Follow
Sahel Alouneh
Sahel Alouneh
Professor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)
Verified email at aau.ac.ae - Homepage
Title
Cited by
Cited by
Year
Transmitter design and hardware considerations for different space modulation techniques
R Mesleh, O Hiari, A Younis, S Alouneh
IEEE Transactions on Wireless Communications 16 (11), 7512-7522, 2017
792017
An empirical study of cross-platform mobile development in industry
A Biørn-Hansen, TM Grønli, G Ghinea, S Alouneh
Wireless Communications and Mobile Computing 2019, 2019
712019
A novel path protection scheme for MPLS networks using multi-path routing
S Alouneh, A Agarwal, A En-Nouaary
Computer Networks 53 (9), 1530-1545, 2009
552009
Context-Aware Multifaceted Trust Framework for evaluating trustworthiness of Cloud Providers
P Bertok, T zahir, S Alouneh
Future Generation Computer Systems, 2017
47*2017
Low power Wallace multiplier design based on wide counters
S Abed, BJ Mohd, Z Al‐bayati, S Alouneh
International Journal of Circuit Theory and Applications 40 (11), 1175-1185, 2012
392012
FPGA hardware of the LSB steganography method
BJ Mohd, S Abed, T Al-Hayajneh, S Alouneh
2012 International Conference on Computer, Information and Telecommunication …, 2012
342012
Performance evaluation of DigiMesh and ZigBee wireless mesh networks
H Salah, S Alouneh, A Al-Assaf, K Darabkh
2018 International Conference on Wireless Communications, Signal Processing …, 2018
262018
A Multiple LSPs Approach to Secure Data in MPLS Networks.
S Alouneh, A En-Nouaary, A Agarwal
J. Networks 2 (4), 51-58, 2007
252007
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
S Alouneh, S Abed, MH Al Shayeji, R Mesleh
Artificial Intelligence Review 52, 2575-2601, 2019
232019
A csi-based multi-environment human activity recognition framework
BA Alsaify, MM Almazari, R Alazrai, S Alouneh, MI Daoud
Applied Sciences 12 (2), 930, 2022
182022
A practical three‐phase ILP approach for solving the examination timetabling problem
F Al‐Hawari, M Al‐Ashi, F Abawi, S Alouneh
International Transactions in Operational Research 27 (2), 924-944, 2020
172020
Review on image steganography
AS Pandit, SR Khope, F Student ..
International Journal of Eng Sci 6115, 2016
172016
A multidimension taxonomy of insider threats in cloud computing
MJ Alhanahnah, A Jhumka, S Alouneh
The Computer Journal 59 (11), 1612-1622, 2016
162016
MPLS technology in wireless networks
S Alouneh, S Abed, M Kharbutli, BJ Mohd
Wireless networks 20, 1037-1051, 2014
132014
A novel approach for fault tolerance in MPLS networks
S Alouneh, A Agarwal, A En-Nouaary
2006 Innovations in Information Technology, 1-5, 2006
132006
LoRaWAN energy optimization with security consideration.
AF Khalifeh, K Aldahdouh, S Alouneh
Int. Arab J. Inf. Technol. 18 (3A), 476-483, 2021
122021
Security of VoIP traffic over low or limited bandwidth networks
S Alouneh, S Abed, G Ghinea
Security and communication networks 9 (18), 5591-5599, 2016
122016
Information Science and Applications
KJ Kim
Springer, 2015
122015
Stack memory buffer overflow protection based on duplication and randomization
S Alouneh, M Kharbutli, R AlQurem
Procedia Computer Science 21, 250-256, 2013
122013
MPLS security: an approach for unicast and multicast environments
S Alouneh, A En-Nouaary, A Agarwal
annals of telecommunications-annales des télécommunications 64, 391-400, 2009
122009
The system can't perform the operation now. Try again later.
Articles 1–20