default search action
Fadi El-Moussa 0001
Person information
- affiliation: British Telecom, Ipswich, United Kingdom
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Safwana Haque, Fadi El-Moussa, Nikos Komninos, Muttukrishnan Rajarajan:
A Systematic Review of Data-Driven Attack Detection Trends in IoT. Sensors 23(16): 7191 (2023) - [c19]Safwana Haque, Fadi El-Moussa, Nikos Komninos, Muttukrishnan Rajarajan:
Identification of Important Features at Different IoT layers for Dynamic Attack Detection. BigDataSecurity/HPSC/IDS 2023: 84-90 - [c18]Tom Bowman, Nektarios Georgalas, Andrew Reeves, Andrew Ennis, Cathryn Peoples, Brendan Black, Fadi El-Moussa, Adrian Moore:
Proactive Device Management for the Internet of Things. TrustCom 2023: 1887-1892 - 2021
- [j3]Davide Ferraris, Daniel Bastos, M. Carmen Fernández Gago, Fadi El-Moussa:
A trust model for popular smart home devices. Int. J. Inf. Sec. 20(4): 571-587 (2021) - 2020
- [c17]Lotfi Mhamdi, Desmond C. McLernon, Fadi El-Moussa, Syed Ali Raza Zaidi, Mounir Ghogho, Tuan A. Tang:
A Deep Learning Approach Combining Autoencoder with One-class SVM for DDoS Attack Detection in SDNs. COMNET 2020: 1-6
2010 – 2019
- 2019
- [c16]Maurizio Colombo, Rasool Asal, Quang Hieu Hieu, Fadi Ali El-Moussa, Ali Sajjad, Theo Dimitrakos:
Data Protection as a Service in the Multi-Cloud Environment. CLOUD 2019: 81-85 - 2018
- [c15]Ian Herwono, Fadi Ali El-Moussa:
Automated Detection of the Early Stages of Cyber Kill Chain. ICISSP 2018: 182-189 - 2017
- [c14]Ian Herwono, Fadi Ali El-Moussa:
A System for Detecting Targeted Cyber-Attacks Using Attack Patterns. ICISSP (Revised Selected Papers) 2017: 20-34 - [c13]Ian Herwono, Fadi Ali El-Moussa:
A Collaborative Tool for Modelling Multi-stage Attacks. ICISSP 2017: 312-317 - 2016
- [c12]Gery Ducatel, Joshua Daniel, Theo Dimitrakos, Fadi Ali El-Moussa, Robert Rowlingson, Ali Sajjad:
Managed security service distribution model. CCIS 2016: 404-408 - [c11]Mark Shackleton, Fadi Ali El-Moussa, Robert Rowlingson, Alex Healing, John Crowther, Joshua Daniel, Theo Dimitrakos, Ali Sajjad:
Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper). OTM Conferences 2016: 883-889 - 2015
- [c10]Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos:
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment. CNS 2015: 638-642 - [c9]Joshua Daniel, Fadi Ali El-Moussa, Gery Ducatel, Pramod S. Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos:
Integrating Security Services in Cloud Service Stores. IFIPTM 2015: 226-239 - 2014
- [c8]Joshua Daniel, Theodosis Dimitrakos, Fadi Ali El-Moussa, Gery Ducatel, Pramod S. Pawar, Ali Sajjad:
Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. CloudCom 2014: 1021-1026 - [c7]Andrew J. Paverd, Fadi El-Moussa, Ian Brown:
Characteristic-based security analysis of personal networks. UbiComp Adjunct 2014: 979-986 - 2013
- [c6]Yair Diaz-Tellez, Eliane L. Bodanese, Fadi Ali El-Moussa, Theo Dimitrakos:
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices. SocialCom 2013: 630-636 - 2012
- [c5]Pramod S. Pawar, Srijith K. Nair, Fadi Ali El-Moussa, Theo Dimitrakos, Muttukrishnan Rajarajan, Andrea Zisman:
Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. CloudComp 2012: 103-113 - [c4]Abdullahi Arabo, Fadi El-Moussa:
Security framework for smart devices. CyberSec 2012: 82-87 - [c3]Abdullahi Arabo, Ian Brown, Fadi El-Moussa:
Privacy in the Age of Mobility and Smart Devices in Smart Homes. SocialCom/PASSAT 2012: 819-826 - 2010
- [j2]Eve M. Schooler, Carl Livadas, Joohwan Kim, Prashant Gandhi, Pablo R. Passera, Jaideep Chandrashekar, Steve Orrin, Martin Koyabe, Fadi El-Moussa, Gogobada Daa Dabibi:
Collaborative defence as a pervasive service: architectural insights and validation methodologies of a trial deployment. Int. J. Sens. Networks 8(2): 65-76 (2010)
2000 – 2009
- 2009
- [c2]Fadi El-Moussa, Parmindher Mudhar, Andy Jones:
Overview of SIP Attacks and Countermeasures. ISDF 2009: 82-91 - [c1]Eve M. Schooler, Carl Livadas, Joohwan Kim, Prashant Gandhi, Pablo R. Passera, Jaideep Chandrashekar, Steve Orrin, Martin Koyabe, Fadi El-Moussa, Gogobada Daa Dabibi:
Collaborative defense as a pervasive service Architectural insights and validation methodologies of a trial deployment. TRIDENTCOM 2009: 1-6 - 2007
- [j1]Fadi Ali El-Moussa, Nigel Linge, Martin Hope:
Active router approach to defeating denial-of-service attacks in networks. IET Commun. 1(1): 55-63 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint