Sahel Alouneh
Sahel Alouneh
Professor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)
Verified email at - Homepage
Cited by
Cited by
Transmitter design and hardware considerations for different space modulation techniques
R Mesleh, O Hiari, A Younis, S Alouneh
IEEE Transactions on Wireless Communications 16 (11), 7512-7522, 2017
An empirical study of cross‐platform mobile development in industry
A Bi°rn-Hansen, TM Gr°nli, G Ghinea, S Alouneh
Wireless Communications and Mobile Computing 2019 (1), 5743892, 2019
A novel path protection scheme for MPLS networks using multi-path routing
S Alouneh, A Agarwal, A En-Nouaary
Computer Networks 53 (9), 1530-1545, 2009
Context-Aware Multifaceted Trust Framework for evaluating trustworthiness of Cloud Providers
P Bertok, T zahir, S Alouneh
Future Generation Computer Systems, 2017
Low power Wallace multiplier design based on wide counters
S Abed, BJ Mohd, Z Al‐bayati, S Alouneh
International Journal of Circuit Theory and Applications 40 (11), 1175-1185, 2012
FPGA hardware of the LSB steganography method
BJ Mohd, S Abed, T Al-Hayajneh, S Alouneh
2012 International Conference on Computer, Information and Telecommunicationá…, 2012
Performance evaluation of DigiMesh and ZigBee wireless mesh networks
H Salah, S Alouneh, A Al-Assaf, K Darabkh
2018 International Conference on Wireless Communications, Signal Processingá…, 2018
A Multiple LSPs Approach to Secure Data in MPLS Networks.
S Alouneh, A En-Nouaary, A Agarwal
J. Networks 2 (4), 51-58, 2007
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
S Alouneh, S Abed, MH Al Shayeji, R Mesleh
Artificial Intelligence Review 52, 2575-2601, 2019
A csi-based multi-environment human activity recognition framework
BA Alsaify, MM Almazari, R Alazrai, S Alouneh, MI Daoud
Applied Sciences 12 (2), 930, 2022
A practical three‐phase ILP approach for solving the examination timetabling problem
F Al‐Hawari, M Al‐Ashi, F Abawi, S Alouneh
International Transactions in Operational Research 27 (2), 924-944, 2020
Review on image steganography
AS Pandit, SR Khope, F Student ..
International Journal of Eng Sci 6115, 2016
A multidimension taxonomy of insider threats in cloud computing
MJ Alhanahnah, A Jhumka, S Alouneh
The Computer Journal 59 (11), 1612-1622, 2016
Information Science and Applications
KJ Kim
Springer, 2015
MPLS technology in wireless networks
S Alouneh, S Abed, M Kharbutli, BJ Mohd
Wireless networks 20, 1037-1051, 2014
A novel approach for fault tolerance in MPLS networks
S Alouneh, A Agarwal, A En-Nouaary
2006 Innovations in Information Technology, 1-5, 2006
LoRaWAN energy optimization with security consideration.
AF Khalifeh, K Aldahdouh, S Alouneh
Int. Arab J. Inf. Technol. 18 (3A), 476-483, 2021
Security of VoIP traffic over low or limited bandwidth networks
S Alouneh, S Abed, G Ghinea
Security and communication networks 9 (18), 5591-5599, 2016
Stack memory buffer overflow protection based on duplication and randomization
S Alouneh, M Kharbutli, R AlQurem
Procedia Computer Science 21, 250-256, 2013
MPLS security: an approach for unicast and multicast environments
S Alouneh, A En-Nouaary, A Agarwal
annals of telecommunications-annales des tÚlÚcommunications 64, 391-400, 2009
The system can't perform the operation now. Try again later.
Articles 1–20