Trust-based security for wireless ad hoc and sensor networks A Boukerch, L Xu, K El-Khatib Computer Communications 30 (11-12), 2413-2427, 2007 | 430 | 2007 |
Human activity recognition using inertial sensors in a smartphone: An overview W Sousa Lima, E Souto, K El-Khatib, R Jalali, J Gama Sensors 19 (14), 3213, 2019 | 269 | 2019 |
SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks A Boukerche, K El-Khatib, L Xu, L Korba 29th Annual IEEE International Conference on Local Computer Networks, 618-624, 2004 | 247 | 2004 |
Privacy and security in e-learning K El-Khatib, L Korba, Y Xu, G Yee International Journal of Distance Education Technologies (IJDET) 1 (4), 1-19, 2003 | 165 | 2003 |
Smart city architecture for community level services through the internet of things R Jalali, K El-Khatib, C McGregor 2015 18th International Conference on Intelligence in Next Generation …, 2015 | 141 | 2015 |
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks A Boukerche, K El-Khatib, L Xu, L Korba computer communications 28 (10), 1193-1203, 2005 | 114 | 2005 |
A novel solution for achieving anonymity in wireless ad hoc networks A Boukerche, K El-Khatib, L Xu, L Korba Proceedings of the 1st ACM international workshop on Performance evaluation …, 2004 | 109 | 2004 |
Impact of feature reduction on the efficiency of wireless intrusion detection systems K El-Khatib IEEE TRANSACTIONS on parallel and distributed systems 21 (8), 1143-1149, 2009 | 101 | 2009 |
A survey of privacy enhancing technologies for smart cities J Curzon, A Almehmadi, K El-Khatib Pervasive and Mobile Computing 55, 76-95, 2019 | 89 | 2019 |
Secure dynamic distributed routing algorithm for ad hoc wireless networks K El-Khatib, L Korba, R Song, G Yee 2003 International Conference on Parallel Processing Workshops, 2003 …, 2003 | 88 | 2003 |
Biometric identification system based on electrocardiogram data Y Gahi, M Lamrani, A Zoglat, M Guennoun, B Kapralos, K El-Khatib 2008 New Technologies, Mobility and Security, 1-5, 2008 | 86 | 2008 |
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol G Hayes, K El-Khatib 2013 third international conference on communications and information …, 2013 | 79 | 2013 |
Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles J Whelan, T Sangarapillai, O Minawi, A Almehmadi, K El-Khatib Proceedings of the 16th ACM symposium on QoS and security for wireless and …, 2020 | 75 | 2020 |
A secure database system using homomorphic encryption schemes Y Gahi, M Guennoun, K El-Khatib arXiv preprint arXiv:1512.03498, 2015 | 74 | 2015 |
Private key agreement and secure communication for heterogeneous sensor networks SMM Rahman, K El-Khatib Journal of Parallel and Distributed Computing 70 (8), 858-870, 2010 | 70 | 2010 |
Using clustering for target tracking in vehicular ad hoc networks S Khakpour, RW Pazzi, K El-Khatib Vehicular communications 9, 83-96, 2017 | 65 | 2017 |
Device and method for providing intent-based access control AM Almehmadi, ELK Khalil US Patent 9,703,952, 2017 | 64 | 2017 |
Evaluation of deep learning in detecting unknown network attacks U Sabeel, SS Heydari, H Mohanka, Y Bendhaou, K Elgazzar, K El-Khatib 2019 International Conference on Smart Applications, Communications and …, 2019 | 62 | 2019 |
Artificial intelligence for intrusion detection systems in unmanned aerial vehicles J Whelan, A Almehmadi, K El-Khatib Computers and Electrical Engineering 99, 107784, 2022 | 61 | 2022 |
On the possibility of insider threat prevention using intent-based access control (IBAC) A Almehmadi, K El-Khatib IEEE Systems Journal 11 (2), 373-384, 2015 | 61 | 2015 |