default search action
Azzam Mourad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j91]Hani Sami, Ahmad Hammoud, Mohamad Arafeh, Mohamad Wazzeh, Sarhad Arisdakessian, Mario Chahoud, Osama Wehbi, Mohamad Ajaj, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi, Zbigniew Dziong, Ernesto Damiani, Mohsen Guizani:
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions. IEEE Commun. Surv. Tutorials 26(4): 2914-2960 (2024) - [j90]Hani Sami, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Jamal Bentahar, Azzam Mourad:
LearnChain: Transparent and cooperative reinforcement learning on Blockchain. Future Gener. Comput. Syst. 150: 255-271 (2024) - [j89]Mohamed Chiheb Ben Nasr, Paulo Freitas de Araujo-Filho, Georges Kaddoum, Azzam Mourad:
Projected Natural Gradient Method: Unveiling Low-Power Perturbation Vulnerabilities in Deep-Learning-Based Automatic Modulation Classification. IEEE Internet Things J. 11(22): 37032-37044 (2024) - [j88]Feruz K. Elmay, Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Azzam Mourad:
Digital twins and dynamic NFTs for blockchain-based crowdsourced last-mile delivery. Inf. Process. Manag. 61(4): 103756 (2024) - [j87]Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok:
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication. J. Netw. Comput. Appl. 231: 103987 (2024) - [j86]Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad:
Proactive and Intelligent Monitoring and Orchestration of Cloud-Native IP Multimedia Subsystem. IEEE Open J. Commun. Soc. 5: 139-155 (2024) - [j85]Muhsen Alkhalidy, Mohammad Bany Taha, Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad:
Optimizing CP-ABE Decryption in Urban VANETs: A Hybrid Reinforcement Learning and Differential Evolution Approach. IEEE Open J. Commun. Soc. 5: 6535-6545 (2024) - [j84]Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Azzam Mourad:
Crowdsourced vehicles and UAVs for last-mile delivery application using blockchain-hosted matching mechanism. Veh. Commun. 47: 100761 (2024) - [j83]Sawsan AbdulRahman, Ouns Bouachir, Safa Otoum, Azzam Mourad:
CRAS-FL: Clustered resource-aware scheme for federated learning in vehicular networks. Veh. Commun. 47: 100769 (2024) - [c53]Mohamad Wazzeh, Ahmad Hammoud, Mohsen Guizani, Azzam Mourad, Hadi Otrok, Chamseddine Talhi, Zbigniew Dziong, Chang-Dong Wang:
Resource-Aware Split Federated Learning for Fall Detection in the Metaverse. WiMob 2024: 626-631 - [i17]Osama Wehbi, Sarhad Arisdakessian, Mohsen Guizani, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Hoda Alkhzaimi, Bassem Ouni:
Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities. CoRR abs/2405.00394 (2024) - [i16]Mario Chahoud, Azzam Mourad, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
Trust Driven On-Demand Scheme for Client Deployment in Federated Learning. CoRR abs/2405.00395 (2024) - [i15]Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok:
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication. CoRR abs/2405.07174 (2024) - [i14]Mario Chahoud, Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
On-Demand Model and Client Deployment in Federated Learning with Deep Reinforcement Learning. CoRR abs/2405.07175 (2024) - [i13]Zyad Yasser, Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Mohsen Guizani:
Federated Learning and Evolutionary Game Model for Fog Federation Formation. CoRR abs/2405.17437 (2024) - 2023
- [j82]Mohamad Arafeh, Hadi Otrok, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
ModularFed: Leveraging modularity in federated learning frameworks. Internet Things 22: 100694 (2023) - [j81]Anahita Mazloomi, Hani Sami, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Reinforcement Learning Framework for Server Placement and Workload Allocation in Multiaccess Edge Computing. IEEE Internet Things J. 10(2): 1376-1390 (2023) - [j80]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Mohsen Guizani:
A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions. IEEE Internet Things J. 10(5): 4059-4092 (2023) - [j79]Sawsan Abdul Rahman, Hakima Ould-Slimane, Rasel Chowdhury, Azzam Mourad, Chamseddine Talhi, Mohsen Guizani:
Adaptive Upgrade of Client Resources for Improving the Quality of Federated Learning Model. IEEE Internet Things J. 10(5): 4677-4687 (2023) - [j78]Mario Chahoud, Hani Sami, Azzam Mourad, Safa Otoum, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
On-Demand-FL: A Dynamic and Efficient Multicriteria Federated Learning Client Deployment Scheme. IEEE Internet Things J. 10(18): 15822-15834 (2023) - [j77]Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad, Mohsen Guizani:
FedMint: Intelligent Bilateral Client Selection in Federated Learning With Newcomer IoT Devices. IEEE Internet Things J. 10(23): 20884-20898 (2023) - [j76]Mario Chahoud, Safa Otoum, Azzam Mourad:
On the feasibility of Federated Learning towards on-demand client deployment at the edge. Inf. Process. Manag. 60(1): 103150 (2023) - [j75]Mohamad Arafeh, Hakima Ould-Slimane, Hadi Otrok, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
Data independent warmup scheme for non-IID federated learning. Inf. Sci. 623: 342-360 (2023) - [j74]Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad, Ernesto Damiani:
Reward shaping using convolutional neural network. Inf. Sci. 648: 119481 (2023) - [j73]Sawsan AbdulRahman, Safa Otoum, Ouns Bouachir, Azzam Mourad:
Management of Digital Twin-Driven IoT Using Federated Learning. IEEE J. Sel. Areas Commun. 41(11): 3636-3649 (2023) - [j72]Mohamad Wazzeh, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Mohsen Guizani:
Privacy-Preserving Continuous Authentication for Mobile and IoT Systems Using Warmup-Based Federated Learning. IEEE Netw. 37(3): 224-230 (2023) - [j71]Azzam Mourad, Hadi Otrok, Ernesto Damiani, Mérouane Debbah, Nadra Guizani, Shiqiang Wang, Guangjie Han, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi:
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources. IEEE Trans. Netw. Serv. Manag. 20(2): 1441-1445 (2023) - [j70]Ahmad Hammoud, Maria Kantardjian, Amir Najjar, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Nadra Guizani:
Dynamic Fog Federation Scheme for Internet of Vehicles. IEEE Trans. Netw. Serv. Manag. 20(2): 1913-1923 (2023) - [j69]Hani Sami, Reem Saado, Ahmad El Saoudi, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management. IEEE Trans. Netw. Serv. Manag. 20(3): 3428-3442 (2023) - [j68]Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad:
A Survey on Explainable Artificial Intelligence for Cybersecurity. IEEE Trans. Netw. Serv. Manag. 20(4): 5115-5140 (2023) - [j67]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok:
Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients. IEEE Trans. Serv. Comput. 16(4): 2462-2476 (2023) - [j66]Ahmad Hammoud, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Azzam Mourad, Zbigniew Dziong:
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations. IEEE Trans. Serv. Comput. 16(6): 4432-4443 (2023) - [j65]Ahmad Nsouli, Wassim El-Hajj, Azzam Mourad:
Reinforcement learning based scheme for on-demand vehicular fog formation. Veh. Commun. 40: 100571 (2023) - [c52]Sawsan AbdulRahman, Ouns Bouachir, Safa Otoum, Azzam Mourad:
Overcoming Resource Bottlenecks in Vehicular Federated Learning: A Cluster-Based and QoS-Aware Approach. GLOBECOM 2023: 419-424 - [c51]Zyad Yasser, Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Mohsen Guizani:
Towards Stable Federated Fog Formation Using Federated Learning and Evolutionary Game Theory. GLOBECOM 2023: 1235-1240 - [c50]Sawsan Abdul Rahman, Ouns Bouachir, Safa Otoum, Azzam Mourad:
Towards Boosting Federated Learning Convergence: A Computation Offloading & Clustering Approach. ICC 2023: 106-111 - [c49]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok:
Towards Instant Clustering Approach for Federated Learning Client Selection. ICNC 2023: 409-413 - [c48]Mario Chahoud, Azzam Mourad, Hadi Otrok, Mohsen Guizani:
Towards Trust Driven On-Demand Client Deployment in Federated Learning. INFOCOM Workshops 2023: 1-6 - [c47]Osama Wehbi, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Hoda Alkhzaimi, Mohsen Guizani:
Towards Mutual Trust-Based Matching For Federated Learning Client Selection. IWCMC 2023: 1112-1117 - [c46]Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Azzam Mourad:
Blockchain-based Reputation Management Framework for Crowdsourced Last-mile Delivery. IWCMC 2023: 1244-1249 - [c45]Mario Chahoud, Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
Towards On-Demand Deployment of Multiple Clients and Heterogeneous Models in Federated Learning. IWCMC 2023: 1556-1561 - [i12]Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad:
A Survey on Explainable Artificial Intelligence for Network Cybersecurity. CoRR abs/2303.12942 (2023) - [i11]Hani Sami, Ahmad Hammoud, Mohamad Arafeh, Mohamad Wazzeh, Sarhad Arisdakessian, Mario Chahoud, Osama Wehbi, Mohamad Ajaj, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi, Zbigniew Dziong, Ernesto Damiani, Mohsen Guizani:
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions. CoRR abs/2304.09240 (2023) - [i10]Hazem Ibrahim, Fengyuan Liu, Rohail Asim, Balaraju Battu, Sidahmed Benabderrahmane, Bashar Alhafni, Wifag Adnan, Tuka Alhanai, Bedoor K. AlShebli, Riyadh Baghdadi, Jocelyn J. Bélanger, Elena Beretta, Kemal Celik, Moumena Chaqfeh, Mohammed F. Daqaq, Zaynab El Bernoussi, Daryl Fougnie, Borja Garcia de Soto, Alberto Gandolfi, András György, Nizar Habash, J. Andrew Harris, Aaron Kaufman, Lefteris Kirousis, Korhan Kocak, Kangsan Lee, Seungah S. Lee, Samreen Malik, Michail Maniatakos, David Melcher, Azzam Mourad, Minsu Park, Mahmoud Rasras, Alicja Reuben, Dania Zantout, Nancy W. Gleason, Kinga Makovi, Talal Rahwan, Yasir Zaki:
Perception, performance, and detectability of conversational artificial intelligence across 32 university courses. CoRR abs/2305.13934 (2023) - 2022
- [j64]Nadine Abbas, Sanaa Sharafeddine, Azzam Mourad, Chadi Abou-Rjeily, Wissam Fawaz:
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC. Comput. Networks 209: 108900 (2022) - [j63]Hani Sami, Jamal Bentahar, Azzam Mourad, Hadi Otrok, Ernesto Damiani:
Graph convolutional recurrent networks for reward shaping in reinforcement learning. Inf. Sci. 608: 63-80 (2022) - [j62]Ali Srour, Hakima Ould-Slimane, Azzam Mourad, Haidar Harmanani, Cathia Jenainatiy:
Joint theme and event based rating model for identifying relevant influencers on Twitter: COVID-19 case study. Online Soc. Networks Media 31: 100226 (2022) - [j61]Mohamad Chehab, Azzam Mourad:
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT. IEEE Trans. Dependable Secur. Comput. 19(1): 161-175 (2022) - [j60]Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Zbigniew Dziong:
On Demand Fog Federations for Horizontal Federated Learning in IoV. IEEE Trans. Netw. Serv. Manag. 19(3): 3062-3075 (2022) - [j59]Nadine Abbas, Wissam Fawaz, Sanaa Sharafeddine, Azzam Mourad, Chadi Abou-Rjeily:
SVM-Based Task Admission Control and Computation Offloading Using Lyapunov Optimization in Heterogeneous MEC Network. IEEE Trans. Netw. Serv. Manag. 19(3): 3121-3135 (2022) - [j58]Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement. IEEE Trans. Serv. Comput. 15(5): 2671-2684 (2022) - [c44]Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad:
Towards Bilateral Client Selection in Federated Learning Using Matching Game Theory. GLOBECOM 2022: 1-6 - [c43]Mohamad Arafeh, Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Chamseddine Talhi, Zbigniew Dziong:
Independent and Identically Distributed (IID) Data Assessment in Federated Learning. GLOBECOM 2022: 293-298 - [c42]Hala Shamseddine, Safa Otoum, Azzam Mourad:
On the Feasibility of Federated Learning for Neurodevelopmental Disorders: ASD Detection Use-Case. GLOBECOM 2022: 1121-1127 - [c41]Ahmad Nsouli, Azzam Mourad, Wassim El-Hajj:
Reinforcement Learning Based Scheme for On-Demand Vehicular Fog Formation and Micro Services Placement. IWCMC 2022: 1244-1249 - [c40]Peter Farhat, Sarhad Arisdakessian, Omar Abdul Wahab, Azzam Mourad, Hakima Ould-Slimane:
Machine Learning Based Container Placement in On-Demand Clustered Fogs. IWCMC 2022: 1250-1255 - [c39]Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Zbigniew Dziong:
Data-Driven Federated Autonomous Driving. MobiWIS 2022: 79-90 - [i9]Anahita Mazloomi, Hani Sami, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Reinforcement Learning Framework for Server Placement and Workload Allocation in Multi-Access Edge Computing. CoRR abs/2203.07998 (2022) - [i8]Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad, Ernesto Damiani:
Reward Shaping Using Convolutional Neural Network. CoRR abs/2210.16956 (2022) - [i7]Hala Shamseddine, Safa Otoum, Azzam Mourad:
A Federated Learning Scheme for Neuro-developmental Disorders: Multi-Aspect ASD Detection. CoRR abs/2211.00643 (2022) - [i6]Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad, Mohsen Guizani:
FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices. CoRR abs/2211.01805 (2022) - [i5]Mario Chahoud, Hani Sami, Azzam Mourad, Safa Otoum, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme. CoRR abs/2211.02906 (2022) - [i4]Mohamad Wazzeh, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Mohsen Guizani:
Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication. CoRR abs/2211.05662 (2022) - [i3]Mohamad Arafeh, Hadi Otrok, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
ModularFed: Leveraging Modularity in Federated Learning Frameworks. CoRR abs/2212.10427 (2022) - 2021
- [j57]Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Tarik Taleb:
Federated Machine Learning: Survey, Multi-Level Classification, Desirable Criteria and Future Directions in Communication and Networking Systems. IEEE Commun. Surv. Tutorials 23(2): 1342-1397 (2021) - [j56]Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani, Emanuele Bellini:
Ontology based recommender system using social network data. Future Gener. Comput. Syst. 115: 769-779 (2021) - [j55]Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Zbigniew Dziong:
Stable federated fog formation: An evolutionary game theoretical approach. Future Gener. Comput. Syst. 124: 21-32 (2021) - [j54]Azzam Mourad, Hanine Tout, Omar Abdel Wahab, Hadi Otrok, Toufic Dbouk:
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection. IEEE Internet Things J. 8(2): 829-843 (2021) - [j53]Sawsan Abdul Rahman, Hanine Tout, Azzam Mourad, Chamseddine Talhi:
FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning. IEEE Internet Things J. 8(6): 4723-4735 (2021) - [j52]Sawsan Abdul Rahman, Hanine Tout, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Mohsen Guizani:
A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond. IEEE Internet Things J. 8(7): 5476-5497 (2021) - [j51]Hala Shamseddine, Jana Nizam, Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Haidar Harmanani, Zbigniew Dziong:
A Novel Federated Fog Architecture Embedding Intelligent Formation. IEEE Netw. 35(3): 198-204 (2021) - [j50]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game. IEEE Trans. Dependable Secur. Comput. 18(2): 605-622 (2021) - [j49]Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad:
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach. IEEE Trans. Netw. Serv. Manag. 18(3): 3527-3540 (2021) - [j48]Hanine Tout, Azzam Mourad, Nadjia Kara, Chamseddine Talhi:
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading. IEEE/ACM Trans. Netw. 29(3): 1408-1421 (2021) - [j47]Rebeca Estrada, Rabeb Mizouni, Hadi Otrok, Azzam Mourad:
Task coalition formation for Mobile CrowdSensing based on workers' routes preferences. Veh. Commun. 31: 100376 (2021) - 2020
- [j46]Bilal Tay, Azzam Mourad:
Intelligent Performance-Aware Adaptation of Control Policies for Optimizing Banking Teller Process Using Machine Learning. IEEE Access 8: 153403-153412 (2020) - [j45]Mohamed Mejri, Hamdi Yahyaoui, Azzam Mourad, Mohamad Chehab:
A rewriting system for the assessment of XACML policies relationship. Comput. Secur. 97: 101957 (2020) - [j44]Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Haidar Harmanani:
Cloud federation formation using genetic and evolutionary game theoretical models. Future Gener. Comput. Syst. 104: 92-104 (2020) - [j43]Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabeb Mizouni, Jamal Bentahar:
AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions. IEEE Internet Things Mag. 3(2): 68-73 (2020) - [j42]Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok, Azzam Mourad, Gaith Rjoub:
An endorsement-based trust bootstrapping approach for newcomer cloud services. Inf. Sci. 527: 159-175 (2020) - [j41]Sawsan Abdul Rahman, Hanine Tout, Chamseddine Talhi, Azzam Mourad:
Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning? IEEE Netw. 34(6): 310-317 (2020) - [j40]Peter Farhat, Hani Sami, Azzam Mourad:
Reinforcement R-learning model for time scheduling of on-demand fog placement. J. Supercomput. 76(1): 388-410 (2020) - [j39]Hani Sami, Azzam Mourad:
Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment. IEEE Trans. Netw. Serv. Manag. 17(2): 1026-1039 (2020) - [j38]Azzam Mourad, Ali Srour, Haidar M. Harmanani, Cathia Jenainatiy, Mohamad Arafeh:
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions. IEEE Trans. Netw. Serv. Manag. 17(4): 2145-2155 (2020) - [j37]Hani Sami, Azzam Mourad, Wassim El-Hajj:
Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services. IEEE/ACM Trans. Netw. 28(2): 778-790 (2020) - [j36]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Nadjia Kara:
FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory. IEEE/ACM Trans. Netw. 28(4): 1779-1789 (2020) - [j35]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud. IEEE Trans. Serv. Comput. 13(1): 114-129 (2020) - [c38]Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad:
A Framework for Automated Monitoring and Orchestration of Cloud-Native applications. ISNCC 2020: 1-6 - [c37]Chadi Abou-Rjeily, Azzam Mourad:
Optical Spatial Modulation with Improved Energy Harvesting for MIMO FSO Communications. IWCMC 2020: 1474-1479 - [c36]Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning. IWCMC 2020: 1824-1829 - [c35]Rania Islambouli, Zahraa Sweidan, Azzam Mourad, Chadi Abou-Rjeily:
Towards Trust-Aware IoT Hashing Offloading in Mobile Edge Computing. IWCMC 2020: 2216-2221 - [i2]Azzam Mourad, Ali Srour, Haidar Harmanani, Cathia Jenainatiy, Mohamad Arafeh:
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions. CoRR abs/2005.08820 (2020) - [i1]Omar Abdel Wahab, Jamal Bentahar, Robin Cohen, Hadi Otrok, Azzam Mourad:
A two-level solution to fight against dishonest opinions in recommendation-based trust systems. CoRR abs/2006.04803 (2020)
2010 – 2019
- 2019
- [j34]Sawsan Abdul Rahman, Azzam Mourad, May El Barachi:
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation. IEEE Access 7: 163323-163340 (2019) - [j33]Hanine Tout, Nadjia Kara, Chamseddine Talhi, Azzam Mourad:
Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing. Comput. Electr. Eng. 80 (2019) - [j32]Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Omar Abdel Wahab, Jamal Bentahar:
On the Detection of Passive Malicious Providers in Cloud Federations. IEEE Commun. Lett. 23(1): 64-67 (2019) - [j31]Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad:
Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability. IEEE Trans. Cloud Comput. 7(2): 314-328 (2019) - [j30]Toufic Dbouk, Azzam Mourad, Hadi Otrok, Hanine Tout, Chamseddine Talhi:
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading. IEEE Trans. Netw. Serv. Manag. 16(4): 1665-1680 (2019) - [c34]Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani:
Sampling Online Social Networks with Tailored Mining Strategies. SNAMS 2019: 217-222 - 2018
- [j29]Bahia Halawi, Azzam Mourad, Hadi Otrok, Ernesto Damiani:
Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach. IEEE Access 6: 63890-63904 (2018) - [j28]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game. IEEE Trans. Serv. Comput. 11(1): 184-201 (2018) - [j27]Sawsan Abdul Rahman, Azzam Mourad, May El Barachi, Wael Al Orabi:
A novel on-demand vehicular sensing framework for traffic condition monitoring. Veh. Commun. 12: 165-178 (2018) - [c33]Ahmad Nsouli, Azzam Mourad, Danielle Azar:
Towards Proactive Social Learning Approach for Traffic Event Detection based on Arabic Tweets. IWCMC 2018: 1501-1506 - 2017
- [j26]Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad:
Smart mobile computation offloading: Centralized selective and multi-objective approach. Expert Syst. Appl. 80: 1-13 (2017) - [c32]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Omar Abdel Wahab, Azzam Mourad:
On the Effects of User Ratings on the Profitability of Cloud Services. ICWS 2017: 1-8 - [c31]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud. ICWS 2017: 728-735 - 2016
- [j25]Azzam Mourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui:
From model-driven specification to design-level set-based analysis of XACML policies. Comput. Electr. Eng. 52: 65-79 (2016) - [j24]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
A Stackelberg game for distributed formation of business-driven services communities. Expert Syst. Appl. 45: 359-372 (2016) - [j23]Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks. Expert Syst. Appl. 50: 40-54 (2016) - [c30]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud? SCC 2016: 316-323 - [c29]Wael AlRahal AlOrabi, Sawsan Abdul Rahman, May El Barachi, Azzam Mourad:
Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service. ANT/SEIT 2016: 345-352 - [c28]Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok, Azzam Mourad:
An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability. ANT/SEIT 2016: 465-471 - [c27]Toufic Dbouk, Azzam Mourad, Hadi Otrok, Chamseddine Talhi:
Towards ad-hoc cloud based approach for mobile intrusion detection. WiMob 2016: 1-8 - 2015
- [j22]Hussein Jebbaoui, Azzam Mourad, Hadi Otrok, Ramzi A. Haraty:
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies. Comput. Electr. Eng. 44: 91-103 (2015) - [j21]Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok:
AOMD approach for context-adaptable and conflict-free Web services composition. Comput. Electr. Eng. 44: 200-217 (2015) - [j20]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
A survey on trust and reputation models for Web services: Single, composite, and communities. Decis. Support Syst. 74: 121-134 (2015) - [j19]Azzam Mourad, Hussein Jebbaoui:
SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services. Expert Syst. Appl. 42(1): 165-178 (2015) - [c26]Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad:
Towards an offloading approach that augments multi-persona performance and viability. CCNC 2015: 455-460 - [c25]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Misbehavior Detection Framework for Community-Based Cloud Computing. FiCloud 2015: 181-188 - [c24]Amjad El Khatib, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Jamal Bentahar:
A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol. ICUWB 2015: 1-5 - [c23]Zakaria Maamar, Hamdi Yahyaoui, Azzam Mourad, Mohamed Sellami:
Analyzing Social Web Services' Capabilities. WETICE 2015: 122-127 - 2014
- [j18]Omar Abdel Wahab, Hadi Otrok, Azzam Mourad:
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Comput. Commun. 41: 43-54 (2014) - [j17]Ramzi A. Haraty, Mirna Naous, Azzam Mourad:
Assuring consistency in mixed models. J. Comput. Sci. 5(4): 653-663 (2014) - [j16]Omar Abdel Wahab, Hadi Otrok, Azzam Mourad:
A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol. Wirel. Pers. Commun. 75(3): 1635-1667 (2014) - [j15]Nadia Moati, Hadi Otrok, Azzam Mourad, Jean-Marc Robert:
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol. Wirel. Pers. Commun. 75(3): 1747-1768 (2014) - [c22]Azzam Mourad, Hussein Jebbaoui:
Towards efficient evaluation of XACML policies. PST 2014: 164-171 - 2013
- [j14]Omar Abdel Wahab, Hadi Otrok, Azzam Mourad:
VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks. Comput. Commun. 36(13): 1422-1435 (2013) - [j13]Sara Ayoubi, Azzam Mourad, Hadi Otrok, Ahmad Shahin:
New XACML-AspectBPEL approach for composite web services security. Int. J. Web Grid Serv. 9(2): 127-145 (2013) - [j12]Dima Alhadidi, Azzam Mourad, Hakim Idrissi Kaitouni, Mourad Debbabi:
Common weaving approach in mainstream languages for software security hardening. J. Syst. Softw. 86(10): 2654-2674 (2013) - [j11]Hanine Tout, Azzam Mourad, Hadi Otrok:
XrML-RBLicensing approach adapted to the BPEL process of composite web services. Serv. Oriented Comput. Appl. 7(3): 217-230 (2013) - [c21]Noura Al Ebri, Hadi Otrok, Azzam Mourad, Yousof Al-Hammadi:
Botnet detection: A cooperative game theoretical correlation-based model. ICCIT 2013: 28-32 - [c20]Hiba Sanadiki, Hadi Otrok, Azzam Mourad, Jean-Marc Robert:
Detecting attacks in QoS-OLSR protocol. IWCMC 2013: 1126-1131 - 2012
- [j10]Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok:
A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security. Int. J. Web Grid Serv. 8(4): 361-385 (2012) - [j9]Hamdi Yahyaoui, Azzam Mourad, Mohammed Almulla, Lina Yao, Quan Z. Sheng:
A synergy between context-aware policies and AOP to achieve highly adaptable Web services. Serv. Oriented Comput. Appl. 6(4): 379-392 (2012) - [c19]Hajer Al Housani, Hadi Otrok, Rabeb Mizouni, Jean-Marc Robert, Azzam Mourad:
Towards Smart Anti-Malwares for Battery-Powered Devices. NTMS 2012: 1-4 - [c18]Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok:
Towards a BPEL model-driven approach for Web services security. PST 2012: 120-127 - 2011
- [j8]Azzam Mourad, Hadi Otrok, Lama Baajour:
New Approach Targeting Security Patterns Development and Deployment. Inf. Secur. J. A Glob. Perspect. 20(4-5): 231-244 (2011) - [c17]Azzam Mourad, Hadi Otrok, Sara Ayoubi:
Toward Systematic Integration of Security Policies into Web Services. EISIC 2011: 220-223 - [c16]Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour:
Toward an abstract language on top of XACML for web services security. ICITST 2011: 254-259 - [c15]Hadi Otrok, Azzam Mourad, Jean-Marc Robert, Nadia Moati, Hiba Sanadiki:
A cluster-based model for QoS-OLSR protocol. IWCMC 2011: 1099-1104 - [c14]Hamdi Yahyaoui, L. Wang, Azzam Mourad, Mohammed Almulla, Quan Z. Sheng:
Towards context-adaptable Web service policies. ANT/MobiWIS 2011: 610-617 - 2010
- [j7]Robert Charpentier, Mourad Debbabi, Dima Alhadidi, Azzam Mourad, Nadia Belblidia, Amine Boukhtouta, Aiman Hanna, Rachid Hadjidj, Hakim Idrissi Kaitouni, Marc-André Laverdière, Hai Zhou Ling, Syrine Tlili, Xiaochun Yang, Zhenrong Yang:
Security Evaluation and Hardening of Free and Open Source Software (FOSS). Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [c13]Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok:
New approach for the dynamic enforcement of Web services security. PST 2010: 189-196 - [c12]Azzam Mourad, Hadi Otrok, Lama Baajour:
A Novel Approach for the Development and Deployment of Security Patterns. SocialCom/PASSAT 2010: 914-919
2000 – 2009
- 2009
- [j6]Azzam Mourad, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi:
New aspect-oriented constructs for security hardening concerns. Comput. Secur. 28(6): 341-358 (2009) - [j5]Azzam Mourad, Marc-André Laverdière, Andrei Soeanu, Mourad Debbabi:
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité. Tech. Sci. Informatiques 28(5): 611-644 (2009) - [c11]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - 2008
- [j4]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
An aspect-oriented approach for the systematic security hardening of code. Comput. Secur. 27(3-4): 101-114 (2008) - [j3]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-level Aspect-oriented-based Framework for Software Security Hardening. Inf. Secur. J. A Glob. Perspect. 17(2): 56-74 (2008) - [c10]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Cross-Language Weaving Approach Targeting Software Security Hardening. PST 2008: 87-98 - [c9]Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Towards Language-Independent Approach for Security Concerns Weaving. SECRYPT 2008: 460-465 - [r1]Mourad Debbabi, Marc-André Laverdière, Azzam Mourad, Syrine Tlili:
Wireless Applications: Middleware Security. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [c8]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Towards an Aspect Oriented Approach for the Security Hardening of Code. AINA Workshops (1) 2007: 595-600 - [c7]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A Security Hardening Language Based on Aspect-Orientation. ICETE (Selected Papers) 2007: 254-266 - [c6]Marc-André Laverdière, Azzam Mourad, Andrei Soeanu, Mourad Debbabi:
Control Flow Based Pointcuts for Security Hardening Concerns. IFIPTM 2007: 301-316 - [c5]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-Level Aspect-Oriented based Language for Software Security Hardening. SECRYPT 2007: 363-370 - [c4]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. WOSIS 2007: 123-130 - 2006
- [j2]Mourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui:
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. Sci. Comput. Program. 59(1-2): 38-63 (2006) - [c3]Marc-André Laverdière, Azzam Mourad, Aiman Hanna, Mourad Debbabi:
Security Design Patterns: Survey and Evaluation. CCECE 2006: 1605-1608 - [c2]Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Security hardening of open source software. PST 2006: 43 - 2005
- [j1]Mourad Debbabi, Azzam Mourad, Chamseddine Talhi, Hamdi Yahyaoui:
Accelerating embedded Java for mobile devices. IEEE Commun. Mag. 43(9): 80-85 (2005) - [c1]Mourad Debbabi, Azzam Mourad, Nadia Tawbi:
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. SAC 2005: 874-878
Coauthor Index
aka: Sawsan AbdulRahman
aka: Omar Abdul Wahab
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint