default search action
Sahel Alouneh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Raed Mesleh, Sahel Alouneh, Omar Hiari:
Computational Secure Physical Layer Algorithm for MIMO Wireless Systems. IEEE Syst. J. 18(2): 805-813 (2024) - 2023
- [j26]Sahel Alouneh:
A Multi-Path Approach to Protect DNS Against DDoS Attacks. J. Cyber Secur. Mobil. 12(4): 569-588 (2023) - [j25]Dhiah el Diehn I. Abou-Tair, Raad Haddad, Ala' F. Khalifeh, Sahel Alouneh, Roman Obermaisser:
A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems. Sensors 23(17): 7617 (2023) - [c22]Feras Al-Hawari, Khaled Tayem, Sahel Alouneh, Anass Al-Ksasbeh:
Impact of Virtual Hadoop Cluster Scalability on The Performance of Big Data Mapreduce Applications. ACIT 2023: 1-6 - [c21]Mohammad Al Ja'afreh, Sahel Alouneh, Muath Obaidat, Ali Karime, Abdulmotaleb Elsaddik:
Metaverse through Blockchain and Intelligent Networking: A Comprehensive Survey. BCCA 2023: 426-439 - [c20]Joshua Theoder, Binusha Shabu Metharath, Sahel Alouneh:
Securing Domain Name Systems with Blockchain. IDSTA 2023: 48-53 - [c19]Feras Al-Hawari, Rawan Al-Twal, Hala Barham, Attaa Al-Khaleel, Sahel Alouneh:
Comparative Analysis and Graphic Design Elements to Enhance the Usability of a University Website. SNAMS 2023: 1-8 - 2022
- [j24]Dhiah el Diehn I. Abou-Tair, Alá F. Khalifeh, Sameer Al-Dahidi, Sahel Alouneh, Roman Obermaisser:
Coordination Protocol and Admission Control for Distributed Services in System-of-Systems With Real-Time Requirements. IEEE Access 10: 100194-100207 (2022) - [j23]Mohammad I. Daoud, Aamer Al-Ali, Rami Alazrai, Mahasen Al-Najar, Baha' A. Alsaify, Mostafa Z. Ali, Sahel Alouneh:
An Edge-Based Selection Method for Improving Regions-of-Interest Localizations Obtained Using Multiple Deep Learning Object-Detection Models in Breast Ultrasound Images. Sensors 22(18): 6721 (2022) - [c18]Feras Al-Hawari, Khaled Tayem, Sahel Alouneh, Anass Al-Ksasbeh:
Methodology to Evaluate the Performance of Hadoop MapReduce on a Hyper-V Cluster using SAN Storage. ACIT 2022: 1-6 - [c17]Mohammad Al Ja'afreh, Muath Obaidat, Sahel Alouneh:
Incorporating MPLS for Better SoC Utilization and Traffic Engineering. FMEC 2022: 1-7 - [c16]Mohammad Abu Mhana, Alá F. Khalifeh, Sahel Alouneh:
Performance Comparison of Big Data Processing Utilizing SciDB and Apache Accumulo Databases. FMEC 2022: 1-5 - [c15]Mohammad Al Ja'afreh, Ali Karime, Sahel Alouneh, Abdulmotaleb El-Saddik:
A Detailed Analysis of Qualitative and Quantitative Factors in Realization of 6G Communication. IOTSMS 2022: 1-10 - [c14]Mohammad Al Ja'afreh, Muath Obaidat, Ali Karime, Sahel Alouneh:
Optimizing System-on-Chip Performance Using AI and SDN: Approaches and Challenges. SDS 2022: 1-8 - 2021
- [j22]Alá F. Khalifeh, Khaled Aldahdouh, Sahel Alouneh:
LoRaWAN energy optimization with security consideration. Int. Arab J. Inf. Technol. 18(3A): 476-483 (2021) - [j21]Feras Al-Hawari, Hala Barham, Omar Al-Sawaeer, Mai Alshawabkeh, Sahel Alouneh, Mohammad I. Daoud, Rami Alazrai:
Methods to achieve effective web-based learning management modules: MyGJU versus Moodle. PeerJ Comput. Sci. 7: e498 (2021) - [j20]Dhiah el Diehn I. Abou-Tair, Alá F. Khalifeh, Sahel Alouneh, Roman Obermaisser:
Incremental, Distributed, and Concurrent Service Coordination for Reliable and Deterministic Systems-of-Systems. IEEE Syst. J. 15(2): 2470-2481 (2021) - [c13]Sahel Alouneh, Alá F. Khalifeh, Dhiah el Diehn I. Abou-Tair, Khaled Aldahdouh, Feras Al-Hawari:
An Open Source LoRaWAN Simulator Framework for the Internet of Things Applications. IOTSMS 2021: 1-5 - 2020
- [j19]Gebremariam Mesfin, Gheorghita Ghinea, Tor-Morten Grønli, Sahel Alouneh:
REST4Mobile: A framework for enhanced usability of REST services on smartphones. Concurr. Comput. Pract. Exp. 32(1) (2020) - [j18]Feras Al-Hawari, Mahmoud Al-Ashi, Fares Abawi, Sahel Alouneh:
A practical three-phase ILP approach for solving the examination timetabling problem. Int. Trans. Oper. Res. 27(2): 924-944 (2020) - [c12]Alá F. Khalifeh, Khaled Aldahdouh, Sahel Alouneh:
Optimizing the Energy Consumption Level in LoRaWan Networks. ACIT 2020: 1-6 - [c11]Fadia Shoura, Ammar Gharaibeh, Sahel Alouneh:
Optimization of Migration Cost for Network Function Virtualization Replacement. ACIT 2020: 1-7
2010 – 2019
- 2019
- [j17]Sahel Alouneh, Sa'ed Abed, Mohammad H. Al Shayeji, Raed Mesleh:
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements. Artif. Intell. Rev. 52(4): 2575-2601 (2019) - [j16]Ismail Omar Hababeh, Anton Thabain, Sahel Alouneh:
An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance. KSII Trans. Internet Inf. Syst. 13(1): 86-109 (2019) - [j15]Andreas Biørn-Hansen, Tor-Morten Grønli, Gheorghita Ghinea, Sahel Alouneh:
An Empirical Study of Cross-Platform Mobile Development in Industry. Wirel. Commun. Mob. Comput. 2019: 5743892:1-5743892:12 (2019) - 2018
- [j14]Mohannad J. Alhanahnah, Peter Bertók, Zahir Tari, Sahel Alouneh:
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers. Future Gener. Comput. Syst. 79: 488-499 (2018) - [j13]Sahel Alouneh, Feras Al-Hawari, Ismail Omar Hababeh, Gheorghita Ghinea:
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. Secur. Commun. Networks 2018: 8028960:1-8028960:10 (2018) - [c10]Sahel Alouneh, Ismail Omar Hababeh, Tamer Alajrami:
Toward big data analysis to improve enterprise information security. MEDES 2018: 106-109 - [c9]Alá F. Khalifeh, Dhiah el Diehn I. Abou-Tair, Sahel Alouneh, Roman Obermaisser, Michael Schmidt:
Admission Control and Resource Allocation for Distributed Services in System-of-Systems: Challenges and Potential Solutions. SIES 2018: 1-4 - 2017
- [j12]Raed Mesleh, Salama S. Ikki, Iyad Tumar, Sahel Alouneh:
Decode-and-forward with quadrature spatial modulation in the presence of imperfect channel estimation. Phys. Commun. 24: 103-111 (2017) - [j11]Raed Mesleh, Omar Hiari, Abdelhamid Younis, Sahel Alouneh:
Transmitter Design and Hardware Considerations for Different Space Modulation Techniques. IEEE Trans. Wirel. Commun. 16(11): 7512-7522 (2017) - [c8]Sahel Alouneh, Dhiah el Diehn I. Abou-Tair, Alá F. Khalifeh, Roman Obermaisser:
Service Identification Framework for Systems of Systems Based on MPLS Technology. CSA/CUTE 2017: 359-364 - [c7]Dhiah el Diehn I. Abou-Tair, Sahel Alouneh, Alá F. Khalifeh, Roman Obermaisser:
A Security Framework for Systems-of-Systems. CSA/CUTE 2017: 427-432 - [c6]Sahel Alouneh:
GMPLS/MPLS Wireless Networks. MEDES 2017: 228-234 - 2016
- [j10]Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh:
A Multidimension Taxonomy of Insider Threats in Cloud Computing. Comput. J. 59(11): 1612-1622 (2016) - [j9]Sahel Alouneh, Sa'ed Abed, George Ghinea:
Security of VoIP traffic over low or limited bandwidth networks. Secur. Commun. Networks 9(18): 5591-5599 (2016) - 2014
- [j8]Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Ahmad Al-Khasawneh:
Software comprehension based on database relational algebra. Int. J. Inf. Commun. Technol. 6(1): 58-70 (2014) - [j7]Sahel Alouneh, Sa'ed Abed, Mazen Kharbutli, Bassam Jamil Mohd:
MPLS technology in wireless networks. Wirel. Networks 20(5): 1037-1051 (2014) - 2013
- [j6]Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Mazen Kharbutli:
An Efficient Backup Technique for Database Systems Based on Threshold Sharing. J. Comput. 8(11): 2980-2989 (2013) - [c5]Sahel Alouneh, Mazen Kharbutli, Rana AlQurem:
Stack Memory Buffer Overflow Protection based on Duplication and Randomization. EUSPN/ICTH 2013: 250-256 - 2012
- [j5]Sa'ed Abed, Ashraf Hasan Bqerat, Sahel Alouneh, Bassam Jamil Mohd:
A novel approach to enhance distributed virtual memory. Comput. Electr. Eng. 38(2): 388-398 (2012) - [j4]Sa'ed Abed, Bassam Jamil Mohd, Zaid Al-bayati, Sahel Alouneh:
Low power Wallace multiplier design based on wide counters. Int. J. Circuit Theory Appl. 40(11): 1175-1185 (2012) - 2011
- [c4]Bassam Jamil Mohd, Sa'ed Abed, Bassam Al-Naami, Sahel Alouneh:
Image Steganography Optimization Technique. SPIT/IPC 2011: 205-209
2000 – 2009
- 2009
- [j3]Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal:
MPLS security: an approach for unicast and multicast environments. Ann. des Télécommunications 64(5-6): 391-400 (2009) - [j2]Sahel Alouneh, Anjali Agarwal, Abdeslam En-Nouaary:
A novel path protection scheme for MPLS networks using multi-path routing. Comput. Networks 53(9): 1530-1545 (2009) - 2008
- [c3]Sahel Alouneh, Anjali Agarwal, Abdeslam En-Nouaary:
A New Approach for Security in MPLS Multicast Networks. ICDCIT 2008: 71-82 - 2007
- [j1]Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal:
A Multiple LSPs Approach to Secure Data in MPLS Networks. J. Networks 2(4): 51-58 (2007) - [c2]Sahel Alouneh, Anjali Agarwal, Abdeslam En-Nouaary:
A Multiple Tree Approach for Fault Tolerance in MPLS Networks. ICDCIT 2007: 197-202 - [c1]Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal:
Securing MPLS Networks with Multi-path Routing. ITNG 2007: 809-814
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint