Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Imad H.
    Last name: Elhajj
    DBLP: 36/7745
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 78  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Khodor Hamandi, Jacques Bou Abdo, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    A privacy-enhanced computationally-efficient and comprehensive LTE-AKA.
    Computer Communications 2017, Volume 98 (0) 2017
    Conference paper
    Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Software Defined IoT security framework.
    2017 Fourth International Conference on Software Defined Systems, SDS 2017, Valencia, Spain, May 8-11, 2017 2017 (0) 2017
    Conference paper
    Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Fuzzy decision system for technology choice in hybrid networks.
    2017 Fourth International Conference on Software Defined Systems, SDS 2017, Valencia, Spain, May 8-11, 2017 2017 (0) 2017
    Conference paper
    Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    SDN VANETs in 5G: An architecture for resilient security services.
    2017 Fourth International Conference on Software Defined Systems, SDS 2017, Valencia, Spain, May 8-11, 2017 2017 (0) 2017
    Conference paper
    Ola Salman, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj.
    Multi-level security for the 5G/IoT ubiquitous network.
    Second International Conference on Fog and Mobile Edge Computing, FMEC 2017, Valencia, Spain, May 8-11, 2017 2017 (0) 2017
    Journal article
    Noel Maalouf, Imad H. Elhajj, Elie A. Shammas, Daniel C. Asmar.
    Humanoid push recovery using sensory reweighting.
    Robotics and Autonomous Systems 2017, Volume 94 (0) 2017
    Journal article
    Georges Younes, Daniel C. Asmar, Imad H. Elhajj, Howayda Al-Harithy.
    Pose tracking for augmented reality applications in outdoor archaeological sites.
    J. Electronic Imaging 2017, Volume 26 (0) 2017
    Conference paper
    Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    SDN for MPTCP: An enhanced architecture for large data transfers in datacenters.
    IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017 2017 (0) 2017
    Journal article
    Sami Malek, Sarah Abdallah, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi.
    Low-power and high-speed shift-based multiplier for error tolerant applications.
    Microprocessors and Microsystems - Embedded Hardware Design 2017, Volume 52 (0) 2017
    Conference paper
    Georgi A. Ajaeiya, Nareg Adalian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    Flow-based Intrusion Detection System for SDN.
    2017 IEEE Symposium on Computers and Communications, ISCC 2017, Heraklion, Greece, July 3-6, 2017 2017 (0) 2017
    Conference paper
    George E. Sakr, Imad H. Elhajj.
    VC-based confidence and credibility for support vector machines.
    Soft Comput. 2016, Volume 20 (0) 2016
    Conference paper
    Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi, Wassim Itani.
    NCaaS: network configuration as a service in SDN-driven cloud architectures.
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    A crowdsourcing game-theoretic intrusion detection and rating system.
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Farah Saab, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab.
    Solving sybil attacks using evolutionary game theory.
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    SDN Security Plane: An Architecture for Resilient Security Services.
    2016 IEEE International Conference on Cloud Engineering Workshop, IC2E Workshops, Berlin, Germany, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Maha Shamseddine, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach.
    2016 IEEE International Conference on Cloud Engineering Workshop, IC2E Workshops, Berlin, Germany, April 4-8, 2016 2016 (0) 2016
    Conference paper
    Ola Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Identity-based authentication scheme for the Internet of Things.
    IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016 2016 (0) 2016
    Conference paper
    Ali Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    SDN verification plane for consistency establishment.
    IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016 2016 (0) 2016
    Conference paper
    Imad H. Elhajj, Mihran Gurunian, Nadeen Rishani.
    Applied instrumentation for civil engineering at the American University of Beirut.
    IEEE Instrum. Meas. Mag. 2016, Volume 19 (0) 2016
    Journal article
    Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    Energy-Efficient Security for Voice over IP.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj.
    G-Route: an energy-aware service routing protocol for green cloud computing.
    Cluster Computing 2015, Volume 18 (0) 2015
    Conference paper
    Riwa Mouawi, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Comparison of in-app ads traffic in different ad networks.
    11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015, Abu Dhabi, United Arab Emirates, October 19-21, 2015 2015 (0) 2015
    Conference paper
    Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    Edge computing enabling the Internet of Things.
    WF-IoT 2015 (0) 2015
    Conference paper
    Noel Maalouf, Imad H. Elhajj, Daniel C. Asmar, Elie A. Shammas.
    Model-free human-like humanoid push recovery.
    2015 IEEE International Conference on Robotics and Biomimetics, ROBIO 2015, Zhuhai, China, December 6-9, 2015 2015 (0) 2015
    Conference paper
    Khodor Hamandi, Alaa Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi.
    Messaging Attacks on Android: Vulnerabilities and Intrusion Detection.
    Mobile Information Systems 2015, Volume 2015 (0) 2015
    Show item 1 to 25 of 78  

    Your query returned 78 matches in the database.