default search action
Mahdi Aiash
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Ed Kamya Kiyemba Edris, Mahdi Aiash, Mohammad Ali Khoshkholghi, Ranesh Naha, Abdullahi Chowdhury, Jonathan Loo:
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet Things 24: 100913 (2023) - [j22]Abdullahi Chowdhury, Shahriar Kaisar, Mahbub E. Khoda, Ranesh Kumar Naha, Mohammad Ali Khoshkholghi, Mahdi Aiash:
IoT-Based Emergency Vehicle Services in Intelligent Transportation System. Sensors 23(11): 5324 (2023) - [c35]Abdullahi Chowdhury, Mohammad Manzurul Islam, Shahriar Kaisar, Mahbub E. Khoda, Ranesh Naha, Mohammad Ali Khoshkholghi, Mahdi Aiash:
Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications. TrustCom 2023: 2216-2221 - 2022
- [j21]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo:
Formalization and evaluation of EAP-AKA' protocol for 5G network access security. Array 16: 100254 (2022) - [j20]Gayathri Karthick, Glenford Mapp, Florian Kammueller, Mahdi Aiash:
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Comput. Intell. 38(3): 811-828 (2022) - [j19]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo:
An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network 2(3): 419-439 (2022) - 2021
- [j18]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keong Loo, Mohammad Shadi Al Hakeem:
Formal verification of secondary authentication protocol for 5G secondary authentication. Int. J. Secur. Networks 16(4): 223-234 (2021) - [j17]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo:
DCSS Protocol for Data Caching and Sharing Security in a 5G Network. Network 1(2): 75-94 (2021) - 2020
- [c34]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keng Loo:
The Case for Federated Identity Management in 5G Communications. FMEC 2020: 120-127 - [c33]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keng Loo:
Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network. FMEC 2020: 128-135 - [c32]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keng Loo:
Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol. SDS 2020: 256-261
2010 – 2019
- 2019
- [c31]Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo:
Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) Communications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1660-1665 - 2018
- [j16]Mohammad Muneer Kallash, Jonathan Loo, Aboubaker Lasebae, Mahdi Aiash:
A security framework for node-to-node communications based on the LISP architecture. Int. J. Electron. Secur. Digit. Forensics 10(3): 276-291 (2018) - [c30]Ed Kamya Kiyemba Edris, Mahdi Aiash:
ZKPVM: A Zero-knowledge Authentication Protocol for VMs' Live Migration in Mobile Cloud Computing. ICSOFT 2018: 858-864 - [c29]Gayathri Karthick, Glenford Mapp, Florian Kammueller, Mahdi Aiash:
Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration. UCC Companion 2018: 207-212 - 2017
- [j15]Rand Raheem, Aboubaker Lasebae, Mahdi Aiash, Jonathan Loo:
Mobility Management for Vehicular User Equipment in LTE/Mobile Femtocell Networks. Int. J. Inf. Syst. Serv. Sect. 9(4): 60-87 (2017) - [j14]Rand Raheem, Aboubaker Lasebae, Mahdi Aiash, Jonathan Loo, Robert Colson:
Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement. Veh. Commun. 9: 31-42 (2017) - 2016
- [j13]Anhtuan Le, Jonathan Loo, Kok Keong Chai, Mahdi Aiash:
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology. Inf. 7(2): 25 (2016) - [c28]Tayeb Kenaza, Mahdi Aiash:
Toward an Efficient Ontology-Based Event Correlation in SIEM. ANT/SEIT 2016: 139-146 - [c27]Rand Raheem, Aboubaker Lasebae, Mahdi Aiash, Jonathan Loo:
Interference Management for Co-channel Mobile Femtocells Technology in LTE Networks. Intelligent Environments 2016: 80-87 - [c26]Tayeb Kenaza, Khadidja Bennaceur, Abdenour Labed, Mahdi Aiash:
Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids. Trustcom/BigDataSE/ISPA 2016: 1765-1770 - [c25]Tayeb Kenaza, Mahdi Aiash, Jonathan Loo, Aboubaker Lasebae, Gill Whitney:
A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks. Trustcom/BigDataSE/ISPA 2016: 1776-1781 - [c24]Ahmad Azab, Mamoun Alazab, Mahdi Aiash:
Machine Learning Based Botnet Identification Traffic. Trustcom/BigDataSE/ISPA 2016: 1788-1794 - 2015
- [j12]Jernej Kos, Mahdi Aiash, Jonathan Loo, Denis Trcek:
U-Sphere: Strengthening scalable flat-name routing for decentralized networks. Comput. Networks 89: 14-31 (2015) - [j11]Mahdi Aiash:
A formal analysis of authentication protocols for mobile devices in next generation networks. Concurr. Comput. Pract. Exp. 27(12): 2938-2953 (2015) - [j10]Fragkiskos Sardis, Glenford E. Mapp, Jonathan Loo, Mahdi Aiash, Alexey V. Vinel:
Investigating a Mobility-Aware QoS Model for Multimedia Streaming Rate Adaptation. J. Electr. Comput. Eng. 2015: 548638:1-548638:7 (2015) - [j9]Jonathan Loo, Mahdi Aiash:
Special issue on information-centric network architecture, protocols, algorithms and applications. J. Netw. Comput. Appl. 50: 60-63 (2015) - [j8]Jonathan Loo, Mahdi Aiash:
Challenges and solutions for secure information centric networks: A case study of the NetInf architecture. J. Netw. Comput. Appl. 50: 64-72 (2015) - [j7]Mahdi Aiash, Jonathan Loo:
An integrated authentication and authorization approach for the network of information architecture. J. Netw. Comput. Appl. 50: 73-79 (2015) - [c23]Antonio Carnielli, Mahdi Aiash:
Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing. AINA Workshops 2015: 135-140 - [c22]Mahdi Aiash, Robert Colson, Mohammad Muneer Kallash:
Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud Computing. AINA Workshops 2015: 154-159 - [c21]Mahdi Aiash, Jonathan Loo:
A Formally Verified Access Control Mechanism for Information Centric Networks. SECRYPT 2015: 377-383 - [c20]Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, Chafika Benzaid:
Virtualization and Cyber Security: Arming Future Security Practitioners. TrustCom/BigDataSE/ISPA (1) 2015: 1398-1402 - 2014
- [j6]Mahdi Aiash, Jonathan Loo:
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. Int. J. Commun. Syst. 27(12): 3600-3618 (2014) - [j5]Neesha Kodagoda, Simon Attfield, Tinni Choudhury, Chris Rooney, Glenford E. Mapp, Phong Hai Nguyen, Louis Slabbert, B. L. William Wong, Mahdi Aiash, Yongjun Zheng, Kai Xu, Aboubaker Lasebae:
Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness. Inf. Vis. 13(4): 346-360 (2014) - [c19]Fragkiskos Sardis, Glenford E. Mapp, Jonathan Loo, Mahdi Aiash:
Dynamic Edge-Caching for Mobile Users: Minimising Inter-AS traffic by Moving Cloud Services and VMs. AINA Workshops 2014: 144-149 - [c18]Jose Sinti, Fowzan Jiffry, Mahdi Aiash:
Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments. AINA Workshops 2014: 154-159 - [c17]Mahdi Aiash, Glenford E. Mapp, Orhan Gemikonakli:
Secure Live Virtual Machines Migration: Issues and Solutions. AINA Workshops 2014: 160-165 - [c16]Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, Jonathan Loo:
A Secure Framework for Communications in Heterogeneous Networks. AINA Workshops 2014: 841-846 - [c15]Glenford E. Mapp, Mahdi Aiash, Brian Ondiege, Malcolm Clarke:
Exploring a New Security Framework for Cloud Storage Using Capabilities. SOSE 2014: 484-489 - [c14]Fragkiskos Sardis, Glenford E. Mapp, Jonathan Loo, Mahdi Aiash:
Dynamic Traffic Management for Interactive Cloud Services: Localising Traffic Based on Network Throughput and User Mobility. UCC 2014: 298-306 - 2013
- [j4]Fragkiskos Sardis, Glenford E. Mapp, Jonathan Loo, Mahdi Aiash, Alexey V. Vinel:
On the Investigation of Cloud-Based Mobile Media Environments With Service-Populating and QoS-Aware Mechanisms. IEEE Trans. Multim. 15(4): 769-777 (2013) - [c13]Ali Hussein Raheem, Aboubaker Lasebae, Mahdi Aiash, Jonathan Loo:
Supporting communications in the IoTs using the location/ID split protocol: A security analysis. FGCT 2013: 143-147 - [c12]Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash:
Security analysis of the constrained application protocol in the Internet of Things. FGCT 2013: 163-168 - [c11]Rand Raheem, Aboubaker Lasebae, Mahdi Aiash, Jonathan Loo:
From fixed to mobile femtocells in LTE systems: Issues and challenges. FGCT 2013: 207-212 - [c10]Mahdi Aiash:
A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture. NSS 2013: 68-79 - [c9]Mahdi Aiash:
A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR. NSS 2013: 742-748 - [c8]Mahdi Aiash, Ameer Al-Nemrat, David S. Preston:
Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography. WWIC 2013: 129-139 - 2012
- [j3]Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, Raphael Chung-Wei Phan, Jonathan Loo:
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP J. Wirel. Commun. Netw. 2012: 57 (2012) - [j2]Anhtuan Le, Jonathan Loo, Aboubaker Lasebae, Mahdi Aiash, Yuan Luo:
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int. J. Commun. Syst. 25(9): 1189-1212 (2012) - [j1]Glenford E. Mapp, Ferdinand Apietu Katsriku, Mahdi Aiash, Naveen Chinnam, Roberto Rigolin Ferreira Lopes, Edson dos Santos Moreira, Renata Maria Porto Vanni, Mario Augusto:
Exploiting Location and Contextual Information to Develop a Comprehensive Framework for Proactive Handover in Heterogeneous Environments. J. Comput. Networks Commun. 2012: 748163:1-748163:17 (2012) - [c7]Sharmin (Tinni) Choudhury, Neesha Kodagoda, Phong Hai Nguyen, Chris Rooney, Simon Attfield, Kai Xu, Yongjun Zheng, B. L. William Wong, Raymond Chen, Glenford E. Mapp, Louis Slabbert, Mahdi Aiash, Aboubaker Lasebae:
M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: "Subject matter expert's award". IEEE VAST 2012: 265-266 - [c6]Mahdi Aiash, Glenford E. Mapp, Raphael C.-W. Phan, Aboubaker Lasebae, Jonathan Loo:
A Formally Verified Device Authentication Protocol Using Casper/FDR. TrustCom 2012: 1293-1298 - [c5]Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, Jonathan Loo, Fragkiskos Sardis, Raphael C.-W. Phan, Mario Augusto, Edson dos Santos Moreira, Renata Maria Porto Vanni:
A survey of potential architectures for communication in heterogeneous networks. WTS 2012: 1-6 - [i1]Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae:
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks. CoRR abs/1208.1918 (2012) - 2011
- [c4]Glenford E. Mapp, Mahdi Aiash, Hélio Crestana Guardia, Jon Crowcroft:
Exploring Multi-homing Issues in Heterogeneous Environments. AINA Workshops 2011: 690-695 - 2010
- [c3]Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, Raphael Chung-Wei Phan:
Providing Security in 4G Systems: Unveiling the Challenges. AICT 2010: 439-444 - [c2]Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Chung-Wei Phan:
Security Models for Heterogeneous Networking. SECRYPT 2010: 318-321
2000 – 2009
- 2009
- [c1]Glenford E. Mapp, Fatema Shaikh, Mahdi Aiash, Renata Maria Porto Vanni, Mario Augusto, Edson dos Santos Moreira:
Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks. NBiS 2009: 286-291
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint