Search

Your search keyword '"Mahdi Aiash"' showing total 22 results

Search Constraints

Start Over You searched for: Author "Mahdi Aiash" Remove constraint Author: "Mahdi Aiash" Language english Remove constraint Language: english
22 results on '"Mahdi Aiash"'

Search Results

1. An Introduction of a Modular Framework for Securing 5G Networks and Beyond

2. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

3. IoT-Based Emergency Vehicle Services in Intelligent Transportation System

4. Investigating a Mobility-Aware QoS Model for Multimedia Streaming Rate Adaptation

5. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology

6. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif

7. Formal verification and analysis of primary authentication based on 5G-AKA protocol

8. Investigating network services abstraction in 5G enabled device-to-device (D2D) communications

9. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement

10. Software defined networking for wireless sensor networks: a survey

11. Mobility management for vehicular user equipment in LTE/mobile femtocell networks

12. Interference management for co-channel mobile Femtocells technology in LTE networks

13. A specification-based IDS for detecting attacks on RPL-based network topology

14. U-sphere: strengthening scalable flat-name routing for decentralized networks

15. Challenges and solutions for secure information centric networks: a case study of the NetInf architecture

16. Investigating a Mobility-Aware QoS Model for Multimedia Streaming Rate Adaptation

17. A formally verified access control mechanism for information centric networks

18. Dynamic edge-caching for mobile users: minimising inter-AS traffic by moving cloud services and VMs

19. A survey of potential architectures for communication in heterogeneous networks

20. A formally verified device authentication protocol using Casper/FDR

21. Toward an Efficient Ontology-Based Event Correlation in SIEM

22. A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR

Catalog

Books, media, physical & digital resources