


default search action
Abed Ellatif Samhat
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c51]Habib El Amin, Abed Ellatif Samhat, Maroun Chamoun, Lina Oueidat, Antoine Feghali:
An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management. WoWMoM 2025: 5-12 - 2024
- [j34]Habib El Amin, Lina Oueidat, Maroun Chamoun, Abed Ellatif Samhat
, Antoine Feghali:
Blockchain-based multi-organizational cyber risk management framework for collaborative environments. Int. J. Inf. Sec. 23(2): 1231-1249 (2024) - [j33]Mohammad Beyrouti
, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat
:
Vulnerability-oriented risk identification framework for IoT risk assessment. Internet Things 27: 101333 (2024) - [j32]Habib El Amin, Abed Ellatif Samhat
, Maroun Chamoun, Lina Oueidat, Antoine Feghali:
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure. J. Cybersecur. Priv. 4(2): 357-381 (2024) - [c50]Hasan Nasrallah, Abed Ellatif Samhat, Cristiano Nattero, Ali J. Ghandour:
Automated National Urban Map Extraction. IGARSS 2024: 5431-5434 - [c49]Mohammad Beyrouti, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat:
Security-Bag: A Specification-based Intrusion Detection System Applied to Star Topology BLE Networks. IOTSMS 2024: 169-176 - [c48]Mirna Haidar, Yasser Fadlallah, Zeinab Kassir, Hadi E. Sawaya, Abed Ellatif Samhat:
An Adaptive Coded Caching Scheme for Time-Varying Channels. VTC Spring 2024: 1-6 - [i5]Hasan Nasrallah, Abed Ellatif Samhat, Cristiano Nattero, Ali J. Ghandour:
Automated National Urban Map Extraction. CoRR abs/2404.06202 (2024) - 2023
- [j31]Jamal Haydar, Abed Ellatif Samhat
, Guy Pujolle:
Access selection in heterogeneous wireless networks based on user preferences. Int. J. Intell. Syst. Technol. Appl. 21(1): 21-39 (2023) - [j30]Hassan Jradi
, Fabienne Nouvel
, Abed Ellatif Samhat
, Jean-Christophe Prévotet
, Mohamad Mroué
:
A Seamless Integration Solution for LoRaWAN Into 5G System. IEEE Internet Things J. 10(18): 16238-16252 (2023) - [j29]Mouhamad Almakhour, Layth Sliman
, Abed Ellatif Samhat
, Abdelhamid Mellouk:
A formal verification approach for composite smart contracts security using FSM. J. King Saud Univ. Comput. Inf. Sci. 35(1): 70-86 (2023) - [j28]Ali Loubany
, Samer Lahoud
, Abed Ellatif Samhat
, Melhem El Helou:
Improving Energy Efficiency in LoRaWAN Networks with Multiple Gateways. Sensors 23(11): 5315 (2023) - [j27]Ali Loubany
, Samer Lahoud, Abed Ellatif Samhat
, Melhem El Helou:
Joint throughput-energy optimization in multi-gateway LoRaWAN networks. Telecommun. Syst. 84(2): 271-283 (2023) - [j26]Majdi Richa
, Jean-Christophe Prévotet, Mickaël Dardaillon, Mohamad Mroué
, Abed Ellatif Samhat
:
High-level power estimation techniques in embedded systems hardware: an overview. J. Supercomput. 79(4): 3771-3790 (2023) - [j25]Hassan Jradi
, Fabienne Nouvel, Abed Ellatif Samhat
, Jean-Christophe Prévotet, Mohamad Mroué
:
Secure proxy MIPv6-based mobility solution for LPWAN. Wirel. Networks 29(1): 69-85 (2023) - [c47]Bachar Kachouh
, Layth Sliman
, Abed Ellatif Samhat
, Kamel Barkaoui
:
Demystifying Threshold Elliptic Curve Digital Signature Algorithm for MultiParty Applications. ACSW 2023: 112-121 - [c46]Mohammad Beyrouti, Ahmed Lounis
, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat
:
Vulnerability and Threat Assessment Framework for Internet of Things Systems. CIoT 2023: 62-69 - [c45]Ali Loubany, Samer Lahoud
, Abed Ellatif Samhat
, Melhem El Helou:
Throughput Improvement for LoRaWAN Networks Considering IoT Applications Priority. CIoT 2023: 206-210 - [c44]Majdi Richa, Jean-Christophe Prévotet, Mickaël Dardaillon, Mohamad Mroué
, Abed Ellatif Samhat
:
High-Level Online Power Monitoring of FPGA IP Based on Machine Learning. DASIP 2023: 107-119 - [c43]Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat
, Boussad Ait Salem
, Abdelhamid Mellouk:
VNFO-DCSC: A Novel Secure End-to-End NFV Marketplace Using Dynamic Composite Smart Contracts. GLOBECOM 2023: 1632-1637 - [c42]Ali Loubany, Samer Lahoud, Abed Ellatif Samhat
, Melhem El Helou:
Energy Efficiency Enhancement for LoRaWAN Networks with Multiple Gateways. ICC 2023: 2147-2152 - [c41]Mirna Haidar, Yasser Fadlallah, Hadi E. Sawaya, Abed Ellatif Samhat
:
Caching-aided coded multicasting in dynamic scenarios. PIMRC 2023: 1-6 - 2022
- [j24]Hasan Nasrallah
, Abed Ellatif Samhat
, Yilei Shi, Xiao Xiang Zhu
, Ghaleb Faour
, Ali J. Ghandour
:
Lebanon Solar Rooftop Potential Assessment Using Buildings Segmentation From Aerial Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 4909-4918 (2022) - [c40]Majdi Richa, Jean-Christophe Prévotet, Mickaël Dardaillon, Mohamad Mroué
, Abed Ellatif Samhat
:
High-Level Early Power Estimation of FPGA IP Based on Machine Learning. ICECS 2022 2022: 1-4 - [c39]Ali Loubany, Abed Ellatif Samhat
, Samer Lahoud
, Melhem El Helou:
Battery-Less LoRaWAN Network using Energy Harvesting: Improving Network Throughput. PIMRC 2022: 1032-1037 - 2021
- [j23]Hassan Jradi
, Abed Ellatif Samhat
, Fabienne Nouvel, Mohamad Mroué
, Jean-Christophe Prévotet:
Overview of the mobility related security challenges in LPWANs. Comput. Networks 186: 107761 (2021) - [j22]Layth Sliman
, Tasnime Omrani, Zahir Tari, Abed Ellatif Samhat, Rhouma Rhouma:
Towards an ultra lightweight block ciphers for Internet of Things. J. Inf. Secur. Appl. 61: 102897 (2021) - [j21]Houssein Hellani
, Layth Sliman
, Abed Ellatif Samhat
, Ernesto Exposito
:
Computing Resource Allocation Scheme for DAG-Based IOTA Nodes. Sensors 21(14): 4703 (2021) - [j20]Bachar Kachouh
, Khalil Hariss, Layth Sliman
, Abed Ellatif Samhat
, Tamim Alsuliman:
Privacy preservation of genome data analysis using homomorphic encryption. Serv. Oriented Comput. Appl. 15(4): 273-287 (2021) - [c38]Majdi Richa, Jean-Christophe Prévotet, Mickaël Dardaillon, Mohamad Mroué
, Abed Ellatif Samhat
:
An Automated and Centralized Data Generation and Acquisition System. ICECS 2021: 1-4 - [c37]Mouhamad Almakhour, Ayoub Wehby, Layth Sliman
, Abed Ellatif Samhat
, Abdelhamid Mellouk:
Smart Contract Based Solution for Secure Distributed SDN. NTMS 2021: 1-6 - [c36]Houssein Hellani, Layth Sliman
, Abed Ellatif Samhat
, Ernesto Exposito
:
Tangle the Blockchain: Towards Connecting Blockchain and DAG. WETICE 2021: 63-68 - [i4]Hasan Nasrallah, Abed Ellatif Samhat, Ghaleb Faour, Yilei Shi, Ali J. Ghandour:
Solar Potential Assessment using Multi-Class Buildings Segmentation from Aerial Images. CoRR abs/2111.11397 (2021) - [i3]Mohammad Dimassi, Abed Ellatif Samhat, Mohammad Zaraket, Jamal Haydar, Mustafa Shukor, Ali J. Ghandour:
Buildings Classification using Very High Resolution Satellite Imagery. CoRR abs/2111.14650 (2021) - 2020
- [j19]Wael Ayoub, Abed Ellatif Samhat
, Fabienne Nouvel, Mohamad Mroué
, Hassan Jradi
, Jean-Christophe Prévotet:
Media independent solution for mobility management in heterogeneous LPWAN technologies. Comput. Networks 182: 107423 (2020) - [j18]Wael Ayoub
, Fabienne Nouvel, Abed Ellatif Samhat
, Mohamad Mroué
, Jean-Christophe Prévotet
:
Mobility Management With Session Continuity During Handover in LPWAN. IEEE Internet Things J. 7(8): 6686-6703 (2020) - [j17]Khalil Hariss, Hassan Noura
, Abed Ellatif Samhat
:
An efficient fully homomorphic symmetric encryption algorithm. Multim. Tools Appl. 79(17-18): 12139-12164 (2020) - [j16]Mouhamad Almakhour
, Layth Sliman
, Abed Ellatif Samhat
, Abdelhamid Mellouk:
Verification of smart contracts: A survey. Pervasive Mob. Comput. 67: 101227 (2020) - [c35]Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat
:
Cloud Assisted Privacy Preserving Using Homomorphic Encryption. CSNet 2020: 1-8 - [c34]Mouhamad Almakhour, Layth Sliman
, Abed Ellatif Samhat
, Abdelhamid Mellouk:
On the Verification of Smart Contracts: A Systematic Review. ICBC 2020: 94-107
2010 – 2019
- 2019
- [j15]Wael Ayoub
, Abed Ellatif Samhat
, Fabienne Nouvel, Mohamad Mroué
, Jean-Christophe Prévotet
:
Internet of Mobile Things: Overview of LoRaWAN, DASH7, and NB-IoT in LPWANs Standards and Supported Mobility. IEEE Commun. Surv. Tutorials 21(2): 1561-1581 (2019) - [j14]Samar Sindian, Abed Ellatif Samhat, Matthieu Crussière, Jean-François Hélard, Ayman Khalil:
Mesh HDR WPAN resource allocation optimization approaches. Int. Arab J. Inf. Technol. 16(3A): 525-532 (2019) - [j13]Hamssa Hasrouny, Abed Ellatif Samhat
, Carole Bassil
, Anis Laouiti:
Misbehavior detection and efficient revocation within VANET. J. Inf. Secur. Appl. 46: 193-209 (2019) - [j12]Hamssa Hasrouny
, Abed Ellatif Samhat
, Carole Bassil, Anis Laouiti:
Trust model for secure group leader-based communications in VANET. Wirel. Networks 25(8): 4639-4661 (2019) - [c33]Wael Ayoub, Mohamad Mroué
, Abed Ellatif Samhat
, Fabienne Nouvel, Jean-Christophe Prévotet:
SCHC-Based Solution for Roaming in LoRaWAN. BWCCA 2019: 162-172 - [c32]Hussein Hellani, Layth Sliman
, Motaz Ben Hassine
, Abed Ellatif Samhat
, Ernesto Exposito
, Mourad Kmimech:
Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT Environment. HIS 2019: 429-440 - [c31]Hamssa Hasrouny, Abed Ellatif Samhat
, Carole Bassil, Anis Laouiti:
A Trusted Group-Based Revocation Process for Intelligent Transportation System. ICDEc 2019: 133-146 - [c30]Khalil Hariss, Abed Ellatif Samhat
, Maroun Chamoun:
An Efficient FHE Scheme to Secure Cloud Computing. ICETE (2) 2019: 341-349 - [c29]Wael Ayoub, Fabienne Nouvel, Sarah Hmede, Abed Ellatif Samhat
, Mohamad Mroué
, Jean-Christophe Prévotet:
Implementation of SCHC in NS-3 and Comparison with 6LoWPAN. ICT 2019: 432-436 - [c28]Samar Sindian, Abed Ellatif Samhat
, Ayman Khalil, Matthieu Crussière, Jean-François Hélard, Samer Sindian:
Hop-2 IEEE 802.15.5 Optimization framework for Resource Allocation with Service Differentiation. ISNCC 2019: 1-6 - 2018
- [c27]Samar Sindian
, Abed Ellatif Samhat
, Matthieu Crussière, Jean-François Hélard, Ayman Khalil:
Optimization Framework for Resource Allocation in IEEE 802.15.5 Hop-1. ACIT 2018: 1-6 - [c26]Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Walid Gaaloul:
Trustless Blockchain-based Access Control in Dynamic Collaboration. BDCSIntell 2018: 27-33 - [c25]Bassam Hussein, Abed Ellatif Samhat
:
Resource Allocation for D2D Communications in Mobile Networks. ICCA 2018: 253-259 - [c24]Wael Ayoub, Fabienne Nouvel, Abed Ellatif Samhat
, Jean-Christophe Prévotet, Mohamad Mroué
:
Overview and Measurement of Mobility in DASH7. ICT 2018: 532-536 - [c23]Hamssa Hasrouny, Abed Ellatif Samhat
, Carole Bassil, Anis Laouiti:
A security solution for V2V communication within VANETs. Wireless Days 2018: 181-183 - [c22]Soha Farhat, Batool Hage Hassan, Abed Ellatif Samhat
:
Energy Efficient Resource Sharing in Multi-Operator Heterogeneous Cloud RAN. WiMob 2018: 116-122 - 2017
- [j11]Khalil Hariss, Hassan Noura
, Abed Ellatif Samhat
:
Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications. J. Inf. Secur. Appl. 34: 233-242 (2017) - [j10]Hamssa Hasrouny, Abed Ellatif Samhat
, Carole Bassil, Anis Laouiti:
VANet security challenges and solutions: A survey. Veh. Commun. 7: 7-20 (2017) - [j9]Soha Farhat, Abed Ellatif Samhat
, Samer Lahoud
, Bernard Cousin:
Radio Access Network Sharing in 5G: Strategies and Benefits. Wirel. Pers. Commun. 96(2): 2715-2740 (2017) - [c21]Khalil Hariss, Hassan Noura
, Abed Ellatif Samhat
, Maroun Chamoun:
Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. CRiSIS 2017: 127-139 - [c20]Khalil Hariss, Maroun Chamoun, Abed Ellatif Samhat
:
On DGHV and BGV fully homomorphic encryption schemes. CSNet 2017: 1-9 - 2015
- [j8]Samar Sindian
, Jean-François Hélard, Abed Ellatif Samhat
, Matthieu Crussière, Ayman Khalil
:
Resource allocation mechanism in IEEE 802.15.3 parent/child model. Wirel. Networks 21(6): 1863-1877 (2015) - [c19]Soha Farhat, Zahraa Chahine, Abed Ellatif Samhat
, Samer Lahoud
, Bernard Cousin
:
Access selection and joint pricing in multi-operator wireless networks: A Stackelberg game. DICTAP 2015: 38-43 - [c18]Hamssa Hasrouny, Carole Bassil, Abed Ellatif Samhat
, Anis Laouiti:
Group-based authentication in V2V communications. DICTAP 2015: 173-177 - [c17]Soha Farhat, Abed Ellatif Samhat
, Samer Lahoud
, Bernard Cousin
:
Pricing strategies in multi-operator heterogeneous wireless networks. NTMS 2015: 1-5 - 2014
- [j7]Samar Sindian
, Matthieu Crussière, Jean-François Hélard, Abed Ellatif Samhat
, Ayman Khalil
:
Admission control and resource allocation strategies for IEEE 802.15.5. EURASIP J. Wirel. Commun. Netw. 2014: 197 (2014) - [j6]Samar Sindian
, Ayman Khalil
, Abed Ellatif Samhat
, Matthieu Crussière, Jean-François Hélard:
Resource Allocation in High Data Rate Mesh WPAN: A Survey Paper. Wirel. Pers. Commun. 74(2): 909-932 (2014) - [c16]Samar Sindian
, Ayman Khalil
, Abed Ellatif Samhat
, Matthieu Crussière, Jean-François Hélard:
Admission control and resource allocation in IEEE 802.15.5 HDR WPAN. NOF 2014: 1-2 - [c15]Soha Farhat, Abed Ellatif Samhat
, Samer Lahoud
:
Hybrid decision algorithm for access selection in multi-operator networks. WCNC 2014: 2414-2419 - [i2]Soha Farhat, Abed Ellatif Samhat, Samer Lahoud, Bernard Cousin:
Best Operator Policy in a Heterogeneous Wireless Network. CoRR abs/1408.4992 (2014) - [i1]Soha Farhat, Bernard Cousin, Samer Lahoud, Abed Ellatif Samhat:
Hybrid Decision Algorithm for Access Selection in Multi-operator Networks. CoRR abs/1408.5098 (2014) - 2013
- [c14]Samar Sindian
, Abed Ellatif Samhat
, Ayman Khalil
, Matthieu Crussière, Jean-François Hélard:
Dynamic superframe size-based admission control in parent/child HR WPANs. ICCIT 2013: 314-319 - 2010
- [j5]Jamal Haydar, Abbas Ibrahim, Abed Ellatif Samhat
, Guy Pujolle:
ABCDecision: A Simulation Platform for Access Selection Algorithms in Heterogeneous Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010)
2000 – 2009
- 2009
- [j4]Marc Ibrahim
, Kinda Khawam, Abed Ellatif Samhat
, Samir Tohmé:
Analytical framework for dimensioning hierarchical WiMax-WiFi networks. Comput. Networks 53(3): 299-309 (2009) - 2008
- [c13]Marc Ibrahim
, Kinda Khawam, Abed Ellatif Samhat
, Samir Tohmé:
Dimensioning Hierarchical WiMax-WiFi Networks. CCNC 2008: 48-53 - [c12]Bin Liu, Philippe Martins, Abed Ellatif Samhat
, Philippe Bertin:
A Cross-Layer Scheme for Inter-RAT Handover from WiMAX to UMTS. GLOBECOM 2008: 5367-5372 - [c11]Bin Liu, Philippe Martins, Abed Ellatif Samhat
, Philippe Bertin:
A layer 2 scheme for inter-RAT handover between UMTS and WiMAX in tight coupling architecture. PIMRC 2008: 1-5 - [c10]Bin Liu, Philippe Martins, Abed Ellatif Samhat
, Philippe Bertin:
A Layer 2 Scheme of Inter-RAT Handover between UMTS and WiMAX. VTC Fall 2008: 1-5 - 2007
- [c9]Abed Ellatif Samhat
, Miloud Abdi:
Security and AAA Architecture for WiFi-WiMAX Mesh Network. ISWCS 2007: 587-591 - [c8]Kinda Khawam, Abed Ellatif Samhat
, Marc Ibrahim
, Jean-Marc Kelif:
Fluid Model for Wireless Adhoc Networks. PIMRC 2007: 1-5 - [c7]Ridha Nasri, Abed Ellatif Samhat
, Zwi Altman:
A New Approach of UMTS-WLAN Load Balancing; Algorithm and its Dynamic Optimization. WOWMOM 2007: 1-6 - 2006
- [c6]Abed Ellatif Samhat
, Zwi Altman, Benoît Fourestié:
Performance analysis of the IEEE 802.11 DCF with imperfect radio conditions. ICWMC 2006: 27 - [c5]Abed Ellatif Samhat
, Zwi Altman:
Modelling and Radio Resource Management in IEEE 802.11B WLAN for Semi-Dynamic Simulator. PIMRC 2006: 1-5 - 2005
- [j3]Abed Ellatif Samhat
, Tijani Chahed, Mehdi Sabeur:
IP-based transport of voice traffic in the UMTS radio access network: analytical study and empirical validation. Ann. des Télécommunications 60(5-6): 610-629 (2005) - [j2]Abed Ellatif Samhat
, Tijani Chahed:
IP versus AAL2 for transport in the UMTS radio access network. Comput. Commun. 28(5): 477-484 (2005) - [c4]Abed Ellatif Samhat
, Tijani Chahed:
On the QoS-capable transport in the IP-based UTRAN. ISWCS 2005: 318-321 - 2004
- [j1]Salah-Eddine Elayoubi, Tijani Chahed, Mazen Tlais, Abed Ellatif Samhat
:
Measurement-based admission control in UMTS. Ann. des Télécommunications 59(11-12): 1433-1445 (2004) - [c3]Abed Ellatif Samhat
, Tijani Chahed:
Transport in IP-based UMTS radio access network: analytical study and empirical validation. ICC 2004: 4285-4289 - [c2]Abed Ellatif Samhat
, Tijani Chahed, Gérard Hébuterne:
Priority Queuing for IP-Based Service Differentiation in the UMTS Radio Access Network. NETWORKING 2004: 490-501 - [c1]Abed Ellatif Samhat
, Tijani Chahed:
Modeling and analysis of transport of voice and data in the UMTS radio access network: IP versus AAL2/ATM. WCNC 2004: 1063-1068
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint