Follow
Sahel Alouneh
Sahel Alouneh
Professor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)
Verified email at aau.ac.ae - Homepage
Title
Cited by
Cited by
Year
Transmitter design and hardware considerations for different space modulation techniques
R Mesleh, O Hiari, A Younis, S Alouneh
IEEE Transactions on Wireless Communications 16 (11), 7512-7522, 2017
762017
An empirical study of cross-platform mobile development in industry
A Bi°rn-Hansen, TM Gr°nli, G Ghinea, S Alouneh
Wireless Communications and Mobile Computing 2019, 2019
672019
A novel path protection scheme for MPLS networks using multi-path routing
S Alouneh, A Agarwal, A En-Nouaary
Computer Networks 53 (9), 1530-1545, 2009
542009
Context-Aware Multifaceted Trust Framework for evaluating trustworthiness of Cloud Providers
P Bertok, T zahir, S Alouneh
Future Generation Computer Systems, 2017
44*2017
Low power Wallace multiplier design based on wide counters
S Abed, BJ Mohd, Z Al‐bayati, S Alouneh
International Journal of Circuit Theory and Applications 40 (11), 1175-1185, 2012
382012
FPGA hardware of the LSB steganography method
BJ Mohd, S Abed, T Al-Hayajneh, S Alouneh
2012 International Conference on Computer, Information and Telecommunicationá…, 2012
332012
Performance evaluation of DigiMesh and ZigBee wireless mesh networks
H Salah, S Alouneh, A Al-Assaf, K Darabkh
2018 International Conference on Wireless Communications, Signal Processingá…, 2018
272018
A Multiple LSPs Approach to Secure Data in MPLS Networks.
S Alouneh, A En-Nouaary, A Agarwal
J. Networks 2 (4), 51-58, 2007
262007
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
S Alouneh, S Abed, MH Al Shayeji, R Mesleh
Artificial Intelligence Review 52, 2575-2601, 2019
212019
A CSI-based multi-environment human activity recognition framework
BA Alsaify, MM Almazari, R Alazrai, S Alouneh, MI Daoud
Applied Sciences 12 (2), 930, 2022
152022
A practical three‐phase ILP approach for solving the examination timetabling problem
F Al‐Hawari, M Al‐Ashi, F Abawi, S Alouneh
International Transactions in Operational Research 27 (2), 924-944, 2020
152020
Review on image steganography
AS Pandit, SR Khope, F Student ..
International Journal of Eng Sci 6115, 2016
152016
A multidimension taxonomy of insider threats in cloud computing
MJ Alhanahnah, A Jhumka, S Alouneh
The Computer Journal 59 (11), 1612-1622, 2016
142016
MPLS technology in wireless networks
S Alouneh, S Abed, M Kharbutli, BJ Mohd
Wireless networks 20, 1037-1051, 2014
132014
A novel approach for fault tolerance in MPLS networks
S Alouneh, A Agarwal, A En-Nouaary
2006 Innovations in Information Technology, 1-5, 2006
132006
MPLS security: an approach for unicast and multicast environments
S Alouneh, A En-Nouaary, A Agarwal
annals of telecommunications-annales des tÚlÚcommunications 64, 391-400, 2009
122009
LoRaWAN energy optimization with security consideration.
AF Khalifeh, K Aldahdouh, S Alouneh
Int. Arab J. Inf. Technol. 18 (3A), 476-483, 2021
112021
Stack memory buffer overflow protection based on duplication and randomization
S Alouneh, M Kharbutli, R AlQurem
Procedia Computer Science 21, 250-256, 2013
112013
An effective classification approach for big data security based on GMPLS/MPLS networks
S Alouneh, F Al-Hawari, I Hababeh, G Ghinea
Security and Communication Networks 2018, 2018
102018
Security of VoIP traffic over low or limited bandwidth networks
S Alouneh, S Abed, G Ghinea
Security and communication networks 9 (18), 5591-5599, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20