UOS_IOTSH_2024: A Comprehensive network traffic dataset for sinkhole attacks in diverse RPL IoT networks
Omar, Aya Abdul Rahman Alchikh, Soudan, Bassel, Altaweel, Ala
Published in Data in brief (01.08.2024)
Published in Data in brief (01.08.2024)
Get full text
Journal Article
Improving Recommender Systems by a Further Factorization of the Factor Matrices
Idhaim, Hasan, Kilani, Yousef, Alsarhan, Ayoub, Aljaidi, Mohammad, Altaweel, Ala, Bouridane, Ahmed, Aldweesh, Amjad
Published in IEEE access (01.01.2023)
Published in IEEE access (01.01.2023)
Get full text
Journal Article
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks
Altaweel, Ala, Aslam, Sidra, Kamel, Ibrahim
Published in Journal of network and computer applications (01.10.2024)
Published in Journal of network and computer applications (01.10.2024)
Get full text
Journal Article
Security attacks in Opportunistic Mobile Networks: A systematic literature review
Altaweel, Ala, Aslam, Sidra, Kamel, Ibrahim
Published in Journal of network and computer applications (01.01.2024)
Published in Journal of network and computer applications (01.01.2024)
Get full text
Journal Article
RSock: A resilient routing protocol for mobile Fog/Edge networks
Altaweel, Ala, Yang, Chen, Stoleru, Radu, Bhunia, Suman, Sagor, Mohammad, Maurice, Maxwell, Blalock, Roger
Published in Ad hoc networks (01.09.2022)
Published in Ad hoc networks (01.09.2022)
Get full text
Journal Article
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks
Altaweel, Ala, Stoleru, Radu, Gu, Guofei, Kumar Maity, Arnab, Bhunia, Suman
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Get full text
Journal Article
EAR: Energy-aware risk-averse routing for disaster response networks
Chao, Mengyuan, Chenji, Harsha, Yang, Chen, Stoleru, Radu, Nikolova, Evdokia, Altaweel, Ala
Published in Ad hoc networks (01.06.2020)
Published in Ad hoc networks (01.06.2020)
Get full text
Journal Article
Exploiting Redundancy in English Language for Hiding Secret Data in Innocent News Articles
Sarfaraz, Ayesha, Alshouraa, Karam, Alaraj, Mustafa, Altaweel, Ala, Kamel, Ibrahim
Published in 2023 Advances in Science and Engineering Technology International Conferences (ASET) (20.02.2023)
Published in 2023 Advances in Science and Engineering Technology International Conferences (ASET) (20.02.2023)
Get full text
Conference Proceeding
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks
Altaweel, Ala, Stoleru, Radu, Gu, Guofei, Maity, Arnab Kumar
Published in 2019 IEEE Conference on Communications and Network Security (CNS) (01.06.2019)
Published in 2019 IEEE Conference on Communications and Network Security (CNS) (01.06.2019)
Get full text
Conference Proceeding
EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures
Altaweel, Ala, Stoleru, Radu, Guofei Gu
Published in 2017 26th International Conference on Computer Communication and Networks (ICCCN) (01.07.2017)
Published in 2017 26th International Conference on Computer Communication and Networks (ICCCN) (01.07.2017)
Get full text
Conference Proceeding
An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds
Mandal, Subhajit, Chen Yang, Altaweel, Ala, Stoleru, Radu
Published in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (01.10.2015)
Published in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (01.10.2015)
Get full text
Conference Proceeding