org/10.1109/2.67194