The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohamed Hamdi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohamed Hamdi, Noureddine Boudriga
    Algebraic specification of network security risk management. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:52-60 [Conf]
  2. Mohamed Hamdi, Noureddine Boudriga
    An Abstract Reduction Model for Computer Security Risk. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:1-16 [Conf]
  3. Jihene Krichene, Mohamed Hamdi, Noureddine Boudriga
    Collective computer incident response using cognitive maps. [Citation Graph (0, 0)][DBLP]
    SMC (1), 2004, pp:1080-1085 [Conf]
  4. B. A. Fessi, Mohamed Hamdi, S. Benabdallah, Noureddine Boudriga
    A decisional framework system for computer network intrusion detection. [Citation Graph (0, 0)][DBLP]
    European Journal of Operational Research, 2007, v:177, n:3, pp:1824-1838 [Journal]
  5. Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga
    Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:252-257 [Conf]
  6. Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga
    Sensor Activity Scheduling for Efficient WSN-based Tracking. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:840-847 [Conf]
  7. Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga
    Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:825-832 [Conf]
  8. Mohamed Hamdi, Noureddine Boudriga
    Towards a Relational Calculus for Security Library Management. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  9. Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat
    Designing a Wireless Sensor Network for Mobile Target Localization and Tracking. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  10. Mohamed Hamdi, Noureddine Boudriga
    Detecting Denial-of-Service attacks using the wavelet transform. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:16, pp:3203-3213 [Journal]

  11. ReAlSec: A Relational Language for Advanced Security Engineering. [Citation Graph (, )][DBLP]


  12. Automated Intrusion Response System: Surveys and Analysis. [Citation Graph (, )][DBLP]


  13. A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks. [Citation Graph (, )][DBLP]


  14. Four dimensional chaotic ciphers for secure image transmission. [Citation Graph (, )][DBLP]


  15. An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry. [Citation Graph (, )][DBLP]


  16. A public key algorithm for optical communication based on lattice cryptography. [Citation Graph (, )][DBLP]


  17. A new genetic algorithm approach for intrusion response system in computer networks. [Citation Graph (, )][DBLP]


  18. Security policy validation using temporal executable specifications. [Citation Graph (, )][DBLP]


  19. DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. Chaotic Progressive Access Control for JPEG2000 Images Repositories. [Citation Graph (, )][DBLP]


  21. Efficient Resource Reservation for Optical Burst Switching Networks. [Citation Graph (, )][DBLP]


  22. Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies. [Citation Graph (, )][DBLP]


  23. Coverage control and irregular radio propagation in eireless sensor networks. [Citation Graph (, )][DBLP]


  24. Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  25. Fault Analysis Attack on an FPGA AES Implementation. [Citation Graph (, )][DBLP]


  26. Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks. [Citation Graph (, )][DBLP]


  27. A platform for secure multi-service vehicular communication. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002