default search action
Moussa Ayyash
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Rizwana Ahmad, Hany Elgala, Sufyan Almajali, Haythem Bany Salameh, Moussa Ayyash:
Unified Physical-Layer Learning Framework Toward VLC-Enabled 6G Indoor Flying Networks. IEEE Internet Things J. 11(3): 5545-5557 (2024) - [j28]Anand Singh, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala:
Performance Analysis of OIRS-Aided Indoor VLC Systems Under Dynamic Human Blockages and Random UE Orientation. IEEE Internet Things J. 11(20): 33110-33119 (2024) - [j27]Nordine Quadar, Mohamed Rahouti, Moussa Ayyash, Senthil Kumar Jagatheesaperumal, Abdellah Chehri:
IoT-AI/Machine Learning Experimental Testbeds: The Missing Piece. IEEE Internet Things Mag. 7(1): 136-143 (2024) - [j26]Kashif Ahmad, Waleed Iqbal, Ammar Elhassan, Junaid Qadir, Driss Benhaddou, Moussa Ayyash, Ala I. Al-Fuqaha:
Data-Driven Artificial Intelligence in Education: A Comprehensive Review. IEEE Trans. Learn. Technol. 17: 12-31 (2024) - [j25]Priyanka Singh, Haythem Bany Salameh, Vivek Ashok Bohara, Anand Srivastava, Moussa Ayyash:
Optimizing Connectivity in OIRS-Assisted UAV Indoor Optical Networks: Efficient Admission Control and Mirror-Element Assignment. IEEE Trans. Netw. Sci. Eng. 11(3): 2890-2900 (2024) - [c22]Priyanka Singh, Haythem Ahmad Bany Salameh, Vivek Ashok Bohara, Anand Srivastava, Moussa Ayyash:
Efficient Mirror Element Assignment in OIRS-Aided UAV-Based FSO Networks with Rate Adaptation. BlackSeaCom 2024: 13-16 - 2023
- [j24]Mohannad Alhafnawi, Haythem Ahmad Bany Salameh, Ala'eddin Masadeh, Haitham Moffaqq Al-Obiedollah, Moussa Ayyash, Reyad El-Khazali, Hany Elgala:
A Survey of Indoor and Outdoor UAV-Based Target Tracking Systems: Current Status, Challenges, Technologies, and Future Directions. IEEE Access 11: 68324-68339 (2023) - [j23]Rizwana Ahmad, Moussa Ayyash, Haythem Bany Salameh, Reyad El-Khazali, Hany Eigala:
Indoor Flying Networks for 6G: Concepts, Challenges, Enabling Technologies, and Opportunities. IEEE Commun. Mag. 61(10): 156-162 (2023) - [j22]Dil Nashin Anwar, Rizwana Ahmad, Haythem Bany Salameh, Hany Elgala, Moussa Ayyash:
Performance analysis of neural network-based unified physical layer for indoor hybrid LiFi-WiFi flying networks. Neural Comput. Appl. 35(34): 24179-24189 (2023) - [j21]Salam Hamdan, Sufyan Almajali, Moussa Ayyash, Haythem Bany Salameh, Yaser Jararweh:
An intelligent edge-enabled distributed multi-task learning architecture for large-scale IoT-based cyber-physical systems. Simul. Model. Pract. Theory 122: 102685 (2023) - 2022
- [j20]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Senthil Kumar Jagatheesaperumal, Moussa Ayyash, Maliha Shaheed:
SDN Security Review: Threat Taxonomy, Implications, and Open Challenges. IEEE Access 10: 45820-45854 (2022) - [j19]Bushra Alhijawi, Sufyan Almajali, Hany Elgala, Haythem Bany Salameh, Moussa Ayyash:
A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. Comput. Electr. Eng. 99: 107706 (2022) - [j18]Monette H. Khadr, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala, Sufyan Almajali:
Jamming resilient multi-channel transmission for cognitive radio IoT-based medical networks. J. Commun. Networks 24(6): 666-678 (2022) - [j17]Sihua Shao, Mahmoud Nazzal, Abdallah Khreishah, Moussa Ayyash:
Self-Optimizing Data Offloading in Mobile Heterogeneous Radio-Optical Networks: A Deep Reinforcement Learning Approach. IEEE Netw. 36(2): 100-106 (2022) - [j16]Kevin Martin, Mohamed Rahouti, Moussa Ayyash, Izzat Alsmadi:
Anomaly detection in blockchain using network representation and machine learning. Secur. Priv. 5(2) (2022) - [j15]Safaa Fawzey Hriez, Sufyan Almajali, Hany Elgala, Moussa Ayyash, Haythem Bany Salameh:
A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks. IEEE Syst. J. 16(2): 2693-2704 (2022) - [c21]Mohannad Alhafnawi, Ala'eddin Masadeh, Haythem Bany Salameh, Moussa Ayyash, Reyad El-Khazali, Hany Elgala:
A Review of Indoor UAV-based Tracking Systems: Classification, Status, and Challenges. ACIT 2022: 1-6 - [c20]Malcolm Smith, Alexander Castro, Mohamed Rahouti, Moussa Ayyash, Lesther Santana:
ScreenCoin: A Blockchain-Enabled Decentralized Ad Network. COINS 2022: 1-6 - 2021
- [j14]Mohamed Rahouti, Moussa Ayyash, Senthil Kumar Jagatheesaperumal, Diogo Oliveira:
Incremental Learning Implementations and Vision for Cyber Risk Detection in IoT. IEEE Internet Things Mag. 4(3): 114-119 (2021) - [j13]Sihua Shao, Abdallah Khreishah, Moussa Ayyash:
Evaluating the feasibility of random waypoint model for indoor wireless networks. Internet Technol. Lett. 4(2) (2021) - [c19]Safaa Fawzey Hriez, Sufyan Almajali, Moussa Ayyash:
Trust Models in IoT-enabled WSN: A review. DATA 2021: 153-159 - 2020
- [j12]Salam Hamdan, Moussa Ayyash, Sufyan Almajali:
Edge-Computing Architectures for Internet of Things Applications: A Survey. Sensors 20(22): 6441 (2020) - [c18]Salam Hamdan, Sufyan Almajali, Moussa Ayyash:
Comparison study between conventional machine learning and distributed multi-task learning models. ACIT 2020: 1-5 - [c17]Kevin Martin, Izzat Alsmadi, Mohamed Rahouti, Moussa Ayyash:
Combining Blockchain and Machine Learning to Forecast Cryptocurrency Prices. BCCA 2020: 52-58 - [c16]Monette H. Khadr, Haythem Bany Salameh, Moussa Ayyash, Sufyan Almajali, Hany Elgala:
Testbed Validation of Security-Aware Channel Assignment in Cognitive Radio IoT Networks. WF-IoT 2020: 1-6
2010 – 2019
- 2019
- [j11]Sufyan Almajali, Dhiah el Diehn I. Abou-Tair, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala:
A distributed multi-layer MEC-cloud architecture for processing large scale IoT-based multimedia applications. Multim. Tools Appl. 78(17): 24617-24638 (2019) - [j10]Michael B. Rahaim, Iman Abdalla, Moussa Ayyash, Hany Elgala, Abdallah Khreishah, Thomas D. C. Little:
Welcome to the CROWD: Design Decisions for Coexisting Radio and Optical Wireless Deployments. IEEE Netw. 33(5): 174-182 (2019) - [c15]Monette H. Khadr, Haythem Bany Salameh, Moussa Ayyash, Sufyan Almajali, Hany Elgala:
Securing IoT Delay-Sensitive Communications with Opportunistic Parallel Transmission Capability. GLOBECOM 2019: 1-6 - [c14]Sihua Shao, Zareen Khan, Guanxiong Liu, Abdallah Khreishah, Moussa Ayyash, Hany Elgala, Thomas D. C. Little, Michael B. Rahaim:
Poster Abstract: Optimizing Handover Parameters by Q-learning for Heterogeneous RF-VLC Networks. INFOCOM Workshops 2019: 1069-1070 - [c13]Monette H. Khadr, Hany Elgala, Moussa Ayyash, Thomas D. C. Little, Michael B. Rahaim, Abdallah Khreishah:
Technology Independent Security Aware OFDM (SA-OFDM). PIMRC 2019: 1-6 - [c12]Sufyan Almajali, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala:
Extending NS3 to Simulate Cognitive Radio Wireless Networks in a Jammed Environment. SDS 2019: 118-122 - 2018
- [j9]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Batch-based security-aware spectrum sharing with simultaneous assignment decisions in time-critical IoT networks with cognitive radio capabilities. Trans. Emerg. Telecommun. Technol. 29(11) (2018) - [j8]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks. IEEE Internet Things J. 5(3): 1904-1913 (2018) - [j7]Abdallah Khreishah, Sihua Shao, Ammar Gharaibeh, Moussa Ayyash, Hany Elgala, Nirwan Ansari:
A Hybrid RF-VLC System for Energy Efficient Wireless Access. IEEE Trans. Green Commun. Netw. 2(4): 932-944 (2018) - [c11]Sufyan Almajali, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala:
A framework for efficient and secured mobility of IoT devices in mobile edge computing. FMEC 2018: 58-62 - [c10]Zhouchi Li, Sihua Shao, Abdallah Khreishah, Moussa Ayyash, Iman Abdalla, Hany Elgala, Michael B. Rahaim, Thomas D. C. Little:
Design and Implementation of a Hybrid RF-VLC System with Bandwidth Aggregation. IWCMC 2018: 194-200 - [c9]Monette H. Khadr, Hany Elgala, Moussa Ayyash, Thomas D. C. Little, Abdallah Khreishah, Michael B. Rahaim:
Security Aware Spatial Modulation (SA-SM). Sarnoff Symposium 2018: 1-6 - [c8]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Securing delay-sensitive cognitive radio IoT communications under reactive jamming attacks: Spectrum assignment perspective. SDS 2018: 20-24 - [i4]Abdallah Khreishah, Sihua Shao, Ammar Gharaibeh, Moussa Ayyash, Hany Elgala, Nirwan Ansari:
A Hybrid RF-VLC System for Energy Efficient Wireless Access. CoRR abs/1806.05265 (2018) - 2017
- [j6]Adel Aldalbahi, Michael B. Rahaim, Abdallah Khreishah, Moussa Ayyash, Thomas D. C. Little:
Visible Light Communication Module: An Open Source Extension to the ns3 Network Simulator With Real System Validation. IEEE Access 5: 22144-22158 (2017) - [c7]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications. SDS 2017: 43-47 - 2016
- [j5]Moussa Ayyash, Hany Elgala, Abdallah Khreishah, Volker Jungnickel, Thomas D. C. Little, Sihua Shao, Michael B. Rahaim, Dominic Schulz, Jonas Hilt, Ronald Freund:
Coexistence of WiFi and LiFi toward 5G: concepts, opportunities, and challenges. IEEE Commun. Mag. 54(2): 64-71 (2016) - [j4]Ammar Gharaibeh, Abdallah Khreishah, Bo Ji, Moussa Ayyash:
A Provably Efficient Online Collaborative Caching Algorithm for Multicell-Coordinated Systems. IEEE Trans. Mob. Comput. 15(8): 1863-1876 (2016) - [c6]Adel Aldalbahi, Michael B. Rahaim, Abdallah Khreishah, Moussa Ayyash, Ryan Ackerman, James Basuino, Walter Berreta, Thomas D. C. Little:
Extending ns3 to simulate visible light communication at network-level. ICT 2016: 1-6 - 2015
- [j3]Ala I. Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, Moussa Ayyash:
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutorials 17(4): 2347-2376 (2015) - [j2]Sihua Shao, Abdallah Khreishah, Moussa Ayyash, Michael B. Rahaim, Hany Elgala, Volker Jungnickel, Dominic Schulz, Thomas D. C. Little, Jonas Hilt, Ronald Freund:
Design and Analysis of a Visible-Light-Communication Enhanced WiFi System. JOCN 7(10): 960-973 (2015) - [i3]Sihua Shao, Abdallah Khreishah, Moussa Ayyash, Michael B. Rahaim, Hany Elgala, Volker Jungnickel, Dominic Schulz, Thomas D. C. Little:
Design of a visible-light-communication enhanced WiFi system. CoRR abs/1503.02367 (2015) - [i2]Ammar Gharaibeh, Abdallah Khreishah, Bo Ji, Moussa Ayyash:
A provably efficient online collaborative caching algorithm for multicell-coordinated systems. CoRR abs/1509.02911 (2015) - [i1]Sihua Shao, Abdallah Khreishah, Moussa Ayyash:
Delay Analysis of Hybrid WiFi-LiFi System. CoRR abs/1510.00740 (2015) - 2014
- [c5]Muhammad T. Anan, L. Ilyes, Moussa Ayyash, Ala I. Al-Fuqaha:
Cloud-based autonomic service monitoring for Future Internet. IWCMC 2014: 63-68 - [c4]Sihua Shao, Abdallah Khreishah, Michael B. Rahaim, Hany Elgala, Moussa Ayyash, Thomas D. C. Little, Jie Wu:
An Indoor Hybrid WiFi-VLC Internet Access System. MASS 2014: 569-574 - 2010
- [j1]Moussa Ayyash, Donald R. Ucci, Khaled M. Alzoubi:
A Proactively Maintained Quality of Service Infrastructure for Wireless Mobile Ad Hoc Networks. Int. J. Commun. Networks Inf. Secur. 2(2) (2010)
2000 – 2009
- 2006
- [c3]Khaled M. Alzoubi, Moussa Ayyash:
Quality of Service Routing Tree for Wireless Ad Hoc Networks. ICWN 2006: 193-198 - [c2]Khaled M. Alzoubi, Moussa Ayyash:
Maintaining a quality of service routing tree for mobile ad hoc networks. IWCMC 2006: 127-134 - [c1]Moussa Ayyash, Khaled M. Alzoubi, Yazeed Alsbou:
Preemptive quality of service infrastructure for wireless mobile ad hoc networks. IWCMC 2006: 707-712
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint