.

Browsing School of Arts and Sciences by Author "Otrok, Hadi"

LAUR Repository

Browsing School of Arts and Sciences by Author "Otrok, Hadi"

Sort by: Order: Results:

  • Abualola, Huda; Alhawai, Hessa; Kadadha, Maha; Otrok, Hadi; Mourad, Azzam (2017-03-14)
    Security attacks continue to emerge on daily basis due to the fast growth in the number of smart devices and mobile applications. Attacks take different malware forms such as Spyware and Trojan exploiting different operating ...
  • El-Kassar, A. N.; Haraty, Ramzi A.; Otrok, Hadi (IEEE, 2017-04-05)
    Summary form only given. In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. El-Kassar et al. and El-Kassar and Haraty modified the ElGamal public-key ...
  • Al Ebri, Noura; Otrok, Hadi; Mourad, Azzam; Al-Hammadi, Yousof (IEEE, 2017-03-10)
    In this paper, we address the problem of botnet detection by correlating information from trusted hosts and network. Botnets are groups of compromised computers controlled by a botmaster through a command and control (C&C) ...
  • CEAP 
    Abdel Wahab, Omar; Mourad, Azzam; Otrok, Hadi; Bentahar, Jamal (2017-02-06)
    The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has attracted several contributions in the past ...
  • Otrok, Hadi; Mourad, Azzam; Robert, Jean-Marc; Moati, Nadia; Sanadiki, Hiba (IEEE, 2017-03-09)
    The QOLSR is a multimedia protocol that was designed on top of the Optimized Link State Routing (OLSR) protocol. It considers the Quality of Service (QoS) of the nodes during the selection of the Multi-Point Relay (MPRs) ...
  • Haraty, Ramzi A.; El-Kassar, A. N.; Otrok, Hadi (INSTICC, 2017-06-29)
    In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. El-Kassar et al. and El-Kassar and Haraty modified the ElGamal public-key encryption scheme from ...
  • Haraty, Ramzi A.; El-Kassar, A. N.; Otrok, Hadi (2018-03-22)
  • Haraty, Ramzi A.; El-Kassar, A. N.; Otrok, Hadi (ISCA, 2018-01-23)
  • Haraty, Ramzi A.; El-Kassar, A. N.; Otrok, Hadi (2018-03-22)
  • El Khatib, Amjad; Mourad, Azzam; Otrok, Hadi; Abdel Wahab, Omar; Bentahar, Jamal (IEEE, 2017-03-09)
    In this paper, we address the problem of detecting misbehaving vehicles in Vehicular Ad-Hoc Network using VANET QoS-OLSR, Quality of Service-Optimized Link State Routing protocol. VANET QoS-OLSR is a clustering protocol ...
  • Abdel Wahab, Omar; Otrok, Hadi; Mourad, Azzam (2015-11-24)
    In this paper, we address the problem of detecting misbehaving vehicles in Vehicular Ad Hoc Network (VANET) using Quality of Service Optimized Link State Routing (QoS-OLSR) protocol. According to this protocol, vehicles ...
  • Abdel Wahab, Omar; Otrok, Hadi; Mourad, Azzam (2015-11-24)
    In this paper, we address the problem of cooperation among vehicles in VANET using QoS-OLSR protocol in the presence of selfish nodes. QoS-OLSR is a proactive protocol that considers the Quality of Service (QoS) of the ...
  • Sanadiki, Hiba; Otrok, Hadi; Mourad, Azzam; Robert, Jean-Marc (IEEE, 2017-03-10)
    In this paper, we detect two attacks targeting the QoS-OLSR protocol MANET. The Cluster-based model QoS-OLSR is a multimedia protocol designed on top of Optimized Link State Routing (OLSR) protocol. The quality of service ...
  • Halawi, Bahia; Mourad, Azzam; Otrok, Hadi; Damiani, Ernesto (2021-04-15)
    Due to the high popularity of Twitter, spammers tend to favor its use in spreading their commercial messages. In the context of detecting twitter spams, different statistical and behavioral analysis approaches were proposed. ...
  • Mourad, Azzam; Tout, Hanine; Talhi, Chamseddine; Otrok, Hadi; Yahyaoui, Hamdi (2017-02-06)
    With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Language) has become the widely used de facto standard for managing access to open and distributed service-based environments ...
  • Abdel Wahab, Omar; Bentahar, Jamal; Otrok, Hadi; Mourad, Azzam (IEEE, 2017-03-09)
    Security has been identified to be the principal stumbling-block preventing users and enterprises from moving their businesses to the cloud. The reason is that cloud systems, besides inheriting all the vulnerabilities of ...
  • Abdel Wahab, Omar; Bentahar, Jamal; Otrok, Hadi; Mourad, Azzam (IEEE Xplore, 2018-08-14)
    Insider attacks in which misbehaving Virtual Machines (VMs) take part of the cloud system and learn about its internal vulnerabilities constitute a major threat against cloud resources and infrastructure. This demands ...
  • Abdel Wahab, Omar; Bentahar, Jamal; Otrok, Hadi; Mourad, Azzam (IEEE, 2017-03-09)
    The success and continuation of cloud computing depends to a large extent on the quality and performance of the offered services. We propose in this paper a novel architecture for cloud computing called Community-based ...
  • Tout, Hanine; Mourad, Azzam; Talhi, Chamseddine; Otrok, Hadi; Yahyaoui, Hamdi (2020-09-08)
    Throughout the recent years, Web services security has been the target of many researchers. Particularly, by integrating policies and rules to govern the Web services behaviors at runtime, researchers have been able to ...
  • Mourad, Azzam; Ayoubi, Sara; Yahyaoui, Hamdi; Otrok, Hadi (IEEE, 2017-03-08)
    We propose in this paper a new approach for the dynamic enforcement of Web services security, which is based on a synergy between Aspect-Oriented Programming (AOP) and composition of Web services. Security policies are ...

Search LAUR


Advanced Search

Browse

My Account