Cyber-physical systems security: Limitations, issues and future trends JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli Microprocessors and microsystems 77, 103201, 2020 | 450 | 2020 |
Adaptive fair channel allocation for QoS enhancement in IEEE 802.11 wireless LANs M Malli, Q Ni, T Turletti, C Barakat 2004 IEEE International Conference on Communications (IEEE Cat. No …, 2004 | 159 | 2004 |
Intelligent eye: A mobile application for assisting blind people M Awad, J El Haddad, E Khneisser, T Mahmoud, E Yaacoub, M Malli 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 1-6, 2018 | 67 | 2018 |
Analysis of TCP latency over wireless links supporting FEC/ARQ-SR for error recovery R Abdelmoumen, M Malli, C Barakat 2004 IEEE International Conference on Communications (IEEE Cat. No …, 2004 | 22 | 2004 |
An efficient approach for content delivery in overlay networks M Malli, C Barakat, W Dabbous Second IEEE Consumer Communications and Networking Conference, 2005. CCNC …, 2005 | 17 | 2005 |
Design and realization of efficient & secure multi-homed systems based on random linear network coding HN Noura, R Melki, M Malli, A Chehab Computer Networks 163, 106886, 2019 | 9 | 2019 |
Landmark-based end-to-end bandwidth inference M Malli, C Barakat, W Dabbous Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 9 | 2006 |
Safe driving: A mobile application for detecting traffic accidents S Jamal, H Zeid, M Malli, E Yaacoub 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), 1-6, 2018 | 8 | 2018 |
Scalable extensible middleware framework for context-aware mobile applications (SCAMMP). H Sbeyti, M Malli, KS Al-Tahat, A Fadlallah, M Youssef J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (3), 77-98, 2016 | 8 | 2016 |
Application of attack graphs in intrusion detection systems: an implementation A Fadlallah, H Sbeity, M Malli, P Lteif International Journal of Computer Networks 8 (1), 1-12, 2016 | 7 | 2016 |
Efficient and Secure Statistical DDoS Detection Scheme. H Majed, HN Noura, O Salman, M Malli, A Chehab ICETE (1), 153-161, 2020 | 6 | 2020 |
Towards Securing LoRaWAN ABP Communication System. HN Noura, O Salman, T Hatoum, M Malli, A Chehab CLOSER, 440-447, 2020 | 6 | 2020 |
A New Model for Rating Users' Profiles in Online Social Networks. M Malli, N Said, A Fadlallah Comput. Inf. Sci. 10 (2), 39-51, 2017 | 6 | 2017 |
Application-level versus Network-level Proximity M Malli, C Barakat, W Dabbous Technologies for Advanced Heterogeneous Networks: First Asian Internet …, 2005 | 6 | 2005 |
CHESS: An application-aware space for enhanced scalable services in overlay networks M Malli, C Barakat, W Dabbous Computer communications 31 (6), 1239-1253, 2008 | 5 | 2008 |
TICP: Transport Information Collection Protocol C Barakat, M Malli, N Naomichi Annals of Telecommunications-annales des télécommunications 61 (1-2), 167-192, 2006 | 5 | 2006 |
Lightweight and secure cipher scheme for multi-homed systems HN Noura, R Melki, M Malli, A Chehab Wireless Networks, 1-18, 2020 | 4 | 2020 |
Effectiveness Assessment Study of the Use of ICT Tools in E-Learning System M Mohammad European scientific journal 10 (7), 2014 | 4 | 2014 |
Survey on fake accounts detection algorithms on online social networks J Shamseddine, M Malli, H Hazimeh The International Conference on Innovations in Computing Research, 375-380, 2022 | 3 | 2022 |
Real-time Bitcoin price tendency awareness via social media content tracking H Moustafa, M Malli, H Hazimeh 2022 10th international symposium on digital forensics and security (ISDFS), 1-6, 2022 | 3 | 2022 |