The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Madjid Merabti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Haggerty, Qi Shi, Madjid Merabti
    Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:413-422 [Conf]
  2. Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley
    Achieving User Privacy in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:108-0 [Conf]
  3. D. W. Gresty, Qi Shi, Madjid Merabti
    Requirements for a General Framework for Response to Distributed Denial-of-Service. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:422-432 [Conf]
  4. Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar
    Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:846-851 [Conf]
  5. E. C. L. Watts, Madjid Merabti, A. Taleb-Bendiab
    A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:923-928 [Conf]
  6. F. Bouhafs, Madjid Merabti, Hala M. Mokhtar
    Mobile Event Monitoring Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:864-869 [Conf]
  7. Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi
    Bridging the Gap between Networked Appliances and Virtual Worlds. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:935-940 [Conf]
  8. Tarag Fahad, Djamel Djenouri, Robert Askwith, Madjid Merabti
    A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:882-887 [Conf]
  9. Rozaida Ghazali, Abir Jaafar Hussain, Madjid Merabti
    Higher order neural networks and their applications to financial time series prediction. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence and Soft Computing, 2006, pp:120-125 [Conf]
  10. Martin Hanneghan, Madjid Merabti, Gary Colquhoun
    The World-Wide Web as Platform for Supporting Interactive Concurrent Engineering. [Citation Graph (0, 0)][DBLP]
    CAiSE, 1996, pp:301-318 [Conf]
  11. David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith
    Buffer Overrun Prevention Through Component Composition Analysis. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:156-163 [Conf]
  12. Bo Zhou, Qi Shi, Madjid Merabti
    Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:203-208 [Conf]
  13. Abdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen
    Improving Game Processing in Multithreading and Multiprocessor Architecture. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2006, pp:669-679 [Conf]
  14. Ewan Smith, Adil Al-Yasiri, Madjid Merabti
    A Multi-Tiered Classification Scheme for Component Retrieval. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 1998, pp:20882-20889 [Conf]
  15. Bo Zhou, Qi Shi, Madjid Merabti
    Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:352-359 [Conf]
  16. Hala M. Mokhtar, Rubem Pereira, Madjid Merabti
    Cell-by-Cell Round Robin Service Discipline for ATM Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:507-516 [Conf]
  17. Paul Fergus, Anirach Mingkhwan, Madjid Merabti, Martin Hanneghan
    DiSUS: Mobile Ad Hoc Network Unstructured Services. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:484-491 [Conf]
  18. Abiola Abimbola, Qi Shi, Madjid Merabti
    NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:232-237 [Conf]
  19. Chris Bewick, Rubem Pereira, Madjid Merabti
    Network constrained smoothing: enhanced multiplexing of MPEG-4 video. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:114-119 [Conf]
  20. Hala M. Mokhtar, Rubem Pereira, Madjid Merabti
    Resource Allocation Scheme for Deterministic Services of Video Streams. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:353-358 [Conf]
  21. Hala M. Mokhtar, Rubem Pereira, Madjid Merabti
    Fair-rate GPS: a new class for decoupling delay and bandwidth properties. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:583-588 [Conf]
  22. Hala M. Mokhtar, Rubem Pereira, Madjid Merabti
    An Effective Bandwidth Model for Deterministic QoS Guarantees of VBR Traffic. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1318-1323 [Conf]
  23. David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith
    An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:112-117 [Conf]
  24. Martin Hanneghan, Madjid Merabti, Gary Colquhoun
    The Design of an Object-Oriented Repository to Support Concurrent Engineering. [Citation Graph (0, 0)][DBLP]
    OOIS, 1995, pp:200-215 [Conf]
  25. Andrew Symons, Madjid Merabti, Carl Bamford
    Dynamically Re-configurable Distributed Multimedia Systems: An Object Based Framework. [Citation Graph (0, 0)][DBLP]
    OOIS, 1995, pp:173-188 [Conf]
  26. John Haggerty, Qi Shi, Madjid Merabti
    The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:133-146 [Conf]
  27. John Haggerty, Qi Shi, Madjid Merabti
    Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:327-342 [Conf]
  28. Abdennour El Rhalibi, Madjid Merabti
    Agents-based modeling for a peer-to-peer MMOG architecture. [Citation Graph (0, 0)][DBLP]
    Computers in Entertainment, 2005, v:3, n:2, pp:3- [Journal]
  29. Ning Zhang, Qi Shi, Madjid Merabti
    A Flexible Approach to Secure and Fair Document Exchange. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:7, pp:569-581 [Journal]
  30. Ning Zhang, Qi Shi, Madjid Merabti
    An efficient protocol for anonymous and fair document exchange. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:1, pp:19-28 [Journal]
  31. Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith
    Autonomous mobile agent based fair exchange. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:6, pp:751-770 [Journal]
  32. Bob Askwith, Madjid Merabti, Qi Shi
    MNPA: a mobile network privacy architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:18, pp:1777-1788 [Journal]
  33. Madjid Merabti, Qi Shi, Rolf Oppliger
    Advanced security techniques for network protection. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1581-1583 [Journal]
  34. G. Arora, Martin Hanneghan, Madjid Merabti
    P2P commercial digital content exchange. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2005, v:4, n:3, pp:250-263 [Journal]
  35. Putra Sumari, Madjid Merabti, Rubem Pereira
    Video-on-demand server: Strategies for improving performance. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 1999, v:146, n:1, pp:33-38 [Journal]
  36. Ning Zhang, Qi Shi, Madjid Merabti
    A unified approach to a fair document exchange system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:1, pp:83-96 [Journal]
  37. Ning Zhang, Qi Shi, Madjid Merabti
    Revocation of privacy-enhanced public-key certificates. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:205-214 [Journal]
  38. Marco Roccetti, Gary Chan, Madjid Merabti, Stan Moyer, Mehmet Ulema, Heather Yu
    Special issue on advances in consumer communications and networking. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2006, v:29, n:3, pp:209-210 [Journal]
  39. Anirach Mingkhwan, Paul Fergus, O. Abuelma'atti, Madjid Merabti, Bob Askwith, M. B. Hanneghan
    Dynamic service composition in home appliance networks. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2006, v:29, n:3, pp:257-284 [Journal]
  40. Bob Askwith, Madjid Merabti, Qi Shi
    MNPA: A basis for privacy-enhanced QoS in mobile networks. [Citation Graph (0, 0)][DBLP]
    Microprocessors and Microsystems, 2003, v:27, n:2, pp:93-100 [Journal]
  41. Abdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen
    AoIM in peer-to-peer multiplayer online games. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2006, pp:71- [Conf]
  42. Abdennour El Rhalibi, Nick Baker, Madjid Merabti
    Emotional agent model and architecture for NPCs group control and interaction to facilitate leadership roles in computer entertainment. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2005, pp:156-163 [Conf]
  43. Rozaida Ghazali, Abir Jaafar Hussain, Dhiya Al-Jumeily, Madjid Merabti
    Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting. [Citation Graph (0, 0)][DBLP]
    ICANNGA (2), 2007, pp:123-132 [Conf]
  44. Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith
    Practical and efficient fair document exchange over networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2006, v:29, n:1, pp:46-61 [Journal]

  45. A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  46. A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance. [Citation Graph (, )][DBLP]


  47. A Hierarchically Structured Worldwide Sensor Web Architecture. [Citation Graph (, )][DBLP]


  48. Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). [Citation Graph (, )][DBLP]


  49. Body Area Networks for Movement Analysis in Physiotherapy Treatments. [Citation Graph (, )][DBLP]


  50. Peer-to-Peer Overlay Gateway Services for Home Automation and Management. [Citation Graph (, )][DBLP]


  51. Virtual Environments with Content Sharing. [Citation Graph (, )][DBLP]


  52. Towards Energy-Efficient Intrusion Detection in Pervasive Computing. [Citation Graph (, )][DBLP]


  53. A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  54. On Peer-to-Peer Multimedia Content Access and Distribution. [Citation Graph (, )][DBLP]


  55. Improving Messaging Security in Structured P2P Overlay Networks. [Citation Graph (, )][DBLP]


  56. Advances in Peer-to-Peer Content Search. [Citation Graph (, )][DBLP]


  57. Hybrid Client-Server, Peer-to-Peer framework for MMOG. [Citation Graph (, )][DBLP]


  58. Spider-Net Zone Routing Protocol for Mobile Sink Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  59. Monitoring connectivity in wireless sensor networks. [Citation Graph (, )][DBLP]


  60. A new self-detection scheme for sensor network boundary recognition. [Citation Graph (, )][DBLP]


  61. Remote physiotherapy treatments using wireless body sensor networks. [Citation Graph (, )][DBLP]


  62. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. [Citation Graph (, )][DBLP]


  63. Sharing and Protecting Networked Digital Life Memories. [Citation Graph (, )][DBLP]


  64. Homura and Net-Homura: The creation and web-based deployment of cross-platform 3D games. [Citation Graph (, )][DBLP]


  65. Balancing intrusion detection resources in ubiquitous computing networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.454secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002