Phishing Detection: A Literature Survey M Khonji, Y Iraqi, A Jones IEEE Communications Surveys & Tutorials, 1-31, 2013 | 312 | 2013 |
Gateway placement optimization in wireless mesh networks with QoS constraints B Aoun, R Boutaba, Y Iraqi, G Kenward IEEE Journal on Selected Areas in Communications 24 (11), 2127-2136, 2006 | 303 | 2006 |
Routing protocols in wireless mesh networks: challenges and design considerations S Waharte, R Boutaba, Y Iraqi, B Ishibashi Multimedia tools and Applications 29 (3), 285-303, 2006 | 191 | 2006 |
A multi-commodity flow based approach to virtual network resource allocation W Szeto, Y Iraqi, R Boutaba GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 141 | 2003 |
Adaptive packet video streaming over IP networks: a cross-layer approach T Ahmed, A Mehaoua, R Boutaba, Y Iraqi IEEE Journal on selected areas in Communications 23 (2), 385-401, 2005 | 108 | 2005 |
DORA: Efficient routing for MPLS traffic engineering R Boutaba, W Szeto, Y Iraqi Journal of Network and Systems Management 10 (3), 309-325, 2002 | 103 | 2002 |
Human eye controlled computer mouse interface H Bhaskar, Y Iraqi, S Al Sharif US Patent 9,075,453, 2015 | 91 | 2015 |
Peer-to-peer’s most wanted: malicious peers L Mekouar, Y Iraqi, R Boutaba Computer Networks 50 (4), 545-562, 2006 | 79 | 2006 |
Pricing and admission control for QoS-enabled Internet T Li, Y Iraqi, R Boutaba Computer Networks 46 (1), 87-110, 2004 | 77 | 2004 |
Sliding contention window (SCW): Towards backoff range-based service differentiation over IEEE 802.11 wireless LAN networks A Nafaa, A Ksentini, A Mehaoua, Y Iraqi, R Boutaba IEEE network 19 (4), 45-51, 2005 | 67 | 2005 |
A Slightly-modified GI-based Author-verifier with Lots of Features (ASGALF) M Khonji, Y Iraqi CLEF2014 Working Notes 1180, 977-983, 2014 | 60 | 2014 |
Lightpaths on demand: a Web-services-based management system R Boutaba, W Golab, Y Iraqi IEEE Communications magazine 42 (7), 101-107, 2004 | 60 | 2004 |
Dynamic Online Routing Algorithm for MPLS Traffic Engineering W Szeto, R Boutaba, Y Iraqi Proceedings of the International Conference on Research in Networking …, 2002 | 48 | 2002 |
A state-of-the-art review of cloud forensics S Almulla, Y Iraqi, A Jones Journal of Digital Forensics, Security and Law 9 (4), 2, 2014 | 47 | 2014 |
Enhancing phishing e-mail classifiers: A lexical url analysis approach M Khonji, Y Iraqi, A Jones International Journal for Information Security Research (IJISR) 2 (1/2), 40, 2012 | 47 | 2012 |
Resource and service discovery in large-scale multi-domain networks R Ahmed, N Limam, J Xiao, Y Iraqi, R Boutaba IEEE Communications Surveys & Tutorials 9 (4), 2-30, 2007 | 43 | 2007 |
OSDA: Open service discovery architecture for efficient cross-domain service provisioning N Limam, J Ziembicki, R Ahmed, Y Iraqi, DT Li, R Boutaba, F Cuervo Computer Communications 30 (3), 546-563, 2007 | 43 | 2007 |
Grid-controlled lightpaths for high performance grid applications R Boutaba, W Golab, Y Iraqi, T Li, BS Arnaud Journal of Grid Computing 1 (4), 387-394, 2003 | 43 | 2003 |
A Novel Phishing Classification Based on URL Features M Khonji, A Jones, Y Iraqi IEEE GCC Conference, 221-224, 2011 | 38 | 2011 |
Cloud forensics: A research perspective S Almulla, Y Iraqi, A Jones International Conference on Innovations in Information Technology (IIT), 66-71, 2013 | 37 | 2013 |