Follow
Sahel Alouneh
Sahel Alouneh
Professor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)
Verified email at aau.ac.ae - Homepage
Title
Cited by
Cited by
Year
Transmitter design and hardware considerations for different space modulation techniques
R Mesleh, O Hiari, A Younis, S Alouneh
IEEE Transactions on Wireless Communications 16 (11), 7512-7522, 2017
722017
An empirical study of cross-platform mobile development in industry
A Bi°rn-Hansen, TM Gr°nli, G Ghinea, S Alouneh
Wireless Communications and Mobile Computing 2019, 2019
542019
A novel path protection scheme for MPLS networks using multi-path routing
S Alouneh, A Agarwal, A En-Nouaary
Computer Networks 53 (9), 1530-1545, 2009
542009
Context-Aware Multifaceted Trust Framework for evaluating trustworthiness of Cloud Providers
P Bertok, T zahir, S Alouneh
Future Generation Computer Systems, 2017
38*2017
Low power Wallace multiplier design based on wide counters
S Abed, BJ Mohd, Z Al‐bayati, S Alouneh
International Journal of Circuit Theory and Applications 40 (11), 1175-1185, 2012
362012
FPGA hardware of the LSB steganography method
BJ Mohd, S Abed, T Al-Hayajneh, S Alouneh
2012 International Conference on Computer, Information and Telecommunicationá…, 2012
332012
A Multiple LSPs Approach to Secure Data in MPLS Networks.
S Alouneh, A En-Nouaary, A Agarwal
J. Networks 2 (4), 51-58, 2007
262007
Performance evaluation of DigiMesh and ZigBee wireless mesh networks
H Salah, S Alouneh, A Al-Assaf, K Darabkh
2018 International Conference on Wireless Communications, Signal Processingá…, 2018
232018
Information Science and Applications
KJ Kim
Springer, 2015
182015
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
S Alouneh, S Abed, MH Al Shayeji, R Mesleh
Artificial Intelligence Review 52, 2575-2601, 2019
172019
A practical three‐phase ILP approach for solving the examination timetabling problem
F Al‐Hawari, M Al‐Ashi, F Abawi, S Alouneh
International Transactions in Operational Research 27 (2), 924-944, 2020
132020
Review on image steganography
AS Pandit, SR Khope, F Student ..
International Journal of Eng Sci 6115, 2016
132016
MPLS technology in wireless networks
S Alouneh, S Abed, M Kharbutli, BJ Mohd
Wireless networks 20, 1037-1051, 2014
132014
MPLS security: an approach for unicast and multicast environments
S Alouneh, A En-Nouaary, A Agarwal
annals of telecommunications-annales des tÚlÚcommunications 64, 391-400, 2009
122009
A novel approach for fault tolerance in MPLS networks
S Alouneh, A Agarwal, A En-Nouaary
2006 Innovations in Information Technology, 1-5, 2006
112006
An effective classification approach for big data security based on GMPLS/MPLS networks
S Alouneh, F Al-Hawari, I Hababeh, G Ghinea
Security and Communication Networks 2018, 2018
102018
Security of VoIP traffic over low or limited bandwidth networks
S Alouneh, S Abed, G Ghinea
Security and communication networks 9 (18), 5591-5599, 2016
102016
A multidimension taxonomy of insider threats in cloud computing
MJ Alhanahnah, A Jhumka, S Alouneh
The Computer Journal 59 (11), 1612-1622, 2016
102016
Stack memory buffer overflow protection based on duplication and randomization
S Alouneh, M Kharbutli, R AlQurem
Procedia Computer Science 21, 250-256, 2013
102013
Decode-and-forward with quadrature spatial modulation in the presence of imperfect channel estimation
R Mesleh, SS Ikki, I Tumar, S Alouneh
Physical Communication 24, 103-111, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20