


Остановите войну!
for scientists:
Abdallah Moubayed
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j19]Li Yang
, Abdallah Moubayed
, Abdallah Shami
:
MTH-IDS: A Multitiered Hybrid Intrusion Detection System for Internet of Vehicles. IEEE Internet Things J. 9(1): 616-632 (2022) - [j18]Abdallah Moubayed
, Abdallah Shami
:
Softwarization, Virtualization, and Machine Learning for Intelligent and Effective Vehicle-to-Everything Communications. IEEE Intell. Transp. Syst. Mag. 14(2): 156-173 (2022) - [j17]Sam Aleyadeh
, Abdallah Moubayed
, Parisa Heidari, Abdallah Shami
:
Optimal Container Migration/Re-Instantiation in Hybrid Computing Environments. IEEE Open J. Commun. Soc. 3: 15-30 (2022) - [j16]Li Yang
, Abdallah Moubayed
, Abdallah Shami
, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault:
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection. IEEE Trans. Netw. Serv. Manag. 19(1): 686-705 (2022) - 2021
- [j15]Abdallah Moubayed
, Mohamed Sharif, Marco Luccini, Serguei Primak, Abdallah Shami
:
Water Leak Detection Survey: Challenges & Research Opportunities Using Data Fusion & Federated Learning. IEEE Access 9: 40595-40611 (2021) - [j14]MohammadNoor Injadat
, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Machine learning towards intelligent systems: applications, challenges, and opportunities. Artif. Intell. Rev. 54(5): 3299-3348 (2021) - [j13]Abdallah Moubayed
, Abdallah Shami
, Parisa Heidari, Adel Larabi, Richard Brunner:
Edge-Enabled V2X Service Placement for Intelligent Transportation Systems. IEEE Trans. Mob. Comput. 20(4): 1380-1392 (2021) - [j12]MohammadNoor Injadat
, Abdallah Moubayed
, Ali Bou Nassif
, Abdallah Shami
:
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 18(2): 1803-1816 (2021) - 2020
- [j11]MohammadNoor Injadat
, Abdallah Moubayed
, Ali Bou Nassif, Abdallah Shami:
Multi-split optimized bagging ensemble model selection for multi-class educational data mining. Appl. Intell. 50(12): 4506-4528 (2020) - [j10]MohammadNoor Injadat
, Abdallah Moubayed
, Ali Bou Nassif, Abdallah Shami:
Systematic ensemble model selection approach for educational data mining. Knowl. Based Syst. 200: 105992 (2020) - 2019
- [j9]Abdallah Moubayed
, Ahmed Refaey, Abdallah Shami:
Software-Defined Perimeter (SDP): State of the Art Secure Solution for Modern Networks. IEEE Netw. 33(5): 226-233 (2019) - 2018
- [j8]Abdallah Moubayed
, MohammadNoor Injadat
, Ali Bou Nassif
, Hanan Lutfiyya, Abdallah Shami:
E-Learning: Challenges and Research Opportunities Using Machine Learning & Data Analytics. IEEE Access 6: 39117-39138 (2018) - [j7]Abdallah Moubayed
, Karim Hammad
, Abdallah Shami, Hanan Lutfiyya:
Dynamic Spectrum Management through Resource Virtualization with M2M Communications. IEEE Commun. Mag. 56(10): 121-127 (2018) - [j6]Karim Hammad
, Abdallah Moubayed
, Serguei Primak, Abdallah Shami
:
QoS-Aware Energy and Jitter-Efficient Downlink Predictive Scheduler for Heterogeneous Traffic LTE Networks. IEEE Trans. Mob. Comput. 17(6): 1411-1428 (2018) - [j5]Emad Aqeeli
, Abdallah Moubayed
, Abdallah Shami
:
Dynamic SON-Enabled Location Management in LTE Networks. IEEE Trans. Mob. Comput. 17(7): 1511-1523 (2018) - [j4]Emad Aqeeli
, Abdallah Moubayed
, Abdallah Shami
:
Power-Aware Optimized RRH to BBU Allocation in C-RAN. IEEE Trans. Wirel. Commun. 17(2): 1311-1322 (2018) - 2016
- [j3]Mohamad Kalil
, Abdallah Moubayed
, Abdallah Shami, Arafat Al-Dweik
:
Efficient Low-Complexity Scheduler for Wireless Resource Virtualization. IEEE Wirel. Commun. Lett. 5(1): 56-59 (2016) - [j2]Karim Hammad
, Abdallah Moubayed
, Abdallah Shami, Serguei Primak:
Analytical Approximation of Packet Delay Jitter in Simple Queues. IEEE Wirel. Commun. Lett. 5(6): 564-567 (2016) - 2015
- [j1]Abdallah Moubayed
, Abdallah Shami, Hanan Lutfiyya:
Wireless Resource Virtualization With Device-to-Device Communication Underlaying LTE Network. IEEE Trans. Broadcast. 61(4): 734-740 (2015)
Conference and Workshop Papers
- 2021
- [c19]Sam Aleyadeh, Abdallah Moubayed, Abdallah Shami:
Mobility Aware Edge Computing Segmentation Towards Localized Orchestration. ISNCC 2021: 1-6 - 2020
- [c18]Abdallah Moubayed, Tanveer Ahmed, Anwar Haque, Abdallah Shami:
Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing. CCECE 2020: 1-6 - [c17]Abdallah Moubayed, Emad Aqeeli, Abdallah Shami:
Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection. CCECE 2020: 1-6 - [c16]MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami:
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. ICM 2020: 1-4 - [c15]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami:
Optimized Random Forest Model for Botnet Detection Based on DNS Queries. ICM 2020: 1-4 - [c14]Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner:
Cost-optimal V2X Service Placement in Distributed Cloud/Edge Environment. WiMob 2020: 1-6 - 2019
- [c13]Li Yang
, Abdallah Moubayed
, Ismail Hamieh, Abdallah Shami:
Tree-Based Intelligent Intrusion Detection System in Internet of Vehicles. GLOBECOM 2019: 1-6 - [c12]Fadi Salo, MohammadNoor Injadat
, Abdallah Moubayed
, Ali Bou Nassif, Aleksander Essex:
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection. ICNC 2019: 276-281 - [c11]Palash Kumar, Abdallah Moubayed
, Ahmed Refaey, Abdallah Shami, Juanita Koilpillai:
Performance Analysis of SDP For Secure Internal Enterprises. WCNC 2019: 1-6 - 2018
- [c10]Abdallah Moubayed
, MohammadNoor Injadat
, Abdallah Shami, Hanan Lutfiyya:
DNS Typo-Squatting Domain Detection: A Data Analytics & Machine Learning Based Approach. GLOBECOM 2018: 1-7 - [c9]Sara Zimmo, Abdallah Moubayed
, Ahmed Refaey, Abdallah Shami:
Coexistence of WiFi and LTE in the Unlicensed Band Using Time-Domain Virtualization. GLOBECOM 2018: 1-6 - [c8]Khaled Alhazmi, Abdallah Moubayed
, Abdallah Shami:
Green Distributed Cloud Services Provisioning in SDN-enabled Cloud Environment. IWCMC 2018: 861-867 - [c7]Khaled Alhazmi, Abdallah Moubayed
, Abdallah Shami:
Distributed SDN Controller Placement Using Betweenness Centrality & Hierarchical Clustering. DIVANet@MSWiM 2018: 15-20 - 2017
- [c6]Karim Hammad
, Abdallah Moubayed
, Serguei Primak, Abdallah Shami:
Investigating the energy-efficiency/delay jitter trade off for VoLTE in LTE downlink. PIMRC 2017: 1-7 - 2016
- [c5]Mohamed Hussein, Abdallah Moubayed
, Serguei Primak, Abdallah Shami:
Virtualized allocation performance analysis in 5G two-tier cellular networks. CCECE 2016: 1-4 - [c4]Abdallah Moubayed
, Abdallah Shami, Hanan Lutfiyya:
Power-Aware Wireless Virtualized Resource Allocation with D2D Communication Underlaying LTE Network. GLOBECOM 2016: 1-6 - 2015
- [c3]Emad Aqeeli, Abdallah Moubayed
, Abdallah Shami:
Towards Intelligent LTE Mobility Management through MME Pooling. GLOBECOM 2015: 1-6 - [c2]Abdallah Moubayed
, Sameh Sorour, Tareq Y. Al-Naffouri
, Mohamed-Slim Alouini
:
Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks. VTC Spring 2015: 1-6 - [c1]Mohamed Hussein, Abdallah Moubayed
, Serguei Primak, Abdallah Shami:
On efficient power allocation modeling in virtualized uplink 3GPP-LTE systems. WiMob 2015: 817-824
Informal and Other Publications
- 2021
- [i17]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya:
Relationship between Student Engagement and Performance in e-Learning Environment Using Association Rules. CoRR abs/2101.02006 (2021) - [i16]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities. CoRR abs/2101.03655 (2021) - [i15]Li Yang, Abdallah Moubayed, Abdallah Shami:
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles. CoRR abs/2105.13289 (2021) - [i14]Li Yang, Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault:
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection. CoRR abs/2107.11514 (2021) - [i13]Sam Aleyadeh, Abdallah Moubayed, Abdallah Shami:
Mobility Aware Edge Computing Segmentation Towards Localized Orchestration. CoRR abs/2110.07808 (2021) - 2020
- [i12]Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner:
Edge-enabled V2X Service Placement for Intelligent Transportation Systems. CoRR abs/2001.06288 (2020) - [i11]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Systematic Ensemble Model Selection Approach for Educational Data Mining. CoRR abs/2005.06647 (2020) - [i10]Abdallah Moubayed, Abdallah Shami:
Softwarization, Virtualization, & Machine Learning For Intelligent & Effective V2X Communications. CoRR abs/2006.04595 (2020) - [i9]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Multi-split Optimized Bagging Ensemble Model Selection for Multi-class Educational Data Mining. CoRR abs/2006.05031 (2020) - [i8]Abdallah Moubayed, Emad Aqeeli, Abdallah Shami:
Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection. CoRR abs/2006.09272 (2020) - [i7]MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami:
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection. CoRR abs/2008.03297 (2020) - [i6]Abdallah Moubayed, Tanveer Ahmed, Anwar Haque, Abdallah Shami:
Machine Learning Towards Enabling Spectrum-as-a-Service Dynamic Sharing. CoRR abs/2009.03756 (2020) - [i5]Abdallah Moubayed, Abdallah Shami, Parisa Heidari, Adel Larabi, Richard Brunner:
Cost-optimal V2X Service Placement in Distributed Cloud/Edge Environment. CoRR abs/2010.07223 (2020) - [i4]MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami:
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach. CoRR abs/2012.11325 (2020) - [i3]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami:
Optimized Random Forest Model for Botnet Detection Based on DNS Queries. CoRR abs/2012.11326 (2020) - [i2]Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami, Hanan Lutfiyya:
DNS Typo-squatting Domain Detection: A Data Analytics & Machine Learning Based Approach. CoRR abs/2012.13604 (2020) - 2019
- [i1]Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami:
Tree-based Intelligent Intrusion Detection System in Internet of Vehicles. CoRR abs/1910.08635 (2019)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-04-04 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint