T-NOVA: A marketplace for virtualized network functions G Xilouris, E Trouva, F Lobillo, JM Soares, J Carapinha, MJ McGrath, ... 2014 European Conference on Networks and Communications (EuCNC), 1-5, 2014 | 132 | 2014 |
A reputation-based trust mechanism for ad hoc networks Y Rebahi, VE Mujica-V, D Sisalem 10th IEEE Symposium on Computers and Communications (ISCC'05), 37-42, 2005 | 129 | 2005 |
Efficient next generation emergency communications over multi-access edge computing EK Markakis, I Politis, A Lykourgiotis, Y Rebahi, G Mastorakis, ... IEEE Communications Magazine 55 (11), 92-97, 2017 | 63 | 2017 |
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks Y Rebahi, M Sher, T Magedanz 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 63 | 2008 |
Sip service providers and the spam problem Y Rebahi, D Sisalem Proceedings of the 2nd VoIP security workshop, 2005 | 61 | 2005 |
Sip spam detection Y Rebahi, D Sisalem, T Magedanz International Conference on Digital Telecommunications (ICDT'06), 68-68, 2006 | 57 | 2006 |
EMYNOS: Next generation emergency communication EK Markakis, A Lykourgiotis, I Politis, A Dagiuklas, Y Rebahi, E Pallis IEEE Communications Magazine 55 (1), 139-145, 2017 | 48 | 2017 |
Real-time service provisioning for mobile and wireless networks K Farkas, O Wellnitz, M Dick, X Gu, M Busse, W Effelsberg, Y Rebahi, ... Computer Communications 29 (5), 540-550, 2006 | 41 | 2006 |
SAFE: Securing pAcket Forwarding in ad hoc nEtworks Y Rebahi, V Mujica, C Simons, D Sisalem 5th Workshop on Applications and Services in Wireless Networks, 2005 | 31 | 2005 |
Intrusion detection system for denial-of-service flooding attacks in SIP communication networks S Ehlert, Y Rebahi, T Magedanz International Journal of Security and Networks 4 (3), 189-200, 2009 | 30 | 2009 |
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT) D Gritzalis, G Marias, Y Rebahi, Y Soupionis, S Ehlert Journal of Computer Security 19 (5), 835-867, 2011 | 29 | 2011 |
Performance analysis of identity management in the Session Initiation Protocol (SIP) Y Rebahi, JJ Pallares, NT Minh, S Ehlert, G Kovacs, D Sisalem 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 28 | 2008 |
Towards an interactive IPTV for mobile subscribers A Al-Hezmi, Y Rebahi, T Magedanz, S Arbanowski International Conference on Digital Telecommunications (ICDT'06), 45-45, 2006 | 28 | 2006 |
The market for open source: An intelligent virtual open source marketplace G Bavota, A Ciemniewska, I Chulani, A De Nigro, M Di Penta, D Galletti, ... 2014 Software Evolution Week-IEEE Conference on Software Maintenance …, 2014 | 24 | 2014 |
Change-point detection for voice over IP denial of service attacks Y Rebahi, D Sisalem Communication in Distributed Systems-15. ITG/GI Symposium, 1-7, 2007 | 24 | 2007 |
A survey on fraud and service misuse in voice over IP (VoIP) networks Y Rebahi, M Nassar, T Magedanz, O Festor information security technical report 16 (1), 12-19, 2011 | 22 | 2011 |
A comprehensive framework for detecting and preventing VoIP fraud and misuse D Hoffstadt, E Rathgeb, M Liebig, R Meister, Y Rebahi, TQ Thanh 2014 International Conference on Computing, Networking and Communications …, 2014 | 19 | 2014 |
A Theoretical Model of the Effects of Losses and Delays on the Performance of SIP D Sisalem, M Liisberg, Y Rebahi IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008 | 19 | 2008 |
The SIP express router: An open source SIP platform Y Rebahi, D Sisalem, J Kuthan, A Pelinescu-Oncicul, B Iancu, J Janak, ... | 19 | 2003 |
Ubiquitous participation platform for pOLicy makings (UbiPOL): A research note Z Irani, H Lee, V Weerakkody, MM Kamal, S Topham, G Simpson, A Balci, ... Technology Enabled Transformation of the Public Sector: Advances in E …, 2012 | 17* | 2012 |