default search action
Mahmoud Ammar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo:
FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems. ACM Trans. Internet Things 5(3): 19:1-19:29 (2024) - [c25]Mahmoud Ammar, Ahmed Abdelraoof, Silviu Vlasceanu:
On Bridging the Gap between Control Flow Integrity and Attestation Schemes. USENIX Security Symposium 2024 - [i3]Mahmoud Ammar, Adam Caulfield, Ivan De Oliveira Nunes:
SoK: Runtime Integrity. CoRR abs/2408.10200 (2024) - 2022
- [j11]Michele Grisafi, Mahmoud Ammar, Kasim Sinan Yildirim, Bruno Crispo:
MPI: Memory Protection for Intermittent Computing. IEEE Trans. Inf. Forensics Secur. 17: 3597-3610 (2022) - [c24]Michele Grisafi, Mahmoud Ammar, Bruno Crispo:
On the (in)security of Memory Protection Units : A Cautionary Note. CSR 2022: 157-162 - [c23]Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo:
PISTIS: Trusted Computing Architecture for Low-end Embedded Systems. USENIX Security Symposium 2022: 3843-3860 - 2021
- [c22]Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik:
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation. WISEC 2021: 37-47 - [c21]Hassaan Janjua, Fan Yang, Mahmoud Ammar, David Newton, Seonhi Ro, Sam Michiels, Danny Hughes:
OSLo: Optical Sensor Localization through Mesh Networked Cameras. WOWMOM 2021: 139-148 - 2020
- [j10]Mahmoud Ammar, Bruno Crispo:
WISE: A Lightweight Intelligent Swarm Attestation Scheme for the Internet of Things. ACM Trans. Internet Things 1(3): 19:1-19:30 (2020) - [c20]Mahmoud Ammar, Bruno Crispo:
Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices. ACSAC 2020: 717-732 - [c19]Emekcan Aras, Mahmoud Ammar, Fan Yang, Wouter Joosen, Danny Hughes:
MicroVault: Reliable Storage Unit for IoT Devices. DCOSS 2020: 132-140 - [c18]Mahmoud Ammar, Bruno Crispo, Gene Tsudik:
SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices. ICCPS 2020: 247-258
2010 – 2019
- 2019
- [j9]Mahmoud Ammar, Bruno Crispo, Bart Jacobs, Danny Hughes, Wilfried Daniels:
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(5): 885-901 (2019) - [c17]Ashok Samraj Thangarajan, Mahmoud Ammar, Bruno Crispo, Danny Hughes:
Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs. CAVS 2019: 1-5 - [c16]Hassaan Janjua, Mahmoud Ammar, Bruno Crispo, Danny Hughes:
Towards a standards-compliant pure-software trusted execution environment for resource-constrained embedded devices. SysTEX@SOSP 2019: 6:1-6:6 - 2018
- [j8]Mahmoud Ammar, Giovanni Russello, Bruno Crispo:
Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38: 8-27 (2018) - [c15]Mahmoud Ammar, Wilfried Daniels, Bruno Crispo, Danny Hughes:
SPEED: Secure Provable Erasure for Class-1 IoT Devices. CODASPY 2018: 111-118 - [c14]Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo:
SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things. DSC 2018: 1-8 - [c13]Mahdi Ezzaouia, Cédric Gueguen, Melhem El Helou, Mahmoud Ammar, Xavier Lagrange, Ammar Bouallegue:
A dynamic transmission strategy based on network slicing for cloud radio access networks. Wireless Days 2018: 40-45 - [c12]Mahmoud Ammar, Mahdi Washha, Bruno Crispo:
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective). WiMob 2018: 1-8 - [i2]Mahmoud Ammar, Mahdi Washha, Bruno Crispo:
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective). CoRR abs/1811.07366 (2018) - [i1]Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo:
slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things. CoRR abs/1811.07367 (2018) - 2017
- [j7]Mahdi Ezzaouia, Cédric Gueguen, Mahmoud Ammar, Sébastien Baey, Xavier Lagrange, Ammar Bouallègue:
A Dynamic Inter-cellular Bandwidth Fair Sharing scheduler for future wireless networks. Phys. Commun. 25: 85-99 (2017) - [j6]Nasreddine Mallouki, Bechir Nsiri, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar:
Improvement of downlink LTE system performances using nonlinear equalization methods based on SVM and Wiener-Hammerstein. Wirel. Networks 23(8): 2447-2454 (2017) - [c11]Wilfried Daniels, Danny Hughes, Mahmoud Ammar, Bruno Crispo, Nelson Matthys, Wouter Joosen:
SμV - the security microvisor: a virtualisation-based security middleware for the internet of things. Middleware Industry 2017: 36-42 - [c10]Mahdi Ezzaouia, Cédric Gueguen, Mohamad Yassin, Mahmoud Ammar, Xavier Lagrange, Ammar Bouallegue:
Autonomous and dynamic inter-cell interference coordination techniques for future wireless networks. WiMob 2017: 1-8 - 2016
- [j5]Nasreddine Mallouki, Bechir Nsiri, Sofien Mhatli, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar:
Analysis of Full Volterra and Sparse Volterra Nonlinear Equalization for Downlink LTE System. Wirel. Pers. Commun. 89(4): 1413-1432 (2016) - [j4]Nasreddine Mallouki, Bechir Nsiri, Sofien Mhatli, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar:
Erratum to: Analysis of Full Volterra and Sparse Volterra Nonlinear Equalization for Downlink LTE System. Wirel. Pers. Commun. 89(4): 1433 (2016) - [c9]Nsiri Bechir, Nasreddine Mallouki, Mahmoud Ammar, Walid Hakimi:
Performance evaluation of downlink LTE system with QPP interleaver for channel encoder. ATSIP 2016: 715-720 - [c8]Messaoud Eljamai, Mahmoud Ammar, Ammar Bouallegue:
New iterative-scheduling algorithm for OFDMA systems. ATSIP 2016: 762-766 - 2015
- [j3]Bechir Nsiri, Nasreddine Mallouki, Sofien Mhatli, Mohammad Ghanbarisabagh, Mahmoud Ammar, Walid Hakimi:
Modeling and Performance Evaluation of Novel Scheduling Algorithm for Downlink LTE Cellular Network. Wirel. Pers. Commun. 83(3): 2303-2316 (2015) - [c7]Nasreddine Mallouki, Bechir Nsiri, Sofiene Mhatli, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar, Elias G. Giacoumidis:
Analysis of full volterra nonlinear equalizer for downlink LTE system. WTS 2015: 1-6 - 2014
- [c6]Nsiri Bechir, Nasreddine Mallouki, Messaoud Eljamai, Mahmoud Ammar:
Performance evaluation of downlink LTE system. ATSIP 2014: 492-496 - [c5]Nsiri Bechir, Nasreddine Mallouki, Mahmoud Ammar, Walid Hakimi, Sofien Mhatli:
Novel Scheduling Algorithm for 3GPP Downlink LTE Cellular Network. MoWNet 2014: 116-122 - 2012
- [j2]Walid Hakimi, Mahmoud Ammar:
Performance Evaluation of Space-Time and Harq Diversity in MIMO HSDPA. Int. J. Mob. Comput. Multim. Commun. 4(3): 71-86 (2012) - 2010
- [c4]Messaoud Eljamai, Mohamed Et-tolba, Samir Saoudi, Mahmoud Ammar:
A new SIC-HARQ receiver for the WCDMA enhanced uplink system. IWCMC 2010: 1045-1049
2000 – 2009
- 2008
- [c3]Walid Hakimi, Mahmoud Ammar, Ammar Bouallegue, Samir Saoudi:
A Generalised Wideband Space-Time MIMO Channel Simulator Based on the Geometrical Multi-Radii One-Ring Model. VTC Spring 2008: 1266-1270 - 2007
- [c2]Mohamed Et-tolba, Samir Saoudi, Mahmoud Ammar, Raphaël Visoz:
Iterative Soft Multipath Interference Cancellation Assisted by Hybrid ARQ with Constellation Rearrangement for HSDPA System. VTC Spring 2007: 1990-1994 - 2004
- [c1]Sonia Zaibi, Mahmoud Ammar, Karine Amis, Ramesh Pyndiah, Samir Saoudi:
Block turbo codes for efficient image transmission over wireless channels. VCIP 2004 - 2002
- [j1]Mahmoud Ammar, Thierry Chonavel, Samir Saoudi:
Iterative successive interference cancellation for multi-user DS/CDMA detectors in multipath channels. Ann. des Télécommunications 57(1-2): 105-124 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint