Key management for content access control in a hierarchy HR Hassen, A Bouabdallah, H Bettahar, Y Challal Computer Networks 51 (11), 3197-3219, 2007 | 68 | 2007 |
Enhanced WEP: An efficient solution to WEP threats HR Hassan, Y Challal Second IFIP International Conference on Wireless and Optical Communications …, 2005 | 40 | 2005 |
Enhanced WEP: An efficient solution to WEP threats HR Hassan, Y Challal Second IFIP International Conference on Wireless and Optical Communications …, 2005 | 40 | 2005 |
An efficient key management scheme for content access control for linear hierarchies HR Hassen, H Bettahar, A Bouadbdallah, Y Challal Computer Networks 56 (8), 2107-2118, 2012 | 25 | 2012 |
An in-depth review of machine learning based android malware detection A Muzaffar, HR Hassen, MA Lones, H Zantout Computers & Security, 102833, 2022 | 24 | 2022 |
An efficient key management algorithm for hierarchical group communication HR Hassan, A Bouabdallah, H Bettahar, Y Challal First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 19 | 2005 |
A self-managing volatile key scheme for wireless sensor networks A Laouid, A Dahmani, HR Hassen, A Bounceur, R Euler, F Lalem, A Tari Journal of Ambient Intelligence and Humanized Computing 10, 3349-3364, 2019 | 18 | 2019 |
A review of amplification-based distributed denial of service attacks and their mitigation S Ismail, HR Hassen, M Just, H Zantout Computers & Security 109, 102380, 2021 | 15 | 2021 |
Optimal placement of near ground VHF/UHF radio communication network as a multi objective problem HA Shehadeh, MYI Idris, I Ahmedy, HR Hassen Wireless Personal Communications 110 (3), 1169-1197, 2020 | 10 | 2020 |
A new and efficient key management scheme for content access control within tree hierarchies HR Hassen, A Bouabdallah, H Bettahar 21st International Conference on Advanced Information Networking and …, 2007 | 10 | 2007 |
Hi-kd: Hash-based hierarchical key distribution for group communication HR Hassan, A Bouabdallah, H Bettahar, Y Challal IEEE INFOCOM 5, 2005 | 10 | 2005 |
NFC-based asset management for medical equipment N Shetty, H Ragab-Hassen 2015 IEEE 11th International Conference on Wireless and Mobile Computing …, 2015 | 9 | 2015 |
Stick: an end-to-end encryption protocol tailored for social network platforms O Basem, A Ullah, HR Hassen IEEE Transactions on Dependable and Secure Computing 20 (2), 1258-1269, 2022 | 6 | 2022 |
Android Malware Detection Using API Calls: A Comparison of Feature Selection and Machine Learning Models A Muzaffar, H Ragab Hassen, MA Lones, H Zantout International Conference on Applied CyberSecurity, 3-12, 2021 | 5 | 2021 |
A key management scheme evaluation using Markov processes H Ragab-Hassen, E Lounes International Journal of Information Security 16, 271-280, 2017 | 3 | 2017 |
Rabit: a reputation architecture for BitTorrent H Ragab-Hassen, O Jones, N Galanis 2012 IEEE global communications conference (GLOBECOM), 850-855, 2012 | 3 | 2012 |
A Comprehensive Investigation of Feature and Model Importance in Android Malware Detection A Muzaffar, HR Hassen, H Zantout, MA Lones arXiv preprint arXiv:2301.12778, 2023 | 2 | 2023 |
Open Challenges in Security of Cloud Computing S Ismail, HR Hassen, H Zantout Proceedings of the International Conference on Big Data and Advanced …, 2016 | 2 | 2016 |
File synchronization systems survey Z Mehdi, H Ragab-Hassen arXiv preprint arXiv:1611.05346, 2016 | 2 | 2016 |
Efficient key management model and scheme for content access control in hierarchies H Ragab-Hassen 2010 IEEE Globecom Workshops, 1492-1496, 2010 | 2 | 2010 |