default search action
Ola Salman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j28]Hassan N. Noura, Zaid Allal, Ola Salman, Khaled Chahine:
Explainable artificial intelligence of tree-based algorithms for fault detection and diagnosis in grid-connected photovoltaic systems. Eng. Appl. Artif. Intell. 139: 109503 (2025) - 2024
- [j27]Zaid Allal, Hassan N. Noura, Ola Salman, Khaled Chahine:
Leveraging the power of machine learning and data balancing techniques to evaluate stability in smart grids. Eng. Appl. Artif. Intell. 133: 108304 (2024) - [j26]Zaid Allal, Hassan N. Noura, Flavien Vernier, Ola Salman, Khaled Chahine:
Wind turbine fault detection and identification using a two-tier machine learning framework. Intell. Syst. Appl. 22: 200372 (2024) - [j25]Raphaël Couturier, Pablo Gregori, Hassan N. Noura, Ola Salman, Abderrahmane Sider:
A deep learning object detection method to improve cluster analysis of two-dimensional data. Multim. Tools Appl. 83(28): 71171-71187 (2024) - 2023
- [j24]Hassan N. Noura, Joseph Azar, Ola Salman, Raphaël Couturier, Kamel Mazouzi:
A deep learning scheme for efficient multimedia IoT data compression. Ad Hoc Networks 138: 102998 (2023) - [j23]Hassan Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
LESCA: LightwEight Stream Cipher Algorithm for emerging systems. Ad Hoc Networks 138: 102999 (2023) - [j22]Hassan N. Noura, Ola Salman, Ali Chehab:
Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms. J. Inf. Secur. Appl. 76: 103514 (2023) - 2022
- [j21]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Efficient and secure selective cipher scheme for MIoT compressed images. Ad Hoc Networks 135: 102928 (2022) - [j20]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. Ann. des Télécommunications 77(5-6): 395-406 (2022) - [j19]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning. Comput. Networks 204: 108684 (2022) - [j18]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A machine learning based framework for IoT device identification and abnormal traffic detection. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j17]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Sec. 21(1): 115-158 (2022) - [j16]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet Things 19: 100544 (2022) - [j15]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices. IEEE Internet Things J. 9(18): 17885-17900 (2022) - [j14]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Novel one round message authentication scheme for constrained IoT devices. J. Ambient Intell. Humaniz. Comput. 13(1): 483-499 (2022) - [j13]Hassan N. Noura, Raphaël Couturier, Ola Salman, Kamel Mazouzi:
DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm. J. Supercomput. 78(12): 14034-14071 (2022) - [j12]Hassan N. Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
LoRCA: Lightweight round block and stream cipher algorithms for IoV systems. Veh. Commun. 34: 100416 (2022) - [c18]Hassan N. Noura, Raphaël Couturier, Joseph Azar, Mohamad Moussa, Ola Salman:
An Efficient and Robust MIoT Communication Solution using a Deep Learning Approach. IWCMC 2022: 366-371 - [c17]Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability. SITIS 2022: 45-52 - [c16]Hassan Noura, Joseph Azar, Raphaël Couturier, Ola Salman:
A Novel Lightweight and Robust Source-Channel Coding Solution for MIoT Communication Based on DL Denoising/Super Resolution Model. SITIS 2022: 203-210 - 2021
- [j11]Hassan N. Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, Raphaël Couturier:
TRESC: Towards redesigning existing symmetric ciphers. Microprocess. Microsystems 87: 103478 (2021) - [j10]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Data representation for CNN based internet traffic classification: a comparative study. Multim. Tools Appl. 80(11): 16951-16977 (2021) - [i4]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
A Survey on Ethical Hacking: Issues and Challenges. CoRR abs/2103.15072 (2021) - [i3]Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab:
Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations. CoRR abs/2103.17028 (2021) - [i2]Hassan N. Noura, Ola Salman, Raphaël Couturier, Abderrahmane Sider:
A Deep Learning Object Detection Method for an Efficient Clusters Initialization. CoRR abs/2104.13634 (2021) - [i1]Hassan N. Noura, Ola Salman, Raphaël Couturier:
A Deep Learning Scheme for Efficient Multimedia IoT Data Compression. CoRR abs/2105.09280 (2021) - 2020
- [j9]Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
DistLog: A distributed logging scheme for IoT forensics. Ad Hoc Networks 98 (2020) - [j8]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A review on machine learning-based approaches for Internet traffic classification. Ann. des Télécommunications 75(11): 673-710 (2020) - [j7]Jean-Paul A. Yaacoub, Mohamad Noura, Hassan N. Noura, Ola Salman, Elias Yaacoub, Raphaël Couturier, Ali Chehab:
Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 105: 581-606 (2020) - [j6]Jean-Paul A. Yaacoub, Hassan Noura, Ola Salman, Ali Chehab:
Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 11: 100218 (2020) - [j5]Hassan Noura, Tarif Hatoum, Ola Salman, Jean-Paul A. Yaacoub, Ali Chehab:
LoRaWAN security survey: Issues, threats and possible mitigation techniques. Internet Things 12: 100303 (2020) - [j4]Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohammad Malli:
Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsystems 77: 103201 (2020) - [j3]Hassan Noura, Mohamad Noura, Ola Salman, Raphaël Couturier, Ali Chehab:
Efficient & secure image availability and content protection. Multim. Tools Appl. 79(31-32): 22869-22904 (2020) - [c15]Hassan N. Noura, Ola Salman, Tarif Hatoum, Mohammad Malli, Ali Chehab:
Towards Securing LoRaWAN ABP Communication System. CLOSER 2020: 440-447 - [c14]Hassan N. Noura, Ola Salman, Ali Chehab:
Efficient and Secure Cipher Scheme for Limited IoT Devices. ICETE (1) 2020: 142-150 - [c13]Hussein Majed, Hassan N. Noura, Ola Salman, Mohammad Malli, Ali Chehab:
Efficient and Secure Statistical DDoS Detection Scheme. ICETE (1) 2020: 153-161 - [c12]Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. ISCC 2020: 1-7 - [c11]Hussein Majed, Hassan N. Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Efficient and Secure Statistical Port Scan Detection Scheme. MSPN 2020: 72-88
2010 – 2019
- 2019
- [j2]Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Preserving data security in distributed fog computing. Ad Hoc Networks 94 (2019) - [c10]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. MLN 2019: 99-116 - [c9]Ali Hussein, Ola Salman, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Machine Learning for Network Resiliency and Consistency. SDS 2019: 146-153 - 2018
- [j1]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
IoT survey: An SDN and fog computing perspective. Comput. Networks 143: 221-246 (2018) - [c8]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A Multi-level Internet Traffic Classifier Using Deep Learning. NOF 2018: 68-75 - [c7]Ola Salman, Louma Chaddad, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Pushing intelligence to the network edge. SDS 2018: 87-92 - 2017
- [c6]Ola Salman, Ayman I. Kayssi, Ali Chehab, Imad H. Elhajj:
Multi-level security for the 5G/IoT ubiquitous network. FMEC 2017: 188-193 - [c5]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
QoS guarantee over hybrid SDN/non-SDN networks. NOF 2017: 141-143 - [c4]Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Software Defined IoT security framework. SDS 2017: 75-80 - 2016
- [c3]Ola Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Identity-based authentication scheme for the Internet of Things. ISCC 2016: 1109-1111 - 2015
- [c2]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
An architecture for the Internet of Things with decentralized data and centralized control. AICCSA 2015: 1-8 - [c1]Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Edge computing enabling the Internet of Things. WF-IoT 2015: 603-608
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint