|
Search the dblp DataBase
Mohamed Hamdi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mohamed Hamdi, Noureddine Boudriga
Algebraic specification of network security risk management. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:52-60 [Conf]
- Mohamed Hamdi, Noureddine Boudriga
An Abstract Reduction Model for Computer Security Risk. [Citation Graph (0, 0)][DBLP] SEC, 2004, pp:1-16 [Conf]
- Jihene Krichene, Mohamed Hamdi, Noureddine Boudriga
Collective computer incident response using cognitive maps. [Citation Graph (0, 0)][DBLP] SMC (1), 2004, pp:1080-1085 [Conf]
- B. A. Fessi, Mohamed Hamdi, S. Benabdallah, Noureddine Boudriga
A decisional framework system for computer network intrusion detection. [Citation Graph (0, 0)][DBLP] European Journal of Operational Research, 2007, v:177, n:3, pp:1824-1838 [Journal]
- Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga
Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:252-257 [Conf]
- Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga
Sensor Activity Scheduling for Efficient WSN-based Tracking. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:840-847 [Conf]
- Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:825-832 [Conf]
- Mohamed Hamdi, Noureddine Boudriga
Towards a Relational Calculus for Security Library Management. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat
Designing a Wireless Sensor Network for Mobile Target Localization and Tracking. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Mohamed Hamdi, Noureddine Boudriga
Detecting Denial-of-Service attacks using the wavelet transform. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:16, pp:3203-3213 [Journal]
ReAlSec: A Relational Language for Advanced Security Engineering. [Citation Graph (, )][DBLP]
Automated Intrusion Response System: Surveys and Analysis. [Citation Graph (, )][DBLP]
A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks. [Citation Graph (, )][DBLP]
Four dimensional chaotic ciphers for secure image transmission. [Citation Graph (, )][DBLP]
An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry. [Citation Graph (, )][DBLP]
A public key algorithm for optical communication based on lattice cryptography. [Citation Graph (, )][DBLP]
A new genetic algorithm approach for intrusion response system in computer networks. [Citation Graph (, )][DBLP]
Security policy validation using temporal executable specifications. [Citation Graph (, )][DBLP]
DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Chaotic Progressive Access Control for JPEG2000 Images Repositories. [Citation Graph (, )][DBLP]
Efficient Resource Reservation for Optical Burst Switching Networks. [Citation Graph (, )][DBLP]
Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies. [Citation Graph (, )][DBLP]
Coverage control and irregular radio propagation in eireless sensor networks. [Citation Graph (, )][DBLP]
Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Fault Analysis Attack on an FPGA AES Implementation. [Citation Graph (, )][DBLP]
Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks. [Citation Graph (, )][DBLP]
A platform for secure multi-service vehicular communication. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.005secs
|