Follow
Aiman Erbad
Title
Cited by
Cited by
Year
Security services using blockchains: A state of the art survey
T Salman, M Zolanvari, A Erbad, R Jain, M Samaka
IEEE communications surveys & tutorials 21 (1), 858-880, 2018
5652018
Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers
K Bilal, O Khalid, A Erbad, SU Khan
Computer Networks 130, 94-120, 2018
4192018
A survey on service function chaining
D Bhamare, R Jain, M Samaka, A Erbad
Journal of Network and Computer Applications 75, 138-155, 2016
3712016
Cybersecurity for Industrial Control Systems: A Survey
D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan, N Meskin
Computers & Security 89, 101677, 2020
3152020
Edge Computing For Smart Health: Context-aware Approaches, Opportunities, and Challenges
AA Abdellatif, A Mohamed, CF Chiasserini, M Tlili, A Erbad
IEEE Network, 2019
2792019
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
MF Al-Sa’d, A Al-Ali, A Mohamed, T Khattab, A Erbad
Future Generation Computer Systems 100, 86-97, 2019
2492019
Optimal virtual network function placement in multi-cloud service function chaining architecture
D Bhamare, M Samaka, A Erbad, R Jain, L Gupta, HA Chan
Computer Communications 102, 1-16, 2017
2462017
MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange
AA Abdellatif, L Samara, A Mohamed, A Erbad, CF Chiasserini, M Guizani, ...
IEEE Internet of Things Journal, 2021
1642021
Edge computing for interactive media and video streaming
K Bilal, A Erbad
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC …, 2017
1362017
Machine learning for anomaly detection and categorization in multi-cloud environments
T Salman, D Bhamare, A Erbad, R Jain, M Samaka
2017 IEEE 4th international conference on cyber security and cloud computing …, 2017
1332017
Optimal User-Edge Assignment in Hierarchical Federated Learning based on Statistical Properties and Network Topology Constraints
N Mhaisen, A Awad, A Mohamed, A Erbad, M Guizani
IEEE Transactions on Network Science and Engineering, 2021
1312021
Feasibility of supervised machine learning for cloud security
D Bhamare, T Salman, M Samaka, A Erbad, R Jain
2016 International Conference on Information Science and Security (ICISS), 1-5, 2016
1212016
Pervasive AI for IoT applications: A Survey on Resource-efficient Distributed Artificial Intelligence
E Baccour, N Mhaisen, AA Abdellatif, A Erbad, A Mohamed, M Hamdi, ...
IEEE Communications Surveys & Tutorials, 2022
1202022
ssHealth: toward secure, blockchain-enabled healthcare systems
AA Abdellatif, AZ Al-Marridi, A Mohamed, A Erbad, CF Chiasserini, ...
IEEE Network 34 (4), 312-319, 2020
1202020
DroneRF dataset: A dataset of drones for RF-based detection, classification and identification
MHDS Allahham, MF Al-Sa'd, A Al-Ali, A Mohamed, T Khattab, A Erbad
Data in brief 26, 104313, 2019
1162019
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad
Computers & Security 89, 101684, 2020
1082020
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data
AA Abdellatif, N Mhaisen, A Mohamed, A Erbad, M Guizani, Z Dawy, ...
Future Generation Computer Systems 128, 406-419, 2022
1022022
TIDCS: A dynamic intrusion detection and classification system based feature selection
Z Chkirbene, A Erbad, R Hamila, A Mohamed, M Guizani, M Hamdi
IEEE access 8, 95864-95877, 2020
882020
Machine learning techniques for network anomaly detection: A survey
S Eltanbouly, M Bashendy, N AlNaimi, Z Chkirbene, A Erbad
2020 IEEE International Conference on Informatics, IoT, and Enabling …, 2020
852020
A survey on recent approaches in intrusion detection system in IoTs
A Tabassum, A Erbad, M Guizani
2019 15th International Wireless Communications & Mobile Computing …, 2019
772019
The system can't perform the operation now. Try again later.
Articles 1–20