Recent Submissions

TitleAuthorPublication DatePublisherType
PriviPK: Certificate-less and secure email communication  AlSabah, Mashael; Tomescu, Alin; Lebedev, Ilia; Serpanos, Dimitrios; Devadas, Srini2017Elsevier LtdArticle
Context-aware RAON middleware for opportunistic network  Lau, G.; Al-Sabah, M.; Jaseemuddin, M.; Razavi, H.; Bhuiyan, M.2017Elsevier B.V.Article
Empirical performance evaluation of QUIC protocol for Tor anonymity network  Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
CloudSafe: A tool for an automated security analysis for cloud computing  An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud  Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
Multi-moth flame optimization for solving the link prediction problem in complex networks  Barham R.; Sharieh A.; Sleit A.2019Springer VerlagArticle
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks  Mhaisen N.; Fetais N.; Massoud A.2019Elsevier B.V.Article
Empowering users of cloud computing on data confidentiality  Khan, Khaled M.; Shaheen, Mahboob2014IEEEConference Paper
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems  Zhang, Fan; Malluhi, Qutaibah M.; Elsayed, Tamer; Khan, Samee U.; Li, Keqin; ... more authors 2015ElsevierArticle