Framework for role-based delegation models E Barka, R Sandhu proceedings 16th annual computer security applications conference (ACSAC'00 …, 2000 | 454 | 2000 |
A role-based delegation model and some extensions E Barka, R Sandhu Proceedings of the 23rd National Information Systems Security Conference 4 …, 2000 | 295 | 2000 |
Role-based delegation model/hierarchical roles (RBDM1) E Barka, R Sandhu 20th Annual Computer Security Applications Conference, 396-404, 2004 | 126 | 2004 |
The role of national cybersecurity strategies on the improvement of cybersecurity education S AlDaajeh, H Saleous, S Alrabaee, E Barka, F Breitinger, KKR Choo Computers & Security 119, 102754, 2022 | 106 | 2022 |
UAV-assisted technique for the detection of malicious and selfish nodes in VANETs CA Kerrache, A Lakas, N Lagraa, E Barka Vehicular Communications 11, 1-11, 2018 | 76 | 2018 |
A new machine learning-based collaborative DDoS mitigation mechanism in software-defined network SS Mohammed, R Hussain, O Senko, B Bimaganbetov, JY Lee, ... 2018 14th International Conference on Wireless and Mobile Computing …, 2018 | 70 | 2018 |
Securing the web of things with role-based access control E Barka, SS Mathew, Y Atif Codes, Cryptology, and Information Security: First International Conference …, 2015 | 66 | 2015 |
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure E Barka, CA Kerrache, H Benkraouda, K Shuaib, F Ahmad, F Kurugollu Transactions on Emerging Telecommunications Technologies 33 (8), e3706, 2022 | 61 | 2022 |
Blockchain in internet-of-things: Architecture, applications and research directions F Ahmad, Z Ahmad, CA Kerrache, F Kurugollu, A Adnane, E Barka 2019 International conference on computer and information sciences (ICCIS), 1-6, 2019 | 55 | 2019 |
A trusted lightweight communication strategy for flying named data networking E Barka, CA Kerrache, R Hussain, N Lagraa, A Lakas, SH Bouk Sensors 18 (8), 2683, 2018 | 54 | 2018 |
Mobility analysis in vehicular ad hoc network (VANET) L Zhang, A Lakas, H El-Sayed, E Barka Journal of Network and Computer Applications 36 (3), 1050-1056, 2013 | 48 | 2013 |
STHM: A secured and trusted healthcare monitoring architecture using SDN and Blockchain E Barka, S Dahmane, CA Kerrache, M Khayat, F Sallabi Electronics 10 (15), 1787, 2021 | 44 | 2021 |
Integrating Usage Control with SIP-Based Communications. E Barka, A Lakas Journal of Computer Systems, Networks, & Communications, 2008 | 41 | 2008 |
UNION: a trust model distinguishing intentional and UNIntentional misbehavior in inter‐UAV communication E Barka, CA Kerrache, N Lagraa, A Lakas, CT Calafate, JC Cano Journal of advanced transportation 2018 (1), 7475357, 2018 | 39 | 2018 |
Towards a national trauma registry for the United Arab Emirates S Shaban, HO Eid, E Barka, FM Abu-Zidan BMC research notes 3, 1-6, 2010 | 39 | 2010 |
Revocation in VANETs: A survey H Al Falasi, E Barka 2011 International Conference on Innovations in Information Technology, 214-219, 2011 | 33 | 2011 |
On the Impact of Security on the Performance of WLANs. E Barka, M Boulmalf J. Commun. 2 (4), 10-17, 2007 | 32 | 2007 |
Impact of security on the performance of wireless-local area networks E Barka, M Boulmalf, A Alteniji, H Al Suwaidi, H Khazaimy, M Al Mansouri 2006 Innovations in Information Technology, 1-5, 2006 | 30 | 2006 |
Framework for role-based delegation models ES Barka George Mason University, 2002 | 29 | 2002 |
Firewall filtering rules analysis for anomalies detection A Bouhoula, Z Trabelsi, E Barka, MA Benelbahri International Journal of Security and Networks 3 (3), 161-172, 2008 | 27 | 2008 |