Ayman Kayssi
Ayman Kayssi
Professor of Electrical and Computer Engineering, American University of Beirut
Verified email at - Homepage
Cited by
Cited by
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
W Itani, A Kayssi, A Chehab
Eighth IEEE International Conference on Dependable, Autonomic and Secure …, 2009
SDN Controllers: A Comparative Study
O Salman, IH Elhajj, A Kayssi, A Chehab
18th Mediterranean Electrotechnical Conference (MELECON), 1-6, 2016
Edge Computing Enabling the Internet of Things
O Salman, I Elhajj, A Kayssi, A Chehab
IEEE 2nd World Forum on Internet of Things (WF-IoT), 603-608, 2015
Low Cost Arduino/Android-Based Energy-Efficient Home Automation System with Smart Task Scheduling
K Baraka, M Ghobril, S Malek, R Kanj, A Kayssi
Fifth International Conference on Computational Intelligence, Communication …, 2013
IoT Survey: An SDN and Fog Computing Perspective
O Salman, I Elhajj, A Chehab, A Kayssi
Computer Networks 143, 221-246, 2018
Identity-Based Authentication Scheme for the Internet of Things
O Salman, S Abdallah, IH Elhajj, A Chehab, A Kayssi
IEEE Symposium on Computers and Communication (ISCC), 1109-1111, 2016
Energy-Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing
W Itani, A Kayssi, A Chehab
International Conference on Energy Aware Computing, 1-2, 2010
Analytical Transient Response of CMOS Inverters
AI Kayssi, KA Sakallah, TM Burks
IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1992
A Machine Learning Based Framework for IoT Device Identification and Abnormal Traffic Detection
O Salman, IH Elhajj, A Chehab, A Kayssi
Transactions on Emerging Telecommunications Technologies, e3743, 2019
Flow-Based Intrusion Detection System for SDN
GA Ajaeiya, N Adalian, IH Elhajj, A Kayssi, A Chehab
IEEE Symposium on Computers and Communications (ISCC), 787-793, 2017
Fuzzy Reputation-Based Trust Model
A Tajeddine, A Kayssi, A Chehab, H Artail
Applied Soft Computing 11 (1), 345-355, 2011
The Impact of Signal Transition Time on Path Delay Computation
AI Kayssi, KA Sakallah, TN Mudge
IEEE Transactions on Circuits and Systems II: Analog and Digital Signal …, 1993
A Privacy-Preserving Trust Model for VANETs
A Tajeddine, A Kayssi, A Chehab
10th IEEE International Conference on Computer and Information Technology …, 2010
DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks
RZ El Kaissi, A Kayssi, A Chehab, Z Dawy
Second International Conference on Innovations in Information Technology, 1-10, 2005
J2ME Application-Layer End-to-End Security for M-Commerce
W Itani, A Kayssi
Journal of Network and Computer Applications 27 (1), 13-32, 2004
SDN VANETs in 5G: An Architecture for Resilient Security Services
A Hussein, IH Elhajj, A Chehab, A Kayssi
Fourth International Conference on Software Defined Systems (SDS), 67-74, 2017
FPGA-Based Internet Protocol Firewall Chip
A Kayssi, L Harik, R Ferzli, M Fawaz
7th IEEE International Conference on Electronics, Circuits and Systems …, 2000
Trummar - A Trust Model for Mobile Agent Systems Based on Reputation
G Derbas, A Kayssi, H Artail, A Chehab
IEEE/ACS International Conference on Pervasive Services, 113-120, 2004
Internal Security Attacks on SCADA Systems
N Sayegh, A Chehab, IH Elhajj, A Kayssi
Third International Conference on Communications and Information Technology …, 2013
Signaling Oriented Denial of Service on LTE Networks
R Bassil, A Chehab, I Elhajj, A Kayssi
10th ACM International Symposium on Mobility Management and Wireless Access …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20