Остановите войну!
for scientists:
default search action
Haythem Bany Salameh
- > Home > Persons > Haythem Bany Salameh
Publications
- 2024
- [j92]Rizwana Ahmad, Hany Elgala, Sufyan Almajali, Haythem Bany Salameh, Moussa Ayyash:
Unified Physical-Layer Learning Framework Toward VLC-Enabled 6G Indoor Flying Networks. IEEE Internet Things J. 11(3): 5545-5557 (2024) - 2023
- [j87]Mohannad Alhafnawi, Haythem Ahmad Bany Salameh, Ala'eddin Masadeh, Haitham Moffaqq Al-Obiedollah, Moussa Ayyash, Reyad El-Khazali, Hany Elgala:
A Survey of Indoor and Outdoor UAV-Based Target Tracking Systems: Current Status, Challenges, Technologies, and Future Directions. IEEE Access 11: 68324-68339 (2023) - [j84]Rizwana Ahmad, Moussa Ayyash, Haythem Bany Salameh, Reyad El-Khazali, Hany Eigala:
Indoor Flying Networks for 6G: Concepts, Challenges, Enabling Technologies, and Opportunities. IEEE Commun. Mag. 61(10): 156-162 (2023) - [j81]Dil Nashin Anwar, Rizwana Ahmad, Haythem Bany Salameh, Hany Elgala, Moussa Ayyash:
Performance analysis of neural network-based unified physical layer for indoor hybrid LiFi-WiFi flying networks. Neural Comput. Appl. 35(34): 24179-24189 (2023) - [j80]Salam Hamdan, Sufyan Almajali, Moussa Ayyash, Haythem Bany Salameh, Yaser Jararweh:
An intelligent edge-enabled distributed multi-task learning architecture for large-scale IoT-based cyber-physical systems. Simul. Model. Pract. Theory 122: 102685 (2023) - 2022
- [j72]Bushra Alhijawi, Sufyan Almajali, Hany Elgala, Haythem Bany Salameh, Moussa Ayyash:
A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. Comput. Electr. Eng. 99: 107706 (2022) - [j67]Monette H. Khadr, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala, Sufyan Almajali:
Jamming resilient multi-channel transmission for cognitive radio IoT-based medical networks. J. Commun. Networks 24(6): 666-678 (2022) - [j62]Safaa Fawzey Hriez, Sufyan Almajali, Hany Elgala, Moussa Ayyash, Haythem Bany Salameh:
A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks. IEEE Syst. J. 16(2): 2693-2704 (2022) - [c59]Mohannad Alhafnawi, Ala'eddin Masadeh, Haythem Bany Salameh, Moussa Ayyash, Reyad El-Khazali, Hany Elgala:
A Review of Indoor UAV-based Tracking Systems: Classification, Status, and Challenges. ACIT 2022: 1-6 - 2020
- [c36]Monette H. Khadr, Haythem Bany Salameh, Moussa Ayyash, Sufyan Almajali, Hany Elgala:
Testbed Validation of Security-Aware Channel Assignment in Cognitive Radio IoT Networks. WF-IoT 2020: 1-6 - 2019
- [j30]Sufyan Almajali, Dhiah el Diehn I. Abou-Tair, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala:
A distributed multi-layer MEC-cloud architecture for processing large scale IoT-based multimedia applications. Multim. Tools Appl. 78(17): 24617-24638 (2019) - [c33]Monette H. Khadr, Haythem Bany Salameh, Moussa Ayyash, Sufyan Almajali, Hany Elgala:
Securing IoT Delay-Sensitive Communications with Opportunistic Parallel Transmission Capability. GLOBECOM 2019: 1-6 - [c30]Sufyan Almajali, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala:
Extending NS3 to Simulate Cognitive Radio Wireless Networks in a Jammed Environment. SDS 2019: 118-122 - 2018
- [j28]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Batch-based security-aware spectrum sharing with simultaneous assignment decisions in time-critical IoT networks with cognitive radio capabilities. Trans. Emerg. Telecommun. Technol. 29(11) (2018) - [j26]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks. IEEE Internet Things J. 5(3): 1904-1913 (2018) - [c29]Sufyan Almajali, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala:
A framework for efficient and secured mobility of IoT devices in mobile edge computing. FMEC 2018: 58-62 - [c28]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Securing delay-sensitive cognitive radio IoT communications under reactive jamming attacks: Spectrum assignment perspective. SDS 2018: 20-24 - 2017
- [c23]Haythem Bany Salameh, Sufyan Almajali, Moussa Ayyash, Hany Elgala:
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications. SDS 2017: 43-47
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint