Hani Alzaid
Title
Cited by
Cited by
Year
Secure data aggregation in wireless sensor network: a survey
H Al Zaid, E Foo, J Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
177*2008
RSDA: Reputation-based secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JG Nieto
2008 Ninth International Conference on Parallel and Distributed Computing …, 2008
512008
Reputation-based trust systems for wireless sensor networks: A comprehensive review
H Alzaid, M Alfaraj, S Ries, A Jøsang, M Albabtain, A Abuhaimed
IFIP International Conference on Trust Management, 66-82, 2013
442013
Secure data aggregation with MAC authentication in wireless sensor networks
SB Othman, A Trad, H Youssef, H Alzaid
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
24*2013
LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks
O Cheikhrouhou, A Koubaa, G Dini, H Alzaid, M Abid
Ad Hoc Networks 10 (7), 1419-1444, 2012
242012
A forward and backward secure key management in wireless sensor networks for pcs/scada
H Alzaid, DG Park, JG Nieto, C Boyd, E Foo
International Conference on Sensor Systems and Software, 66-82, 2009
232009
A systematic evaluation of cybersecurity metrics for dynamic networks
SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim
Computer Networks 144, 216-229, 2018
162018
An efficient secure data aggregation scheme for wireless sensor networks
SB Othman, H Alzaid, A Trad, H Youssef
IISA 2013, 1-4, 2013
152013
A taxonomy of secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JMG Nieto, DG Park
International Journal of Communication Networks and Distributed Systems 8 (1 …, 2012
142012
Secure data aggregation in wireless sensor networks
SB Othman, A Trad, H Youssef, H Alzaid
2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), 55-58, 2013
13*2013
Mitigating On‐Off attacks in reputation‐based secure data aggregation for wireless sensor networks
H Alzaid, E Foo, JG Nieto, E Ahmed
Security and Communication Networks 5 (2), 125-144, 2012
132012
Evaluating the effectiveness of security metrics for dynamic networks
SE Yusuf, M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 277-284, 2017
102017
Automated security investment analysis of dynamic networks
SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2018
92018
A Wireless Sensor Networks Test-bed for the Wormhole Attack
H Alzaid, S Abanmi
International Journal of Digital Content Technology and its Applications 3 …, 2009
92009
Detecting wormhole attacks in wireless sensor networks
H Alzaid, S Abanmi, S Kanhere, CT Chou
92006
LNT: a logical neighbor tree for secure group management in wireless sensor networks
O Cheikhrouhou, A Koubâa, G Dini, H Alzaid, M Abid
Procedia Computer Science 5, 198-207, 2011
82011
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches.
H Alzaid, M Alfaraj
2008 New Technologies, Mobility and Security, 1-5, 2008
82008
Secure and energy-efficient data aggregation for wireless sensor networks
SB Othman, A Trad, H Alzaid, H Youssef
International Journal of Mobile Network Design and Innovation 5 (1), 28-42, 2013
62013
Security modeling and analysis of cross-protocol IoT devices
M Ge, JB Hong, H Alzaid, DS Kim
2017 IEEE Trustcom/BigDataSE/ICESS, 1043-1048, 2017
42017
Performance evaluation of EC-ElGamal encryption algorithm for wireless sensor networks
SB Othman, A Trad, H Alzaid, H Youssef
International Conference on Wireless Mobile Communication and Healthcare …, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20