Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Ma'en Saleh"'
Publikováno v:
International Journal of Communication Networks and Information Security (IJCNIS). 12
Secure routing protocols are proposed for the vehicular ad hoc networks. The protocolsintegrate the security authentication process with the Location-Aided Routing (LAR) protocol to supportWi-Fi Direct communications between the vehicles. The methods
Publikováno v:
International Journal of Advanced Computer Research. 10:1-11
Publikováno v:
EUSPN/ICTH
Due to the increasing demands on energy, energy savings have witnessed a great research community attention over the last decades. Currently, home electric-energy bill causes a headache for habitants in modern cities. Many home appliances are availab
Autor:
Ma'en Saleh
Publikováno v:
EUSPN/ICTH
Securing data communication in Vehicular Ad Hoc Networks (VANETs) becomes a demand to provide safe and secure warning messages to drivers. In this paper, a secure routing protocol for VANETs was proposed. The protocol integrates a security unit that
Autor:
Ma'en Saleh
Publikováno v:
International Journal of Computer Applications. 180:5-13
Autor:
Liang Dong, Ma'en Saleh
Publikováno v:
IEEE Transactions on Network and Service Management. 10:271-285
Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. In this paper, we pr
Autor:
Jafar Abukhait, Ma'en Saleh
Publikováno v:
International Journal of Information and Communication Technology. 14:470
Traditional network security protocols depend on exchanging the security keys between the network nodes, and thus opposing the network to different classes of security threats. In this paper, a multi-agent system for cryptographic key generation is p
Autor:
Ma'en Saleh, Liang Dong
Publikováno v:
ICC
Internet protocol security (IPsec) provides real-time IP packets with confidentiality security service, making them robust against snooping security threats. Conventionally, the security level provided by such protocol cannot be modified according to
Autor:
Ma'en Saleh, Liang Dong
Publikováno v:
RWS
Conventional real-time scheduling algorithms provide timing constraints to network applications without enhancing or optimizing the security service according to the network dynamics. In this paper, we propose a GAIA multi-agent system that combines
Autor:
Liang Dong, Ma'en Saleh
Publikováno v:
ICNSC
Nowadays, most of the computerized network applications are depending on the ability of the servicing packet switching network to integrate different types of traffic from two main categories, real-time and best-effort classes, and provide different