A proactive approach to protect cloud computing environment against DDoS attack Md. Mamun Ahmed and Ayman El Hajjar 2023. A proactive approach to protect cloud computing environment against DDoS attack. in: Hamid Jahankhani, Arshad Jamal and Guy Brown (ed.) AI, Blockchain and Self-Sovereign Identity in Higher Education Switzerland Springer. pp. 243-278
Secure routing in IoT networks with SISLOF El Hajjar, A.E., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. 2017 Global Internet of Things Summit (GIoTS). CICG, Geneva 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/giots.2017.8016278
2017
Secure routing in IoT networks with SISLOF El Hajjar, A., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. Global IoT Summit. Geneva, Switzerland 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/GIOTS.2017.8016278
2016
On the Performance of Key Pre-distribution for RPL-based IoT Networks El Hajjar, A., Roussos, G. and Paterson, M. 2016. On the Performance of Key Pre-distribution for RPL-based IoT Networks. Interoperability, Safety and Security in IoT. Paris, France 26 - 27 Oct 2016 Springer. https://doi.org/10.1007/978-3-319-52727-7_9
2016
Securing the Internet of Things Devices Using Pre-Distributed Keys El Hajjar, A. 2016. Securing the Internet of Things Devices Using Pre-Distributed Keys. 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/IC2EW.2016.22
2016
Securing the internet of things devices using pre-distributed keys El Hajjar, A. 2016. Securing the internet of things devices using pre-distributed keys. 2016 IEEE International Conference on Cloud Engineering Workshops (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/ic2ew.2016.22
Usage Statistics
584 total views of outputs
629 total downloads of outputs
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.