Segui
Moussa Ayyash
Moussa Ayyash
Professor of Electrical Engineering and Computing
Email verificata su ieee.org
Titolo
Citata da
Citata da
Anno
Internet of things: A survey on enabling technologies, protocols, and applications
A Al-Fuqaha, M Guizani, M Mohammadi, M Aledhari, M Ayyash
IEEE communications surveys & tutorials 17 (4), 2347-2376, 2015
95952015
Coexistence of WiFi and LiFi toward 5G: concepts, opportunities, and challenges
M Ayyash, H Elgala, A Khreishah, V Jungnickel, T Little, S Shao, ...
IEEE Communications Magazine 54 (2), 64-71, 2016
5222016
Internet of things: A survey on enabling technologies, protocols, and applications. Communications Surveys & Tutorials
A Al-Fuqaha, M Guizani, M Mohammadi, M Aledhari, M Ayyash
Ieee 17 (4), 2347-2376, 2015
2252015
Design and analysis of a visible-light-communication enhanced WiFi system
S Shao, A Khreishah, M Ayyash, MB Rahaim, H Elgala, V Jungnickel, ...
Journal of Optical Communications and Networking 7 (10), 960-973, 2015
1682015
Edge-computing architectures for internet of things applications: A survey
S Hamdan, M Ayyash, S Almajali
Sensors 20 (22), 6441, 2020
1542020
An indoor hybrid WiFi-VLC internet access system
S Shao, A Khreishah, MB Rahaim, H Elgala, M Ayyash, TDC Little, J Wu
2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems …, 2014
1462014
A provably efficient online collaborative caching algorithm for multicell-coordinated systems
A Gharaibeh, A Khreishah, B Ji, M Ayyash
IEEE Transactions on Mobile Computing 15 (8), 1863-1876, 2015
1432015
Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks
HAB Salameh, S Almajali, M Ayyash, H Elgala
IEEE Internet of Things Journal 5 (3), 1904-1913, 2018
1262018
A hybrid RF-VLC system for energy efficient wireless access
A Khreishah, S Shao, A Gharaibeh, M Ayyash, H Elgala, N Ansari
IEEE Transactions on Green Communications and Networking 2 (4), 932-944, 2018
752018
Visible light communication module: An open source extension to the ns3 network simulator with real system validation
A Aldalbahi, M Rahaim, A Khreishah, M Ayyash, TDC Little
IEEE Access 5, 22144-22158, 2017
542017
A framework for efficient and secured mobility of IoT devices in mobile edge computing
S Almajali, HB Salameh, M Ayyash, H Elgala
2018 third international conference on fog and mobile edge computing (FMEC …, 2018
502018
SDN security review: Threat taxonomy, implications, and open challenges
M Rahouti, K Xiong, Y Xin, SK Jagatheesaperumal, M Ayyash, ...
IEEE Access 10, 45820-45854, 2022
472022
Extending ns3 to simulate visible light communication at network-level
A Aldalbahi, M Rahaim, A Khreishah, M Ayyash, R Ackerman, J Basuino, ...
2016 23rd International Conference on Telecommunications (ICT), 1-6, 2016
412016
A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets
B Alhijawi, S Almajali, H Elgala, HB Salameh, M Ayyash
Computers and Electrical Engineering 99, 107706, 2022
402022
Artificial intelligence in education: a panoramic review
K Ahmad, J Qadir, A Al-Fuqaha, W Iqbal, A El-Hassan, D Benhaddou, ...
DOI: https://doi. org/10.35542/osf. io/zvu2n, 2020
392020
Data-driven artificial intelligence in education: A comprehensive review
K Ahmad, J Qadir, A Al-Fuqaha, W Iqbal, A El-Hassan, D Benhaddou, ...
EdArXiv, 2020
362020
Optimizing handover parameters by Q-learning for heterogeneous radio-optical networks
S Shao, G Liu, A Khreishah, M Ayyash, H Elgala, TDC Little, M Rahaim
IEEE Photonics Journal 12 (1), 1-15, 2019
312019
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
HB Salameh, S Almajali, M Ayyash, H Elgala
2017 Fourth International Conference on Software Defined Systems (SDS), 43-47, 2017
312017
A novel trust-aware and energy-aware clustering method that uses stochastic fractal search in IoT-enabled wireless sensor networks
S Hriez, S Almajali, H Elgala, M Ayyash, HB Salameh
IEEE Systems Journal 16 (2), 2693-2704, 2021
262021
Unknown security attack detection using shallow and deep ANN classifiers
M Al-Zewairi, S Almajali, M Ayyash
Electronics 9 (12), 2006, 2020
262020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20