default search action
Hadi Otrok
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j146]Esraa Odeh, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
Crowdsourced auction-based framework for time-critical and budget-constrained last mile delivery. Inf. Process. Manag. 62(1): 103888 (2025) - 2024
- [j145]Nada Elsokkary, Shakti Singh, Rabeb Mizouni, Hadi Otrok, Hassan R. Barada:
Collaborative Crowdsourced Vehicles for Last-Mile Delivery Application Using Hedonic Cooperative Games. IEEE Access 12: 82506-82520 (2024) - [j144]Ruba Nasser, Rabeb Mizouni, Shakti Singh, Hadi Otrok:
Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges. Ad Hoc Networks 164: 103634 (2024) - [j143]Hani Sami, Ahmad Hammoud, Mohamad Arafeh, Mohamad Wazzeh, Sarhad Arisdakessian, Mario Chahoud, Osama Wehbi, Mohamad Ajaj, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi, Zbigniew Dziong, Ernesto Damiani, Mohsen Guizani:
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions. IEEE Commun. Surv. Tutorials 26(4): 2914-2960 (2024) - [j142]Hani Sami, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Jamal Bentahar, Azzam Mourad:
LearnChain: Transparent and cooperative reinforcement learning on Blockchain. Future Gener. Comput. Syst. 150: 255-271 (2024) - [j141]Menatalla Abououf, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
Feature engineering and deep learning-based approach for event detection in Medical Internet of Things (MIoT). Internet Things 26: 101191 (2024) - [j140]Obadah Habash, Rabeb Mizouni, Shakti Singh, Hadi Otrok:
Gaussian process-based online sensor selection for source localization. Internet Things 28: 101388 (2024) - [j139]Menatalla Abououf, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
Explainable AI for Event and Anomaly Detection and Classification in Healthcare Monitoring Systems. IEEE Internet Things J. 11(2): 3446-3457 (2024) - [j138]Obadah Habash, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
Multiple Source Localization in IoT: A Conditional GAN and Image-Processing-Based Framework. IEEE Internet Things J. 11(4): 7059-7070 (2024) - [j137]Ahmed Alagha, Jamal Bentahar, Hadi Otrok, Shakti Singh, Rabeb Mizouni:
Blockchain-Assisted Demonstration Cloning for Multiagent Deep Reinforcement Learning. IEEE Internet Things J. 11(5): 7710-7723 (2024) - [j136]Feruz K. Elmay, Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Azzam Mourad:
Digital twins and dynamic NFTs for blockchain-based crowdsourced last-mile delivery. Inf. Process. Manag. 61(4): 103756 (2024) - [j135]Ahmed Alagha, Hadi Otrok, Shakti Singh, Rabeb Mizouni, Jamal Bentahar:
Blockchain-based crowdsourced deep reinforcement learning as a service. Inf. Sci. 679: 121107 (2024) - [j134]Shahmir Khan Mohammed, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
TRACE: Transformer-based continuous tracking framework using IoT and MCS. J. Netw. Comput. Appl. 222: 103793 (2024) - [j133]Mohammed Shurrab, Dunia Amin J. Mahboobeh, Rabeb Mizouni, Shakti Singh, Hadi Otrok:
Overcoming cold start and sensor bias: A deep learning-based framework for IoT-enabled monitoring applications. J. Netw. Comput. Appl. 222: 103794 (2024) - [j132]Youssef Ibrahim, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Vinod Khadkikar, Hatem H. Zeineldin:
Blockchain based crowdsourcing framework for Vehicle-to-Vehicle charging. J. Netw. Comput. Appl. 226: 103871 (2024) - [j131]Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok:
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication. J. Netw. Comput. Appl. 231: 103987 (2024) - [j130]Ganivada Phanindra Kumar, Rabeb Mizouni, Tarek H. M. El-Fouly, Shakti Singh, Hadi Otrok:
A Comprehensive Operational Framework for Dispatching Mobile EV Charging Station. IEEE Trans. Intell. Transp. Syst. 25(9): 11023-11039 (2024) - [j129]Baktharahalli Shantaveerappa Umesh, Vinod Khadkikar, Hatem H. Zeineldin, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Akshay Kumar Rathore:
A Combinatory AC and DC Charging Approach for Electric Vehicles. IEEE Trans. Intell. Transp. Syst. 25(11): 15467-15476 (2024) - [j128]Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Azzam Mourad:
Crowdsourced vehicles and UAVs for last-mile delivery application using blockchain-hosted matching mechanism. Veh. Commun. 47: 100761 (2024) - [c62]Mohamad Wazzeh, Ahmad Hammoud, Mohsen Guizani, Azzam Mourad, Hadi Otrok, Chamseddine Talhi, Zbigniew Dziong, Chang-Dong Wang:
Resource-Aware Split Federated Learning for Fall Detection in the Metaverse. WiMob 2024: 626-631 - [i13]Osama Wehbi, Sarhad Arisdakessian, Mohsen Guizani, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Hoda Alkhzaimi, Bassem Ouni:
Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities. CoRR abs/2405.00394 (2024) - [i12]Mario Chahoud, Azzam Mourad, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
Trust Driven On-Demand Scheme for Client Deployment in Federated Learning. CoRR abs/2405.00395 (2024) - [i11]Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok:
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication. CoRR abs/2405.07174 (2024) - [i10]Mario Chahoud, Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
On-Demand Model and Client Deployment in Federated Learning with Deep Reinforcement Learning. CoRR abs/2405.07175 (2024) - [i9]Zyad Yasser, Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Mohsen Guizani:
Federated Learning and Evolutionary Game Model for Fog Federation Formation. CoRR abs/2405.17437 (2024) - 2023
- [j127]Abdeladim Sadiki, Jamal Bentahar, Rachida Dssouli, Abdeslam En-Nouaary, Hadi Otrok:
Deep reinforcement learning for the computation offloading in MIMO-based Edge Computing. Ad Hoc Networks 141: 103080 (2023) - [j126]Ruba Nasser, Zeina Aboulhosn, Rabeb Mizouni, Shakti Singh, Hadi Otrok:
A machine learning-based framework for user recruitment in continuous mobile crowdsensing. Ad Hoc Networks 145: 103175 (2023) - [j125]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari:
A reinforcement learning model for the reliability of blockchain oracles. Expert Syst. Appl. 214: 119160 (2023) - [j124]Ahmed Suliman, Maha Kadadha, Rabeb Mizouni, Hadi Otrok, Ernesto Damiani, Mahmoud Al-Qutayri:
Blockcheck: A consortium blockchain-based conformance checking framework for business processes. Internet Things 21: 100652 (2023) - [j123]Nada Elsokkary, Hadi Otrok, Shakti Singh, Rabeb Mizouni, Hassan R. Barada, Mohammed Omar:
Crowdsourced last mile delivery: Collaborative workforce assignment. Internet Things 22: 100692 (2023) - [j122]Mohamad Arafeh, Hadi Otrok, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
ModularFed: Leveraging modularity in federated learning frameworks. Internet Things 22: 100694 (2023) - [j121]Shahmir Khan Mohammed, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
A deep learning framework for target localization in error-prone environment. Internet Things 22: 100713 (2023) - [j120]Lana Alhaj Hussain, Shakti Singh, Rabeb Mizouni, Hadi Otrok, Ernesto Damiani:
A predictive target tracking framework for IoT using CNN-LSTM. Internet Things 22: 100744 (2023) - [j119]Mohammed Shurrab, Rabeb Mizouni, Shakti Singh, Hadi Otrok:
Reinforcement learning framework for UAV-based target localization applications. Internet Things 23: 100867 (2023) - [j118]Anahita Mazloomi, Hani Sami, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Reinforcement Learning Framework for Server Placement and Workload Allocation in Multiaccess Edge Computing. IEEE Internet Things J. 10(2): 1376-1390 (2023) - [j117]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Mohsen Guizani:
A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions. IEEE Internet Things J. 10(5): 4059-4092 (2023) - [j116]Ahmed Alagha, Rabeb Mizouni, Jamal Bentahar, Hadi Otrok, Shakti Singh:
Multiagent Deep Reinforcement Learning With Demonstration Cloning for Target Localization. IEEE Internet Things J. 10(15): 13556-13570 (2023) - [j115]Mario Chahoud, Hani Sami, Azzam Mourad, Safa Otoum, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
On-Demand-FL: A Dynamic and Efficient Multicriteria Federated Learning Client Deployment Scheme. IEEE Internet Things J. 10(18): 15822-15834 (2023) - [j114]Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad, Mohsen Guizani:
FedMint: Intelligent Bilateral Client Selection in Federated Learning With Newcomer IoT Devices. IEEE Internet Things J. 10(23): 20884-20898 (2023) - [j113]Mohamad Arafeh, Hakima Ould-Slimane, Hadi Otrok, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
Data independent warmup scheme for non-IID federated learning. Inf. Sci. 623: 342-360 (2023) - [j112]Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad, Ernesto Damiani:
Reward shaping using convolutional neural network. Inf. Sci. 648: 119481 (2023) - [j111]Huda Abualola, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Hassan R. Barada:
A matching game-based crowdsourcing framework for last-mile delivery: Ground-vehicles and Unmanned-Aerial Vehicles. J. Netw. Comput. Appl. 213: 103601 (2023) - [j110]Azzam Mourad, Hadi Otrok, Ernesto Damiani, Mérouane Debbah, Nadra Guizani, Shiqiang Wang, Guangjie Han, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi:
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources. IEEE Trans. Netw. Serv. Manag. 20(2): 1441-1445 (2023) - [j109]Ahmad Hammoud, Maria Kantardjian, Amir Najjar, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Nadra Guizani:
Dynamic Fog Federation Scheme for Internet of Vehicles. IEEE Trans. Netw. Serv. Manag. 20(2): 1913-1923 (2023) - [j108]Ahmed Alagha, Shakti Singh, Hadi Otrok, Rabeb Mizouni:
Influence- and Interest-Based Worker Recruitment in Crowdsourcing Using Online Social Networks. IEEE Trans. Netw. Serv. Manag. 20(2): 1924-1936 (2023) - [j107]Hani Sami, Reem Saado, Ahmad El Saoudi, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management. IEEE Trans. Netw. Serv. Manag. 20(3): 3428-3442 (2023) - [j106]Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad:
A Survey on Explainable Artificial Intelligence for Cybersecurity. IEEE Trans. Netw. Serv. Manag. 20(4): 5115-5140 (2023) - [j105]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok:
Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients. IEEE Trans. Serv. Comput. 16(4): 2462-2476 (2023) - [j104]Ahmad Hammoud, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Azzam Mourad, Zbigniew Dziong:
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations. IEEE Trans. Serv. Comput. 16(6): 4432-4443 (2023) - [c61]Zyad Yasser, Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Mohsen Guizani:
Towards Stable Federated Fog Formation Using Federated Learning and Evolutionary Game Theory. GLOBECOM 2023: 1235-1240 - [c60]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok:
Towards Instant Clustering Approach for Federated Learning Client Selection. ICNC 2023: 409-413 - [c59]Mario Chahoud, Azzam Mourad, Hadi Otrok, Mohsen Guizani:
Towards Trust Driven On-Demand Client Deployment in Federated Learning. INFOCOM Workshops 2023: 1-6 - [c58]Huda Abualola, Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Michael Baddeley, Francis Betene, Jean Pierre Giacalone:
QoS-OLSR 2.0: A Quality-of-Service Optimized Link State Routing protocol for Mesh Networks. IWCMC 2023: 1040-1045 - [c57]Osama Wehbi, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Hoda Alkhzaimi, Mohsen Guizani:
Towards Mutual Trust-Based Matching For Federated Learning Client Selection. IWCMC 2023: 1112-1117 - [c56]Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Azzam Mourad:
Blockchain-based Reputation Management Framework for Crowdsourced Last-mile Delivery. IWCMC 2023: 1244-1249 - [c55]Mario Chahoud, Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
Towards On-Demand Deployment of Multiple Clients and Heterogeneous Models in Federated Learning. IWCMC 2023: 1556-1561 - [i8]Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad:
A Survey on Explainable Artificial Intelligence for Network Cybersecurity. CoRR abs/2303.12942 (2023) - [i7]Hani Sami, Ahmad Hammoud, Mohamad Arafeh, Mohamad Wazzeh, Sarhad Arisdakessian, Mario Chahoud, Osama Wehbi, Mohamad Ajaj, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi, Zbigniew Dziong, Ernesto Damiani, Mohsen Guizani:
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions. CoRR abs/2304.09240 (2023) - 2022
- [j103]Abdelrahman AlMahmoud, Ernesto Damiani, Hadi Otrok:
Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics. IEEE Access 10: 34393-34403 (2022) - [j102]Ruba Nasser, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Menatalla Abououf, Maha Kadadha:
A Biometrics-Based Behavioral Trust Framework for Continuous Mobile Crowd Sensing Recruitment. IEEE Access 10: 68582-68597 (2022) - [j101]Maha Kadadha, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
A Context-Aware Blockchain-Based Crowdsourcing Framework: Open Challenges and Opportunities. IEEE Access 10: 93659-93673 (2022) - [j100]Hanane Lamaazi, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Ernesto Damiani:
Trust-3DM: Trustworthiness-Based Data-Driven Decision-Making Framework Using Smart Edge Computing for Continuous Sensing. IEEE Access 10: 133095-133108 (2022) - [j99]Mohammed Shurrab, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
IoT Sensor Selection for Target Localization: A Reinforcement Learning based Approach. Ad Hoc Networks 134: 102927 (2022) - [j98]Hanane Lamaazi, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Ernesto Damiani:
Smart-3DM: Data-driven decision making using smart edge computing in hetero-crowdsensing environment. Future Gener. Comput. Syst. 131: 151-165 (2022) - [j97]Maha Kadadha, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali:
On-chain behavior prediction Machine Learning model for blockchain-based crowdsourcing. Future Gener. Comput. Syst. 136: 170-181 (2022) - [j96]Ahmed Alagha, Shakti Singh, Rabeb Mizouni, Jamal Bentahar, Hadi Otrok:
Target localization using Multi-Agent Deep Reinforcement Learning with Proximal Policy Optimization. Future Gener. Comput. Syst. 136: 342-357 (2022) - [j95]Mohammed Shurrab, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Vinod Khadkikar, Hatem H. Zeineldin:
An Efficient Vehicle-to-Vehicle (V2V) Energy Sharing Framework. IEEE Internet Things J. 9(7): 5315-5328 (2022) - [j94]Menatalla Abououf, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Ernesto Damiani:
Self-Supervised Online and Lightweight Anomaly and Event Detection for IoT Devices. IEEE Internet Things J. 9(24): 25285-25299 (2022) - [j93]Hani Sami, Jamal Bentahar, Azzam Mourad, Hadi Otrok, Ernesto Damiani:
Graph convolutional recurrent networks for reward shaping in reinforcement learning. Inf. Sci. 608: 63-80 (2022) - [j92]Umesh B. S, Vinod Khadkikar, Hatem H. Zeineldin, Shakti Singh, Hadi Otrok, Rabeb Mizouni:
Direct Electric Vehicle to Vehicle (V2V) Power Transfer Using On-Board Drivetrain and Motor Windings. IEEE Trans. Ind. Electron. 69(11): 10765-10775 (2022) - [j91]Mohammed Shurrab, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Vinod Khadkikar, Hatem H. Zeineldin:
A Stable Matching Game for V2V Energy Sharing-A User Satisfaction Framework. IEEE Trans. Intell. Transp. Syst. 23(7): 7601-7613 (2022) - [j90]Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Zbigniew Dziong:
On Demand Fog Federations for Horizontal Federated Learning in IoV. IEEE Trans. Netw. Serv. Manag. 19(3): 3062-3075 (2022) - [j89]Menatalla Abououf, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Ernesto Damiani:
Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model. ACM Trans. Internet Techn. 22(1): 16:1-16:28 (2022) - [j88]Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement. IEEE Trans. Serv. Comput. 15(5): 2671-2684 (2022) - [j87]Huda Abualola, Hadi Otrok, Rabeb Mizouni, Shakti Singh:
A V2V charging allocation protocol for electric vehicles in VANET. Veh. Commun. 33: 100427 (2022) - [c54]Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad:
Towards Bilateral Client Selection in Federated Learning Using Matching Game Theory. GLOBECOM 2022: 1-6 - [c53]Mohamad Arafeh, Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Chamseddine Talhi, Zbigniew Dziong:
Independent and Identically Distributed (IID) Data Assessment in Federated Learning. GLOBECOM 2022: 293-298 - [c52]Maha Kadadha, Huda Abualola, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Francis Betene, Jean Pierre Giacalone:
A Cluster-based Quality-of-Service Optimized Link State Routing protocol for Mesh Networks. IWCMC 2022: 336-341 - [c51]Soufiane El Moudaa, Youssef Ibrahim, Maha Kadadha, Rabeb Mizouni, Hadi Otrok, Shakti Singh:
PackChain: Toward a Blockchain-based Management Platform for Last-mile Delivery. IWCMC 2022: 919-924 - [c50]Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Zbigniew Dziong:
Data-Driven Federated Autonomous Driving. MobiWIS 2022: 79-90 - [i6]Anahita Mazloomi, Hani Sami, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Reinforcement Learning Framework for Server Placement and Workload Allocation in Multi-Access Edge Computing. CoRR abs/2203.07998 (2022) - [i5]Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad, Ernesto Damiani:
Reward Shaping Using Convolutional Neural Network. CoRR abs/2210.16956 (2022) - [i4]Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad, Mohsen Guizani:
FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices. CoRR abs/2211.01805 (2022) - [i3]Mario Chahoud, Hani Sami, Azzam Mourad, Safa Otoum, Hadi Otrok, Jamal Bentahar, Mohsen Guizani:
ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme. CoRR abs/2211.02906 (2022) - [i2]Mohamad Arafeh, Hadi Otrok, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
ModularFed: Leveraging Modularity in Federated Learning Frameworks. CoRR abs/2212.10427 (2022) - 2021
- [j86]Adarsh Ghimire, Selina Shrestha, Hadi Otrok:
A Crowd-Based Efficient Fault-Proof Localization System for IoT and MCS. IEEE Access 9: 62810-62819 (2021) - [j85]Maha Kadadha, Hadi Otrok:
A blockchain-enabled relay selection for QoS-OLSR in urban VANET: A Stackelberg game model. Ad Hoc Networks 117: 102502 (2021) - [j84]Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Tarik Taleb:
Federated Machine Learning: Survey, Multi-Level Classification, Desirable Criteria and Future Directions in Communication and Networking Systems. IEEE Commun. Surv. Tutorials 23(2): 1342-1397 (2021) - [j83]Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Zbigniew Dziong:
Stable federated fog formation: An evolutionary game theoretical approach. Future Gener. Comput. Syst. 124: 21-32 (2021) - [j82]Azzam Mourad, Hanine Tout, Omar Abdel Wahab, Hadi Otrok, Toufic Dbouk:
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection. IEEE Internet Things J. 8(2): 829-843 (2021) - [j81]Ahmed Alagha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Anis Ouali:
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks. J. Netw. Comput. Appl. 177: 102968 (2021) - [j80]Maha Kadadha, Hadi Otrok, Shakti Singh, Rabeb Mizouni, Anis Ouali:
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing. J. Netw. Comput. Appl. 191: 103155 (2021) - [j79]Hala Shamseddine, Jana Nizam, Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Haidar Harmanani, Zbigniew Dziong:
A Novel Federated Fog Architecture Embedding Intelligent Formation. IEEE Netw. 35(3): 198-204 (2021) - [j78]Menatalla Abououf, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Ernesto Damiani:
How Artificial Intelligence and Mobile Crowd Sourcing are Inextricably Intertwined. IEEE Netw. 35(3): 252-258 (2021) - [j77]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game. IEEE Trans. Dependable Secur. Comput. 18(2): 605-622 (2021) - [j76]Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad:
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach. IEEE Trans. Netw. Serv. Manag. 18(3): 3527-3540 (2021) - [j75]Huda Abualola, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Matching game theoretical model for stable relay selection in a UAV-assisted internet of vehicles. Veh. Commun. 27: 100290 (2021) - [j74]Huda Abualola, Hadi Otrok:
Stable coalitions for urban-VANET: A hedonic game approach. Veh. Commun. 30: 100355 (2021) - [j73]Rebeca Estrada, Rabeb Mizouni, Hadi Otrok, Azzam Mourad:
Task coalition formation for Mobile CrowdSensing based on workers' routes preferences. Veh. Commun. 31: 100376 (2021) - 2020
- [j72]Maha Kadadha, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Anis Ouali:
ABCrowd: An Auction Mechanism on Blockchain for Spatial Crowdsourcing. IEEE Access 8: 12745-12757 (2020) - [j71]Menatalla Abououf, Hadi Otrok, Shakti Singh, Rabeb Mizouni, Anis Ouali:
A Misbehaving-Proof Game Theoretical Selection Approach for Mobile Crowd Sourcing. IEEE Access 8: 58730-58741 (2020) - [j70]Hanane Lamaazi, Rabeb Mizouni, Shakti Singh, Hadi Otrok:
A Mobile Edge-Based CrowdSensing Framework for Heterogeneous IoT. IEEE Access 8: 207524-207536 (2020) - [j69]Katty Rohoden, Rebeca Estrada, Hadi Otrok, Zbigniew Dziong:
Evolutionary game theoretical model for stable femtocells' clusters formation in HetNets. Comput. Commun. 161: 266-278 (2020) - [j68]Ehsan Khosrowshahi Asl, Jamal Bentahar, Rebeca Estrada, Hadi Otrok, Rabeb Mizouni, Babak Khosravifar:
Dynamic formation of service communities in the cloud under distribution and incomplete information settings. Concurr. Comput. Pract. Exp. 32(1) (2020) - [j67]Mona Taghavi, Jamal Bentahar, Hadi Otrok:
Two-stage game theoretical framework for IaaS market share dynamics. Future Gener. Comput. Syst. 102: 173-189 (2020) - [j66]Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Haidar Harmanani:
Cloud federation formation using genetic and evolutionary game theoretical models. Future Gener. Comput. Syst. 104: 92-104 (2020) - [j65]Maha Kadadha, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali:
SenseChain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers. Future Gener. Comput. Syst. 105: 650-664 (2020) - [j64]Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabeb Mizouni, Jamal Bentahar:
AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions. IEEE Internet Things Mag. 3(2): 68-73 (2020) - [j63]Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok, Azzam Mourad, Gaith Rjoub:
An endorsement-based trust bootstrapping approach for newcomer cloud services. Inf. Sci. 527: 159-175 (2020) - [j62]Ahmed Alagha, Shakti Singh, Hadi Otrok, Rabeb Mizouni:
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications. J. Netw. Comput. Appl. 170: 102783 (2020) - [j61]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Nadjia Kara:
FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory. IEEE/ACM Trans. Netw. 28(4): 1779-1789 (2020) - [j60]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud. IEEE Trans. Serv. Comput. 13(1): 114-129 (2020) - [j59]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari:
A Blockchain-Based Model for Cloud Service Quality Monitoring. IEEE Trans. Serv. Comput. 13(2): 276-288 (2020) - [j58]Rebeca Estrada, Rabeb Mizouni, Hadi Otrok, Anis Ouali, Jamal Bentahar:
A Crowd-Sensing Framework for Allocation of Time-Constrained and Location-Based Tasks. IEEE Trans. Serv. Comput. 13(5): 769-785 (2020) - [c49]Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning. IWCMC 2020: 1824-1829 - [i1]Omar Abdel Wahab, Jamal Bentahar, Robin Cohen, Hadi Otrok, Azzam Mourad:
A two-level solution to fight against dishonest opinions in recommendation-based trust systems. CoRR abs/2006.04803 (2020)
2010 – 2019
- 2019
- [j57]Menatalla Abououf, Shakti Singh, Hadi Otrok, Rabeb Mizouni, Anis Ouali:
Gale-Shapley Matching Game Selection - A Framework for User Satisfaction. IEEE Access 7: 3694-3703 (2019) - [j56]Ahmed Alagha, Shakti Singh, Rabeb Mizouni, Anis Ouali, Hadi Otrok:
Data-Driven Dynamic Active Node Selection for Event Localization in IoT Applications - A Case Study of Radiation Localization. IEEE Access 7: 16168-16183 (2019) - [j55]Katty Rohoden, Rebeca Estrada, Hadi Otrok, Zbigniew Dziong:
Stable femtocells cluster formation and resource allocation based on cooperative game theory. Comput. Commun. 134: 30-41 (2019) - [j54]Ahmed Suliman, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali:
A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing. Future Gener. Comput. Syst. 101: 1158-1167 (2019) - [j53]Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Omar Abdel Wahab, Jamal Bentahar:
On the Detection of Passive Malicious Providers in Cloud Federations. IEEE Commun. Lett. 23(1): 64-67 (2019) - [j52]Menatalla Abououf, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Anis Ouali:
Multi-worker multi-task selection framework in mobile crowd sourcing. J. Netw. Comput. Appl. 130: 52-62 (2019) - [j51]Abdelrahman AlMahmoud, Ernesto Damiani, Hadi Otrok, Yousof Al-Hammadi:
Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection. IEEE Trans. Big Data 5(3): 293-304 (2019) - [j50]Toufic Dbouk, Azzam Mourad, Hadi Otrok, Hanine Tout, Chamseddine Talhi:
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading. IEEE Trans. Netw. Serv. Manag. 16(4): 1665-1680 (2019) - [c48]Menatalla Abououf, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
Impact of Misbehaving Devices in Mobile Crowd Sourcing Systems. SERVICES 2019: 54-59 - 2018
- [j49]Bahia Halawi, Azzam Mourad, Hadi Otrok, Ernesto Damiani:
Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach. IEEE Access 6: 63890-63904 (2018) - [j48]Katty Rohoden, Rebeca Estrada, Hadi Otrok, Zbigniew Dziong:
Game theoretical framework for clustering and resource allocation in macro-femtocell networks. Comput. Networks 138: 164-176 (2018) - [j47]Rana Azzam, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Anis Ouali:
A stability-based group recruitment system for continuous mobile crowd sensing. Comput. Commun. 119: 1-14 (2018) - [j46]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game. IEEE Trans. Serv. Comput. 11(1): 184-201 (2018) - [j45]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
A Stackelberg game for street-centric QoS-OLSR protocol in urban Vehicular Ad Hoc Networks. Veh. Commun. 13: 64-77 (2018) - [c47]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari:
Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing. ICSOC 2018: 146-161 - [c46]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
A Cluster-Based QoS-OLSR Protocol for Urban Vehicular Ad Hoc Networks. IWCMC 2018: 554-559 - 2017
- [j44]Doaa Al-Terri, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs. Comput. Commun. 104: 108-118 (2017) - [j43]Faryed Eltayesh, Jamal Bentahar, Rabeb Mizouni, Hadi Otrok, Elhadi M. Shakshuki:
Refined game-theoretic approach to improve authenticity of outsourced databases. J. Ambient Intell. Humaniz. Comput. 8(3): 329-344 (2017) - [c45]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Omar Abdel Wahab, Azzam Mourad:
On the Effects of User Ratings on the Profitability of Cloud Services. ICWS 2017: 1-8 - [c44]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud. ICWS 2017: 728-735 - [c43]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
A street-centric QoS-OLSR Protocol for urban Vehicular Ad Hoc Networks. IWCMC 2017: 1477-1482 - 2016
- [j42]Azzam Mourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui:
From model-driven specification to design-level set-based analysis of XACML policies. Comput. Electr. Eng. 52: 65-79 (2016) - [j41]Rebeca Estrada, Hadi Otrok, Zbigniew Dziong:
A novel cluster based resource sharing model for femtocell networks. Comput. Commun. 94: 85-102 (2016) - [j40]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
A Stackelberg game for distributed formation of business-driven services communities. Expert Syst. Appl. 45: 359-372 (2016) - [j39]Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Jamal Bentahar:
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks. Expert Syst. Appl. 50: 40-54 (2016) - [j38]Rana Azzam, Rabeb Mizouni, Hadi Otrok, Anis Ouali, Shakti Singh:
GRS: A Group-Based Recruitment System for Mobile Crowd Sensing. J. Netw. Comput. Appl. 72: 38-50 (2016) - [j37]Hanaa Marshoud, Hadi Otrok, Hassan R. Barada, Rebeca Estrada, Abdallah Jarray, Zbigniew Dziong:
Realistic framework for resource allocation in macro-femtocell networks based on genetic algorithm. Telecommun. Syst. 63(1): 99-110 (2016) - [j36]Raghad Baiad, Omar Alhussein, Hadi Otrok, Sami Muhaidat:
Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET. Veh. Commun. 5: 9-17 (2016) - [c42]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud? SCC 2016: 316-323 - [c41]Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok, Azzam Mourad:
An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability. ANT/SEIT 2016: 465-471 - [c40]Toufic Dbouk, Azzam Mourad, Hadi Otrok, Chamseddine Talhi:
Towards ad-hoc cloud based approach for mobile intrusion detection. WiMob 2016: 1-8 - 2015
- [j35]Hussein Jebbaoui, Azzam Mourad, Hadi Otrok, Ramzi A. Haraty:
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies. Comput. Electr. Eng. 44: 91-103 (2015) - [j34]Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok:
AOMD approach for context-adaptable and conflict-free Web services composition. Comput. Electr. Eng. 44: 200-217 (2015) - [j33]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
A survey on trust and reputation models for Web services: Single, composite, and communities. Decis. Support Syst. 74: 121-134 (2015) - [j32]Rebeca Estrada, Hadi Otrok, Zbigniew Dziong, Hassan R. Barada:
Spectrum sharing model for OFDMA macro-femtocell networks. Int. J. Ad Hoc Ubiquitous Comput. 19(3/4): 241-253 (2015) - [j31]Ahmed Al Dhanhani, Rabeb Mizouni, Hadi Otrok, Ahmad Al-Rubaie:
Analysis of collaborative learning in social network sites used in education. Soc. Netw. Anal. Min. 5(1): 65:1-65:18 (2015) - [j30]Ehsan Khosrowshahi Asl, Jamal Bentahar, Hadi Otrok, Rabeb Mizouni:
Efficient Community Formation for Web Services. IEEE Trans. Serv. Comput. 8(4): 586-600 (2015) - [j29]Koralia N. Pappi, Panagiotis D. Diamantoulakis, Hadi Otrok, George K. Karagiannidis:
Cloud Compute-and-Forward With Relay Cooperation. IEEE Trans. Wirel. Commun. 14(6): 3415-3428 (2015) - [c39]Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad:
Misbehavior Detection Framework for Community-Based Cloud Computing. FiCloud 2015: 181-188 - [c38]Amjad El Khatib, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Jamal Bentahar:
A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol. ICUWB 2015: 1-5 - [c37]Doaa Al-Terri, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Raed M. Shubair, Yousof Al-Hammadi:
QoS-OLSR protocol based on intelligent water drop for Vehicular ad-hoc networks. IWCMC 2015: 1352-1357 - 2014
- [j28]Omar Abdel Wahab, Hadi Otrok, Azzam Mourad:
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Comput. Commun. 41: 43-54 (2014) - [j27]Ehsan Khosrowshahi Asl, Jamal Bentahar, Rabeb Mizouni, Babak Khosravifar, Hadi Otrok:
To compete or cooperate? This is the question in communities of autonomous services. Expert Syst. Appl. 41(10): 4878-4890 (2014) - [j26]Ahmed Al Dhanhani, Rabeb Mizouni, Hadi Otrok, Ahmad Al-Rubaie:
A game theoretical model for collaborative groups in social applications. Expert Syst. Appl. 41(11): 5056-5065 (2014) - [j25]Hanaa Marshoud, Hadi Otrok, Hassan R. Barada:
Macrocell-femtocells resource allocation with hybrid access motivational model. Phys. Commun. 11: 3-14 (2014) - [j24]Rebeca Estrada, Abdallah Jarray, Hadi Otrok, Zbigniew Dziong:
Base station selection and resource allocation in macro-femtocell networks under noisy scenario. Wirel. Networks 20(1): 115-131 (2014) - [j23]Omar Abdel Wahab, Hadi Otrok, Azzam Mourad:
A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol. Wirel. Pers. Commun. 75(3): 1635-1667 (2014) - [j22]Nadia Moati, Hadi Otrok, Azzam Mourad, Jean-Marc Robert:
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol. Wirel. Pers. Commun. 75(3): 1747-1768 (2014) - [c36]Rami Al-Dalky, Khaled Salah, Mahmoud Al-Qutayri, Hadi Otrok:
Framework for a NetFPGA-based Snort NIDS. CSNDSP 2014: 380-383 - [c35]Rami Al-Dalky, Omar Abduljaleel, Khaled Salah, Hadi Otrok, Mahmoud Al-Qutayri:
A Modbus traffic generator for evaluating the security of SCADA systems. CSNDSP 2014: 809-814 - [c34]Raghad Baiad, Hadi Otrok, Sami Muhaidat, Jamal Bentahar:
Cooperative cross layer detection for blackhole attack in VANET-OLSR. IWCMC 2014: 863-868 - [c33]Rami Al-Dalky, Khaled Salah, Hadi Otrok, Mahmoud Al-Qutayri:
Accelerating snort NIDS using NetFPGA-based Bloom filter. IWCMC 2014: 869-874 - 2013
- [j21]Omar Abdel Wahab, Hadi Otrok, Azzam Mourad:
VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks. Comput. Commun. 36(13): 1422-1435 (2013) - [j20]Babak Khosravifar, Jamal Bentahar, Rabeb Mizouni, Hadi Otrok, Mahsa Alishahi, Philippe Thiran:
Agent-based game-theoretic model for collaborative web services: Decision making analysis. Expert Syst. Appl. 40(8): 3207-3219 (2013) - [j19]Sara Ayoubi, Azzam Mourad, Hadi Otrok, Ahmad Shahin:
New XACML-AspectBPEL approach for composite web services security. Int. J. Web Grid Serv. 9(2): 127-145 (2013) - [j18]Osama Hayatle, Hadi Otrok, Amr M. Youssef:
A Markov Decision Process Model for High Interaction Honeypots. Inf. Secur. J. A Glob. Perspect. 22(4): 159-170 (2013) - [j17]Hanine Tout, Azzam Mourad, Hadi Otrok:
XrML-RBLicensing approach adapted to the BPEL process of composite web services. Serv. Oriented Comput. Appl. 7(3): 217-230 (2013) - [j16]Ahmad Nahar Quttoum, Abdallah Jarray, Hadi Otrok, Zbigniew Dziong:
An optimal dynamic resources partitioning auction model for virtual private networks. Telecommun. Syst. 53(4): 401-414 (2013) - [j15]Rebeca Estrada, Abdallah Jarray, Hadi Otrok, Zbigniew Dziong, Hassan R. Barada:
Energy-Efficient Resource-Allocation Model for OFDMA Macrocell/Femtocell Networks. IEEE Trans. Veh. Technol. 62(7): 3429-3437 (2013) - [c32]Rebeca Estrada, Hadi Otrok, Zbigniew Dziong:
Resource allocation model based on Particle Swarm Optimization for OFDMA macro-femtocell networks. IEEE ANTS 2013: 1-6 - [c31]Ehsan Khosrowshahi Asl, Jamal Bentahar, Hadi Otrok, Rabeb Mizouni:
Efficient Coalition Formation for Web Services. IEEE SCC 2013: 737-744 - [c30]Noura Al Ebri, Hadi Otrok, Azzam Mourad, Yousof Al-Hammadi:
Botnet detection: A cooperative game theoretical correlation-based model. ICCIT 2013: 28-32 - [c29]Hiba Sanadiki, Hadi Otrok, Azzam Mourad, Jean-Marc Robert:
Detecting attacks in QoS-OLSR protocol. IWCMC 2013: 1126-1131 - [c28]Hanaa Marshoud, Hadi Otrok, Hassan R. Barada, Rebeca Estrada, Zbigniew Dziong:
Genetic algorithm based resource allocation and interference mitigation for OFDMA macrocell-femtocells networks. WMNC 2013: 1-7 - 2012
- [j14]Jean-Marc Robert, Hadi Otrok, Ahmad Nahar Quttoum, Rihab Boukhris:
A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies. Comput. Networks 56(2): 927-939 (2012) - [j13]Jean-Marc Robert, Hadi Otrok, Abdelkarim Chriqi:
RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput. Commun. 35(4): 487-499 (2012) - [j12]Abdallah Jarray, Ahmad Nahar Quttoum, Hadi Otrok, Zbigniew Dziong:
DDP: A Dynamic Dimensioning and Partitioning model of Virtual Private Networks resources. Comput. Commun. 35(8): 906-915 (2012) - [j11]Stephane Boyer, Jean-Marc Robert, Hadi Otrok, Clement Rousseau:
An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol. Int. J. Secur. Networks 7(2): 95-106 (2012) - [j10]Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok:
A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security. Int. J. Web Grid Serv. 8(4): 361-385 (2012) - [j9]Osama Hayatle, Amr M. Youssef, Hadi Otrok:
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies. Inf. Secur. J. A Glob. Perspect. 21(6): 306-316 (2012) - [c27]Stephane Boyer, Jean-Marc Robert, Clement Rousseau, Hadi Otrok:
A novel reputation-based Tit-for-Tat strategy for IEEE 802.11 CSMA/CA protocol. CCNC 2012: 143-148 - [c26]Ahmed Al Dhanhani, Rabeb Mizouni, Hadi Otrok, Ahmad Al-Rubaie:
Game theoretical analysis of collaborative social applications. CollaborateCom 2012: 628-634 - [c25]Osama Hayatle, Hadi Otrok, Amr M. Youssef:
A game theoretic investigation for high interaction honeypots. ICC 2012: 6662-6667 - [c24]Babak Khosravifar, Mahsa Alishahi, Ehsan Khosrowshahi Asl, Jamal Bentahar, Rabeb Mizouni, Hadi Otrok:
Analyzing Coopetition Strategies of Services within Communities. ICSOC 2012: 656-663 - [c23]Hajer Al Housani, Hadi Otrok, Rabeb Mizouni, Jean-Marc Robert, Azzam Mourad:
Towards Smart Anti-Malwares for Battery-Powered Devices. NTMS 2012: 1-4 - [c22]Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok:
Towards a BPEL model-driven approach for Web services security. PST 2012: 120-127 - [c21]Hanaa Marshoud, Hadi Otrok, Hassan R. Barada, Rebeca Estrada, Abdallah Jarray, Zbigniew Dziong:
Resource allocation in macrocell-femtocell network using genetic algorithm. WiMob 2012: 474-479 - 2011
- [j8]Azzam Mourad, Hadi Otrok, Lama Baajour:
New Approach Targeting Security Patterns Development and Deployment. Inf. Secur. J. A Glob. Perspect. 20(4-5): 231-244 (2011) - [j7]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Trans. Dependable Secur. Comput. 8(1): 89-103 (2011) - [c20]Azzam Mourad, Hadi Otrok, Sara Ayoubi:
Toward Systematic Integration of Security Policies into Web Services. EISIC 2011: 220-223 - [c19]Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour:
Toward an abstract language on top of XACML for web services security. ICITST 2011: 254-259 - [c18]Ahmed Al Dhanhani, Rabeb Mizouni, Hadi Otrok, Jason W. P. Ng:
Smart Mobile Assessment Tool. Intelligent Environments (Workshops) 2011: 523-533 - [c17]Hadi Otrok, Azzam Mourad, Jean-Marc Robert, Nadia Moati, Hiba Sanadiki:
A cluster-based model for QoS-OLSR protocol. IWCMC 2011: 1099-1104 - [c16]Yassine Snoussi, Jean-Marc Robert, Hadi Otrok:
Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocol. WiMob 2011: 135-140 - 2010
- [j6]Ahmad Nahar Quttoum, Hadi Otrok, Zbigniew Dziong:
A collusion-resistant mechanism for autonomic resource management in Virtual Private Networks. Comput. Commun. 33(17): 2070-2078 (2010) - [j5]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs. Mob. Networks Appl. 15(2): 191-204 (2010) - [c15]Ahmad Nahar Quttoum, Hadi Otrok, Zbigniew Dziong:
ARMM: An Autonomic Resource Management Mechanism for Virtual Private Networks. CCNC 2010: 1-6 - [c14]Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok:
New approach for the dynamic enforcement of Web services security. PST 2010: 189-196 - [c13]Azzam Mourad, Hadi Otrok, Lama Baajour:
A Novel Approach for the Development and Deployment of Security Patterns. SocialCom/PASSAT 2010: 914-919
2000 – 2009
- 2009
- [j4]Hadi Otrok, Benwen Zhu, Hamdi Yahyaoui, Prabir Bhattacharya:
An Intrusion Detection Game Theoretical Model. Inf. Secur. J. A Glob. Perspect. 18(5): 199-212 (2009) - [c12]Abdelkarim Chriqi, Hadi Otrok, Jean-Marc Robert:
SC-OLSR: Secure Clustering-Based OLSR Model for Ad Hoc Networks. WiMob 2009: 239-245 - 2008
- [j3]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31(4): 708-721 (2008) - [j2]Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad Debbabi, Prabir Bhattacharya:
Game theoretic models for detecting network intrusions. Comput. Commun. 31(10): 1934-1944 (2008) - [c11]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 - [c10]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422 - [c9]Shuai Liu, D. Y. Zhang, Xiao Chu, Hadi Otrok, Prabir Bhattacharya:
A Game Theoretic Approach to Optimize the Performance of Host-Based IDS. WiMob 2008: 448-453 - [c8]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 - [r1]Chadi Assi, Prabir Bhattacharya, Mourad Debbabi, Mona Mehrandish, Hadi Otrok:
Mobile Security: Game Theory. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [c7]Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya:
Testing Intrusion Detection Systems in MANET: A Comprehensive Study. CNSR 2007: 364-371 - [c6]Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya:
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. ICDCS Workshops 2007: 86 - [c5]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78 - 2006
- [c4]Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya:
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. GLOBECOM 2006 - 2005
- [j1]Ramzi A. Haraty, Abdul Nasser El-Kassar, Hadi Otrok:
A Comparative Study of El-Gamal Based Cryptographic Algorithms. RITA 12(1): 7-22 (2005) - [c3]Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar:
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm. AICCSA 2005: 91 - 2004
- [c2]Ramzi A. Haraty, Abdul Nasser El-Kassar, Hadi Otrok:
A Comparative Study of RSA based Cryptographic Algorithms. IASSE 2004: 183-188 - [c1]Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar:
A Comparative Study of Elgamal Based Cryptographic Algorithms. ICEIS (3) 2004: 79-84
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint