Skip to main content

Showing 1–4 of 4 results for author: Mosbah, M

Searching in archive cs. Search in all archives.
.
  1. DRL-Based RAT Selection in a Hybrid Vehicular Communication Network

    Authors: Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah

    Abstract: Cooperative intelligent transport systems rely on a set of Vehicle-to-Everything (V2X) applications to enhance road safety. Emerging new V2X applications like Advanced Driver Assistance Systems (ADASs) and Connected Autonomous Driving (CAD) applications depend on a significant amount of shared data and require high reliability, low end-to-end (E2E) latency, and high throughput. However, present V2… ▽ More

    Submitted 3 April, 2024; originally announced July 2024.

    Journal ref: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), Jun 2023, Florence, Italy. pp.1-5

  2. ETGuard: Detecting D2D Attacks using Wireless Evil Twins

    Authors: Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah

    Abstract: In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching device to device (D2D) attacks over the network, particularly for Android. We show an attack where an ET infects an Android device before the relay of network traffic through it, and disappears from the network immediately after inflicting the device. The attack leverages the captive portal facility of wir… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: 44 pages. Computers and Security, 2019

  3. Android Inter-App Communication Threats and Detection Techniques

    Authors: Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti

    Abstract: With the digital breakthrough, smart phones have become very essential component. Mobile devices are very attractive attack surface for cyber thieves as they hold personal details (accounts, locations, contacts, photos) and have potential capabilities for eavesdrop** (with cameras/microphone, wireless connections). Android, being the most popular, is the target of malicious hackers who are tryin… ▽ More

    Submitted 21 September, 2017; v1 submitted 30 November, 2016; originally announced November 2016.

    Comments: 83 pages, 4 figures, This is a survey paper

    Journal ref: computers & security 70 (2017) 392-421

  4. arXiv:1311.3319  [pdf

    cs.OH

    Current Services In Cloud Computing: A Survey

    Authors: Mohamed Magdy Mosbah, Hany Soliman, Mohamad Abou El-Nasr

    Abstract: Due to the fast development of the Cloud Computing technologies, the rapid increase of cloud services are became very remarkable. The fact of integration of these services with many of the modern enterprises cannot be ignored. Microsoft, Google, Amazon, SalesForce.com and the other leading IT companies are entered the field of develo** these services. This paper presents a comprehensive survey o… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

    Comments: 8 pages

    Journal ref: International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3,No.5,October 2013