


default search action
Osama S. Younes
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j13]Wahid Rajeh, Majed Mohammed Aborokbah, Manimurugan Shanmuganathan, Umar Albalawi, Ahamed Aljuhani, Osama S. Younes, Periyasami Karthikeyan:
Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization. PeerJ Comput. Sci. 11: e2743 (2025)- 2024
[j12]Osama S. Younes
:
A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems. Comput. Networks 240: 110146 (2024)- 2023
[j11]Xiaofeng Wang
, Yonghong Wang
, Zahra Javaheri, Laila M. Almutairi, Navid Moghadamnejad, Osama S. Younes
:
Federated deep learning for anomaly detection in the internet of things. Comput. Electr. Eng. 108: 108651 (2023)
[j10]Osama S. Younes
, Abdulmohsen Alharbi, Ali Yasseen, Faisal Alshareef, Faisal Albalawi, Umar A. Albalawi:
CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission. Comput. Syst. Sci. Eng. 47(3): 2895-2920 (2023)- 2022
[j9]Osama S. Younes
, Umar Albalawi
:
Securing Session Initiation Protocol. Sensors 22(23): 9103 (2022)- 2020
[j8]Osama S. Younes
, Umar Albalawi:
Analysis of Route Stability in Mobile Multihop Networks Under Random Waypoint Mobility. IEEE Access 8: 168121-168136 (2020)
2010 – 2019
- 2019
[j7]Osama S. Younes
:
Modelling and analysis of TCP congestion control mechanisms using stochastic reward nets. Int. J. Comput. Sci. Math. 10(4): 390-412 (2019)
[j6]Walaa Abd-Ellatief, Osama S. Youness
, Hatem Abdel Kader, Mohiy M. Hadhoud:
Balanced Density-Based Clustering Technique Based on Distributed Spatial Analysis in Wireless Sensor Network. Int. J. Wirel. Inf. Networks 26(2): 96-112 (2019)- 2018
[j5]Osama S. Younes
:
Modeling and performance analysis of a new secure address resolution protocol. Int. J. Commun. Syst. 31(1) (2018)- 2017
[c11]Hayam Mousa, Osama S. Younes
, Mohiy M. Hadhoud:
A Comparative Study of Trust Mapping Functions in Mobile Phone Participatory Sensing Applications. AISI 2017: 788-797
[c10]Mervat Ahmed, Osama S. Younes
:
Secret Image Sharing Based on Elementary Cellular Automata. AISI 2017: 832-843
[c9]Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Lionel Brunie, Osama S. Younes
, Mohiy M. Hadhoud:
A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications. CCNC 2017: 829-834
[c8]A. A. Mervat, Osama S. Younes
, Hatem S. Abdul-Kader:
Multi secret Sharing Based on Hill Cipher and Blakley Secret Sharing. ICCTA 2017: 76-81
[c7]Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Lionel Brunie, Osama S. Younes
, Mohiy M. Hadhoud:
PrivaSense: Privacy-Preserving and Reputation-Aware Mobile Participatory Sensing. MobiQuitous 2017: 38-47- 2016
[c6]Saleh M. Abdullah, Osama S. Younes
, Hamdy M. Mousa, Hatem Abdul-Kader:
Improving Performance of TCP variants in Long Term Evolution (LTE). ICCTA 2016: 8-14
[c5]Walaa Abd-Ellatief, Osama S. Younes
, Hatem Ahmed, Mohey M. Hadhoud:
Energy efficient density-based clustering technique for wireless sensor network. KST 2016: 196-200- 2015
[j4]Hayam Mousa, Sonia Ben Mokhtar
, Omar Hasan, Osama S. Younes
, Mohey M. Hadhoud, Lionel Brunie:
Trust management and reputation systems in mobile participatory sensing applications: A survey. Comput. Networks 90: 49-73 (2015)- 2013
[b1]Osama Younes:
Modelling and performance analysis of mobile ad hoc networks. University of Newcastle upon Tyne, UK, 2013
[j3]Osama Younes
, Nigel Thomas:
Modelling and performance analysis of multi-hop ad hoc networks. Simul. Model. Pract. Theory 38: 69-97 (2013)- 2012
[c4]Osama Younes
, Nigel Thomas:
A Path Connection Availability Model for MANETs with Random Waypoint Mobility. EPEW/UKPEW 2012: 111-126
[c3]Osama Younes
, Nigel Thomas:
SRN Models for Analysis of Multihop Wireless Ad Hoc Networks. EPEW/UKPEW 2012: 140-155- 2011
[j2]Osama Younes
, Nigel Thomas:
An SRN Model of the IEEE 802.11 DCF MAC Protocol in Multi-Hop Ad Hoc Networks with Hidden Nodes. Comput. J. 54(6): 875-893 (2011)
[c2]Osama Younes
, Nigel Thomas:
Analysis of the Expected Number of Hops in Mobile Ad Hoc Networks with Random Waypoint Mobility. PASM@ICPE 2011: 143-158
2000 – 2009
- 2008
[j1]Osama S. Youness
, Wail S. El-Kilani
, Waiel F. Abd El-Wahed:
A behavior and delay equivalent petri net model for performance evaluation of communication protocols. Comput. Commun. 31(10): 2210-2230 (2008)- 2006
[c1]Osama S. Youness
, Wail Elkilani
, Waiel F. Abd El-Wahed, Fawzy A. Torkey:
A Robust Methodology for Performance Evaluation of Communication Networks Protocols. CNSR 2006: 113-122
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-25 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







