default search action
Hassnaa Moustafa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Xiaoyun Wang, Tao Sun, Yong Cui, Rajkumar Buyya, Deke Guo, Qun Huang, Hassnaa Moustafa, Chen Tian, Shangguang Wang:
Coordination of networking and computing: toward new information infrastructure and new services mode. Frontiers Inf. Technol. Electron. Eng. 25(5): 629-632 (2024) - [j27]Shu-Ping Yeh, Sonia Bhattacharya, Rashika Sharma, Hassnaa Moustafa:
Deep Learning for Intelligent and Automated Network Slicing in 5G Open RAN (ORAN) Deployment. IEEE Open J. Commun. Soc. 5: 64-70 (2024) - [i3]Ravikumar Balakrishnan, Marius Arvinte, Nageen Himayat, Hosein Nikopour, Hassnaa Moustafa:
Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management. CoRR abs/2405.03891 (2024) - 2023
- [j26]Bouziane Brik, Hassnaa Moustafa, Yan Zhang, Abderrahmane Lakas, Sriram Subramanian:
Guest Editorial: Multi-Access Networking for Extended Reality and Metaverse. IEEE Internet Things Mag. 6(1): 12-13 (2023) - 2022
- [j25]Francesc Guim, Thijs Metsch, Hassnaa Moustafa, Timothy Verrall, David Carrera, Nicola Cadenelli, Jiang Chen, David Doria, Chadie Ghadie, Raül González Prats:
Autonomous Lifecycle Management for Resource-Efficient Workload Orchestration for Green Edge Computing. IEEE Trans. Green Commun. Netw. 6(1): 571-582 (2022) - 2021
- [j24]Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Zeeshan Kaleem, Akhilesh S. Thyagaturu, Hassnaa Moustafa, Al-Sakib Khan Pathan:
IEEE Access Special Section Editorial: Software-Defined Networks for Energy Internet and Smart Grid Communication. IEEE Access 9: 69139-69142 (2021) - [j23]Yan Zhang, Zhiyong Feng, Hassnaa Moustafa, Feng Ye, Usman Javaid, Chunfen Cui:
Guest Editorial: Edge Intelligence for Beyond 5G Networks. IEEE Wirel. Commun. 28(2): 10-11 (2021) - [c32]Gang Shen, Jianhui Dai, Hassnaa Moustafa, Lei Zhai:
5G and Edge Computing Enabling Experience Delivery Network (XDN) for Immersive Media. HPSR 2021: 1-7 - 2020
- [j22]Yan Zhang, Jianhua He, Javier Lopez, Min Sheng, Hassnaa Moustafa, Yizhi Ren, Nirwan Ansari:
IEEE Access Special Section Editorial: Mobile Edge Computing. IEEE Access 8: 106071-106074 (2020) - [j21]Hichem Sedjelmaci, Fateh Guenab, Sidi-Mohammed Senouci, Hassnaa Moustafa, Jiajia Liu, Shuai Han:
Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems. IEEE Netw. 34(3): 6-7 (2020) - [j20]Yan Zhang, Kun Wang, Hassnaa Moustafa, Stephen Wang, Ke Zhang:
Guest Editorial: Blockchain and AI for Beyond 5G Networks. IEEE Netw. 34(6): 22-23 (2020)
2010 – 2019
- 2019
- [c31]Eve M. Schooler, David Zage, Hassnaa Moustafa, Jeff Sedayao:
A Marauder's Map for the IoT Edge. CIC 2019: 236-245 - [c30]Javier Perez-Ramirez, Richard D. Roberts, Ankit P. Navik, Nagarajan Muralidharan, Hassnaa Moustafa:
Optical Wireless Camera Communications using Neuromorphic Vision Sensors. ICC Workshops 2019: 1-6 - 2018
- [j19]Zeeshan Kaleem, Mubashir Husain Rehmani, Ejaz Ahmed, Abbas Jamalipour, Joel J. P. C. Rodrigues, Hassna Moustafa, Wael Guibène:
Amateur Drone Surveillance: Applications, Architectures, Enabling Technologies, and Public Safety Issues: Part 1. IEEE Commun. Mag. 56(1): 14-15 (2018) - [j18]Zeeshan Kaleem, Mubashir Husain Rehmani, Ejaz Ahmed, Abbas Jamalipour, Joel J. P. C. Rodrigues, Hassna Moustafa, Wael Guibène:
Amateur Drone Surveillance: Applications, Architectures, Enabling Technologies, and Public Safety Issues: Part 2. IEEE Commun. Mag. 56(4): 66-67 (2018) - [j17]Yan Zhang, Yuan Wu, Hassnaa Moustafa, Danny H. K. Tsang, Alberto Leon-Garcia, Usman Javaid:
Multi-Access Mobile Edge Computing for Heterogeneous IoT. IEEE Commun. Mag. 56(8): 12-13 (2018) - [c29]Libin Tang, Harish Subramony, Weian Chen, Jimin Ha, Hassnaa Moustafa, Tejaswini Sirlapu, Gauri Deshpande, Alicja Kwasniewska:
Edge Assisted Efficient Data Annotation for Realtime Video Big Data. IECON 2018: 6197-6201 - 2017
- [j16]Abderrahim Benslimane, Hassnaa Moustafa, Ying-Dar Lin, Milena Radenkovic:
Guest Editorial: IoT: Protocol Stack, Cross-Layer, and Power Consumption Issues. IEEE Wirel. Commun. 24(3): 8-9 (2017) - [c28]Hassnaa Moustafa, Eve M. Schooler, Jessica McCarthy:
Reverse CDN in Fog Computing: The lifecycle of video data in connected and autonomous vehicles. FWC 2017: 1-5 - [c27]Eve M. Schooler, David Zage, Jeff Sedayao, Hassnaa Moustafa, Andrew Brown, Moreno Ambrosin:
An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. ICDCS 2017: 1717-1728 - [c26]Hatem Ibn-Khedher, Hossam Afifi, Hassnaa Moustafa:
Optimal placement algorithm (OPA) for IoT over ICN. INFOCOM Workshops 2017: 372-377 - 2016
- [c25]Hassnaa Moustafa, Eve M. Schooler, Gang Shen, Sanjana Kamath:
Remote monitoring and medical devices control in eHealth. WiMob 2016: 1-8 - 2015
- [j15]Hassnaa Moustafa, Holger Kenn, Kamran Sayrafian, William G. Scanlon, Yan Zhang:
Mobile wearable communications [Guest Editorial]. IEEE Wirel. Commun. 22(1): 10-11 (2015) - 2014
- [j14]Hassnaa Moustafa, Giovanni Pau, Fan Bai, Yan Zhang:
Guest Editorial. IEEE Internet Things J. 1(6): 522-524 (2014) - [c24]Zheng Lu, V. Srinivasa Somayazulu, Hassnaa Moustafa:
Context-adaptive cross-layer TCP optimization for Internet video streaming. ICC 2014: 1723-1728 - 2013
- [j13]Mamadou Tourad Diallo, Hassnaa Moustafa, Hossam Afifi, Nicolas Maréchal:
Adaptation of audiovisual contents and their delivery means. Commun. ACM 56(11): 86-93 (2013) - [j12]Marek Dabrowski, Justyna Gromada, Hassnaa Moustafa, Jacky Forestier:
A context-aware architecture for IPTV services personalization. J. Internet Serv. Inf. Secur. 3(1/2): 49-70 (2013) - [j11]Songbo Song, Mohamed Abid, Hassnaa Moustafa, Hossam Afifi:
Performance evaluation of an authentication solution for IMS services access. Telecommun. Syst. 52(4): 2205-2218 (2013) - 2012
- [j10]Songbo Song, Hassnaa Moustafa, Hossam Afifi:
A Survey on Personalized TV and NGN Services through Context-Awareness. ACM Comput. Surv. 44(1): 4:1-4:18 (2012) - [j9]Songbo Song, Hassnaa Moustafa, Hossam Afifi:
IPTV Services Personalization Using Context-Awareness. Informatica (Slovenia) 36(1): 13-20 (2012) - [j8]Hassnaa Moustafa, Nicolas Maréchal, Sherali Zeadally:
Mobile Multimedia Applications: Delivery Technologies. IT Prof. 14(5): 12-21 (2012) - [j7]Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Advanced IPTV Services Personalization Through Context-Aware Content Recommendation. IEEE Trans. Multim. 14(6): 1528-1537 (2012) - [c23]Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Modeling an NGN authentication solution and improving its performance through clustering. GLOBECOM 2012: 2101-2106 - [c22]Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Enriched IPTV services personalization. ICC 2012: 1911-1916 - [c21]Marek Dabrowski, Justyna Gromada, Hassnaa Moustafa:
Context-Awareness for IPTV Services Personalization. IMIS 2012: 37-44 - [c20]Adam Flizikowski, Mateusz Majewski, Damian Puchalski, Hassnaa Moustafa, Michal Choras:
A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms. IP&C 2012: 269-281 - 2011
- [j6]Sherali Zeadally, Hassnaa Moustafa, Farhan Siddiqui:
Internet Protocol Television (IPTV): Architecture, Trends, and Challenges. IEEE Syst. J. 5(4): 518-527 (2011) - 2010
- [j5]Yan Zhang, Hassnaa Moustafa, Sherali Zeadally:
Recent advances in wireless communications and networks. Wirel. Commun. Mob. Comput. 10(1): 1-3 (2010) - [c19]Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Personalized TV Service through Employing Context-Awareness in IPTV/IMS Architecture. FMN 2010: 75-86 - [c18]Hassnaa Moustafa, Estelle Transy, Jacky Forestier:
Authentication, authorization, and accounting of services in multi-hop mobile networks through rewarding. Wireless Days 2010: 1-6 - [i2]Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Integrating identity-based cryptography in IMS service authentication. CoRR abs/1004.0762 (2010) - [i1]Hassnaa Moustafa, Hannes Tschofenig, Stefaan De Cnodder:
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP). RFC 5713: 1-18 (2010)
2000 – 2009
- 2009
- [j4]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon:
Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions. Int. J. Ambient Comput. Intell. 1(1): 39-52 (2009) - [j3]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon:
On Analyzing the Potential of a Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Communications. Wirel. Pers. Commun. 51(1): 31-52 (2009) - [c17]Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Context-Aware IPTV. MMNS 2009: 189-194 - [c16]Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari:
Distributed authentication for services commercialization in ad hoc networks. Mobility Conference 2009 - [c15]Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi:
Efficient identity-based authentication for IMS based services access. MoMM 2009: 260-266 - 2008
- [c14]Hassnaa Moustafa, Gilles Bourdon:
Authentication and services access control in a cooperative ad hoc environment. BROADNETS 2008: 32-39 - [c13]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon:
A Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks. GLOBECOM 2008: 628-633 - [c12]Mohamed Abid, Hossam Afifi, Hassnaa Moustafa, Gilles Bourdon:
Fuzzy biometric authentication in Home Networks for personalized users' access. ICT 2008: 1-6 - [c11]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon:
Performance Analysis of a Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks. VTC Spring 2008: 2636-2640 - [c10]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon:
Prioritizing and Enhancing Vehicular Networks Authentication Process Using DSRC Channels Diversity. WiMob 2008: 429-434 - 2006
- [c9]Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant:
Providing Authentication and Access Control in Vehicular Network Environment. SEC 2006: 62-73 - [c8]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod:
Hybrid Wireless Networks: Applications, Architectures and New Perspectives. SECON 2006: 848-853 - [c7]Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant:
Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments. WMASH 2006: 37-46 - 2005
- [j2]Hassnaa Moustafa, Houda Labiod:
Adaptive Path Energy Conserving Routing in MANETs. Ad Hoc Sens. Wirel. Networks 1(4): 324-342 (2005) - [c6]Hassnaa Moustafa, Houda Labiod, Philippe Godlewski:
A reactive random graph (RRG) model for multicast routing in MANETs. GLOBECOM 2005: 5 - [c5]Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant:
AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. Vehicular Ad Hoc Networks 2005: 79-80 - 2004
- [j1]Hassnaa Moustafa, Houda Labiod:
Multicast Routing in Mobile Ad Hoc Networks. Telecommun. Syst. 25(1-2): 65-88 (2004) - [c4]Hassnaa Moustafa, Houda Labiod:
A performance analysis of source routing-based multicast protocol (SRMP) using different mobility models. ICC 2004: 4192-4196 - 2003
- [c3]Hassnaa Moustafa, Houda Labiod:
Energy Consumption Routing for Mobile Ad Hoc Networks. EUSAI 2003: 65-75 - [c2]Hasnaa Moustafa, Houda Labiod:
Adaptive Path Energy Conserving Routing in MANETs. MWCN 2003 - [c1]Hassnaa Moustafa, Houda Labiod:
A performance comparison of multicast routing protocols in ad hoc networks. PIMRC 2003: 497-501
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 21:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint