Match!
Mohsen Guizani
Qatar University
763Publications
48H-index
11.7kCitations
Publications 795
Newest
#1Zhu Liehuang (BIT: Beijing Institute of Technology)H-Index: 17
#2Nassoro M.R. Lwamo (BIT: Beijing Institute of Technology)H-Index: 1
Last.Fan Li (BIT: Beijing Institute of Technology)H-Index: 18
view all 7 authors...
Abstract The demand for content usage over the Internet has exponentially increased with the rise in social networking, messaging, and smart devices. The host-centric communication model was not primarily designed for content as its core element, rather it emphasis on the connection between hosts. Information-Centric Networking (ICN) is fast becoming an Internet architecture for content distribution. In ICN, content is located and retrieved dynamically from a source or a cache store, without any...
Source
#1Emna Baccour (Qatar University)H-Index: 4
#2Aiman Erbad (Qatar University)H-Index: 11
Last.Mohsen Guizani (Qatar University)H-Index: 48
view all 5 authors...
Abstract Mobile Edge Computing (MEC) networks have been proposed to extend the cloud services and bring the cloud computing capabilities near the end-users at the Mobile Base Stations (MBS). To improve the efficiency of pushing the cloud features to the edge, different MEC servers assist each others to effectively select videos to cache and transcode. In this work, we adopt a joint caching and processing model for Video On Demand (VOD) in MEC networks. Our goal is to proactively cache only the c...
Source
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, cloud-based computing and storage also bring us many security problems, such as the abuse of information collection and concentrated web servers in the cloud. Traditional intrusion detection systems and web application firewalls are becoming incompatible with the new netwo...
8 CitationsSource
#1Weina Niu (Sichuan University)H-Index: 1
#2Xiaosong Zhang (University of Electronic Science and Technology of China)H-Index: 10
Last.Mohsen Guizani (Qatar University)H-Index: 48
view all 6 authors...
Abstract Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of software. The core content is the discovery and location of software vulnerability. However, traditional human experts-based approaches are labor-consuming and time-consuming. Thus, some automatic detection approaches are proposed to solve the problem. But, they have a...
Source
The papers in this special section examine artificial intelligence (AI)-driven developments in 5G mobile communications for industrial automation applications from a Big Data perspective. With the recent advances in information and communication technologies, industrial automation is expanding at a rapid pace. This transition is characterized by “Industry 4.0”, the fourth revolution in the field of manufacturing. Industry 4.0, also called as “Industrial Internet of Things (IIoT)” or “Smart Facto...
Source
Last.Mohsen GuizaniH-Index: 48
view all 8 authors...
With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one of the core components of Hadoop, which is used to process files that are divided into data blocks distributed in the cluster. Once the distributed log data are abnormal, it will cause serious losses. When using machine learning algorithms for system log anomaly detection, the ou...
Source
#1Yang ZhangH-Index: 9
Last.Mohsen GuizaniH-Index: 48
view all 7 authors...
Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure the correctness of concurrent access becomes a big challenge to IoT software development. This paper proposes a general refactoring framework for fine-grained read–write locking and implements an automatic refactoring tool to help developers convert built-in monitors into fine-...
Source
#1Heena RathoreH-Index: 3
#2Amr MohamedH-Index: 14
Last.Mohsen GuizaniH-Index: 48
view all 3 authors...
Cyber-physical systems (CPS) is a setup that controls and monitors the physical worldaround us. The advancement of these systems needs to incorporate an unequivocal spotlight onmaking these systems efficient. Blockchains and their inherent combination of consensus algorithms,distributed data storage, and secure protocols can be utilized to build robustness and reliabilityin these systems. Blockchain is the underlying technology behind bitcoins and it provides adecentralized framework to validate...
Source
#1Dapeng Man (HEU: Harbin Engineering University)H-Index: 6
#2Qi Lu (HEU: Harbin Engineering University)
Last.Mohsen Guizani (Qatar University)H-Index: 48
view all 6 authors...
Abstract In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It also shortens serving path, lightens load of server, reduces traffic and time delay, its efficiency seriously affects performance of entire network, and thus cache management in ICN draws much attention of researchers recently. Although there are a lot approaches have b...
Source
Source
12345678910