Follow
Moussa Ayyash
Moussa Ayyash
Professor of Electrical Engineering and Computing
Verified email at ieee.org
Title
Cited by
Cited by
Year
Internet of things: A survey on enabling technologies, protocols, and applications
A Al-Fuqaha, M Guizani, M Mohammadi, M Aledhari, M Ayyash
IEEE communications surveys & tutorials 17 (4), 2347-2376, 2015
93772015
Coexistence of WiFi and LiFi toward 5G: concepts, opportunities, and challenges
M Ayyash, H Elgala, A Khreishah, V Jungnickel, T Little, S Shao, ...
IEEE Communications Magazine 54 (2), 64-71, 2016
5162016
Internet of things: A survey on enabling technologies, protocols, and applications. Communications Surveys & Tutorials
A Al-Fuqaha, M Guizani, M Mohammadi, M Aledhari, M Ayyash
Ieee 17 (4), 2347-2376, 2015
2192015
Design and analysis of a visible-light-communication enhanced WiFi system
S Shao, A Khreishah, M Ayyash, MB Rahaim, H Elgala, V Jungnickel, ...
Journal of Optical Communications and Networking 7 (10), 960-973, 2015
1672015
An indoor hybrid WiFi-VLC internet access system
S Shao, A Khreishah, MB Rahaim, H Elgala, M Ayyash, TDC Little, J Wu
2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems …, 2014
1462014
A provably efficient online collaborative caching algorithm for multicell-coordinated systems
A Gharaibeh, A Khreishah, B Ji, M Ayyash
IEEE Transactions on Mobile Computing 15 (8), 1863-1876, 2015
1422015
Edge-computing architectures for internet of things applications: A survey
S Hamdan, M Ayyash, S Almajali
Sensors 20 (22), 6441, 2020
1412020
Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks
HAB Salameh, S Almajali, M Ayyash, H Elgala
IEEE Internet of Things Journal 5 (3), 1904-1913, 2018
1242018
A hybrid RF-VLC system for energy efficient wireless access
A Khreishah, S Shao, A Gharaibeh, M Ayyash, H Elgala, N Ansari
IEEE Transactions on Green Communications and Networking 2 (4), 932-944, 2018
732018
Visible light communication module: An open source extension to the ns3 network simulator with real system validation
A Aldalbahi, M Rahaim, A Khreishah, M Ayyash, TDC Little
IEEE Access 5, 22144-22158, 2017
542017
A framework for efficient and secured mobility of IoT devices in mobile edge computing
S Almajali, HB Salameh, M Ayyash, H Elgala
2018 third international conference on fog and mobile edge computing (FMEC …, 2018
492018
Extending ns3 to simulate visible light communication at network-level
A Aldalbahi, M Rahaim, A Khreishah, M Ayyash, R Ackerman, J Basuino, ...
2016 23rd International Conference on Telecommunications (ICT), 1-6, 2016
412016
SDN security review: Threat taxonomy, implications, and open challenges
M Rahouti, K Xiong, Y Xin, SK Jagatheesaperumal, M Ayyash, ...
IEEE Access 10, 45820-45854, 2022
402022
A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets
B Alhijawi, S Almajali, H Elgala, HB Salameh, M Ayyash
Computers and Electrical Engineering 99, 107706, 2022
342022
Artificial intelligence in education: a panoramic review
K Ahmad, J Qadir, A Al-Fuqaha, W Iqbal, A El-Hassan, D Benhaddou, ...
DOI: https://doi. org/10.35542/osf. io/zvu2n, 2020
332020
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
HB Salameh, S Almajali, M Ayyash, H Elgala
2017 Fourth International Conference on Software Defined Systems (SDS), 43-47, 2017
312017
Optimizing handover parameters by Q-learning for heterogeneous radio-optical networks
S Shao, G Liu, A Khreishah, M Ayyash, H Elgala, TDC Little, M Rahaim
IEEE Photonics Journal 12 (1), 1-15, 2019
272019
A novel trust-aware and energy-aware clustering method that uses stochastic fractal search in IoT-enabled wireless sensor networks
S Hriez, S Almajali, H Elgala, M Ayyash, HB Salameh
IEEE Systems Journal 16 (2), 2693-2704, 2021
242021
Unknown security attack detection using shallow and deep ANN classifiers
M Al-Zewairi, S Almajali, M Ayyash
Electronics 9 (12), 2006, 2020
232020
Anomaly detection in blockchain using network representation and machine learning
K Martin, M Rahouti, M Ayyash, I Alsmadi
Security and Privacy, e192, 2021
222021
The system can't perform the operation now. Try again later.
Articles 1–20