default search action
Madjid Merabti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j71]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
A community-based social P2P network for sharing human life digital memories. Trans. Emerg. Telecommun. Technol. 31(4) (2020) - [j70]William Hurst, Aaron Boddy, Madjid Merabti, Nathan Shone:
Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking. Future Internet 12(6): 100 (2020) - [j69]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring communities for sharing human digital memories in a social P2P network. Peer-to-Peer Netw. Appl. 13(5): 1629-1642 (2020) - [i2]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring Communities for Sharing Human Digital Memories in a Social P2P Network. CoRR abs/2004.08441 (2020)
2010 – 2019
- 2019
- [j68]Sohail Abbas, Madjid Merabti, Kashif Kifayat, Thar Baker:
Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks. KSII Trans. Internet Inf. Syst. 13(12): 6214-6242 (2019) - [j67]Djedjiga Mouheb, Sohail Abbas, Madjid Merabti:
Cybersecurity Curriculum Design: A Survey. Trans. Edutainment 15: 93-107 (2019) - 2018
- [j66]Sohail Abbas, Mohammad Faisal, Haseeb Ur Rahman, Muhammad Zahid Khan, Madjid Merabti, Atta ur Rehman Khan:
Masquerading Attacks Detection in Mobile Ad Hoc Networks. IEEE Access 6: 55013-55025 (2018) - 2017
- [j65]Kuo-Kun Tseng, Jiao Lo, Yiming Liu, Shih-Hao Chang, Madjid Merabti, Felix C. K. Ng, Chun-Ho Wu:
A feasibility study of stateful automaton packet inspection for streaming application detection systems. Enterp. Inf. Syst. 11(9): 1317-1336 (2017) - [j64]Achim D. Brucker, Bo Zhou, Francesco Malmignati, Qi Shi, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - 2016
- [j63]Efstathios Goudoulakis, Abdennour El Rhalibi, Madjid Merabti:
A Novel Multi-Agent Planning System for Digital Interactive Storytelling. Comput. Entertain. 14(1): 3:1-3:22 (2016) - [j62]Ali C. Begen, Mario Kolberg, Madjid Merabti:
Consumer communications and networking [Series Editorial]. IEEE Commun. Mag. 54(6): 87 (2016) - [j61]Ali C. Begen, Mario Kolberg, Madjid Merabti:
Consumer Communications and the Next Generation Broadcast Networks. IEEE Commun. Mag. 54(12): 140 (2016) - 2015
- [j60]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [j59]Qi Shi, Ning Zhang, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4): 615-631 (2015) - [j58]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. Secur. Commun. Networks 8(18): 4041-4052 (2015) - [c133]Sarmad A. Abdulazeez, Abdennour El Rhalibi, Madjid Merabti, Dhiya Al-Jumeily:
Survey of solutions for Peer-to-Peer MMOGs. ICNC 2015: 1106-1110 - 2014
- [b1]Faycal Bouhafs, Michael Mackay, Madjid Merabti:
Communication Challenges and Solutions in the Smart Grid. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4939-2183-6, pp. 1-95 - [j57]Ali C. Begen, Mario Kolberg, Madjid Merabti:
Trends in consumer communications: networked homes [Guest Editorial]. IEEE Commun. Mag. 52(6): 184 (2014) - [j56]Ali C. Begen, Mario Kolberg, Madjid Merabti:
Trends in consumer communications [Series Editorial]. IEEE Commun. Mag. 52(12): 142 (2014) - [j55]William Hurst, Madjid Merabti, Shamaila Iram, Paul Fergus:
Protecting critical infrastructures through behavioural observation. Int. J. Crit. Infrastructures 10(2): 174-192 (2014) - [j54]William Hurst, Madjid Merabti, Paul Fergus:
Behaviour analysis techniques for supporting critical infrastructure security. Int. J. Crit. Infrastructures 10(3/4): 267-287 (2014) - [j53]Faycal Bouhafs, Madjid Merabti:
A Layered Communication Architecture for Power Routing in the Smart Grid. Int. J. Inf. Technol. Web Eng. 9(1): 59-69 (2014) - [j52]Laura Pla Beltran, Madjid Merabti, William Hurst:
Using behavioural observation and game technology to support critical infrastructure security. Int. J. Syst. Syst. Eng. 5(1): 45-67 (2014) - [j51]Younis A. Younis, Kashif Kifayat, Madjid Merabti:
An access control model for cloud computing. J. Inf. Secur. Appl. 19(1): 45-60 (2014) - [j50]Ricardo Leandro Parreira Duarte, Abdennour El Rhalibi, Madjid Merabti:
Coarticulation and speech synchronization in MPEG-4 based facial animation. Kybernetes 43(8): 1165-1182 (2014) - [j49]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Creating human digital memories with the aid of pervasive mobile devices. Pervasive Mob. Comput. 12: 160-178 (2014) - [c132]Chunlin Song, Peng Xiao, Sud Sudirman, Madjid Merabti:
Region adaptive digital image watermarking system using DWT-SVD algorithm. AHS 2014: 196-201 - [c131]William Hurst, Madjid Merabti, Paul Fergus:
Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures. AINA Workshops 2014: 916-921 - [c130]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
The Big Data Obstacle of Lifelogging. AINA Workshops 2014: 922-926 - [c129]Faisal Alsrheed, Abdennour El Rhalibi, Martin Randles, Madjid Merabti:
Intelligent agents for automated cloud computing negotiation. ICMCS 2014: 1169-1174 - [c128]William Hurst, Madjid Merabti, Paul Fergus:
A Survey of Critical Infrastructure Security. Critical Infrastructure Protection 2014: 127-138 - [c127]Ahmed S. B. Kozal, Madjid Merabti, Faycal Bouhafs:
Spectrum sensing-energy tradeoff in multi-hop cluster based cooperative cognitive radio networks. INFOCOM Workshops 2014: 765-770 - [c126]Bashar Ahmed Alohali, Madjid Merabti, Kashif Kifayat:
A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid. NGMAST 2014: 326-330 - [c125]Áine MacDermott, William Hurst, Qi Shi, Madjid Merabti:
Simulating Critical Infrastructure Cascading Failure. UKSim 2014: 324-329 - [p8]David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. Cyberpatterns 2014: 73-84 - [p7]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p6]Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - [p5]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - [p4]Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi:
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. Secure and Trustworthy Service Composition 2014: 173-191 - 2013
- [j48]Ali C. Begen, Mario Kolberg, Madjid Merabti:
Trends in consumer communications: integration, integration, and integration [Series editorial]. IEEE Commun. Mag. 51(6) (2013) - [j47]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones, Faycal Bouhafs:
Exploiting linked data to create rich human digital memories. Comput. Commun. 36(15-16): 1639-1656 (2013) - [j46]Qi Shi, Ning Zhang, Madjid Merabti, Kashif Kifayat:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [j45]Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:
Distributed monitoring for misbehaviour detection in wireless sensor networks. Secur. Commun. Networks 6(4): 388-400 (2013) - [j44]Kashif Kifayat, Madjid Merabti, Qi Shi, Sohail Abbas:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [j43]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. IEEE Syst. J. 7(2): 236-248 (2013) - [j42]Shiguo Lian, Madjid Merabti:
Innovative multimedia communication and services. Telecommun. Syst. 54(3): 201-202 (2013) - [c124]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c123]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Misbehaviour monitoring on system-of-systems components. CRiSIS 2013: 1-6 - [c122]William Hurst, Madjid Merabti, Paul Fergus:
Behavioural Observation for Critical Infrastructure Security Support. EMS 2013: 36-41 - [c121]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155 - [c120]Chris Carter, Abdennour El Rhalibi, Madjid Merabti:
A novel scalable hybrid architecture for MMOG. ICME Workshops 2013: 1-6 - [c119]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Creating human digital memories for a richer recall of life experiences. ICNSC 2013: 246-251 - [c118]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. PST 2013: 82-87 - [c117]Muhammad Asim, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - [c116]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - [c115]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. UIC/ATC 2013: 438-443 - [c114]Ricardo L. Parreira Duarte, Abdennour El Rhalibi, Chris Carter, Madjid Merabti:
Survey and Evaluation of Mpeg-4 Based 3D Character Animation Frameworks. VS-GAMES 2013: 1-8 - 2012
- [j41]Ali C. Begen, Mario Kolberg, Madjid Merabti:
Trends in consumer communications: Integration, integration and integration [Series Editorial]. IEEE Commun. Mag. 50(6): 132 (2012) - [j40]Ali C. Begen, Mario Kolberg, Madjid Merabti:
Trends in consumer communications [Series Editorial]. IEEE Commun. Mag. 50(11): 130 (2012) - [j39]Miguel García, David Llewellyn-Jones, Francisco Ortin, Madjid Merabti:
Applying dynamic separation of aspects to distributed systems security: A case study. IET Softw. 6(3): 231-248 (2012) - [j38]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Platform for the Evaluation of Live Digital Forensics. Int. J. Digit. Crime Forensics 4(4): 31-46 (2012) - [j37]Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:
Inspired Social Spider Behavior for Secure Wireless Sensor Networks. Int. J. Mob. Comput. Multim. Commun. 4(4): 1-10 (2012) - [j36]Chunlin Song, Sud Sudirman, Madjid Merabti:
A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3): 549-568 (2012) - [c113]Chelsea Dobbins, Paul Fergus, Madjid Merabti, David Llewellyn-Jones:
Monitoring and measuring sedentary behaviour with the aid of human digital memories. CCNC 2012: 395-398 - [c112]Abdennour El Rhalibi, Efstathios Goudoulakis, Madjid Merabti:
DIS planning algorithms evaluation. CCNC 2012: 492-496 - [c111]Abdennour El Rhalibi, Ricardo L. Parreira Duarte, Chris Carter, Simon Cooper, Madjid Merabti:
Evaluation of a Quadric-Based Surface adaptive LOD for MPEG-4 FA. CCNC 2012: 497-501 - [c110]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - [c109]William Hurst, Madjid Merabti, Paul Fergus:
Operational Support for Critical Infrastructure Security. HPCC-ICESS 2012: 1473-1478 - [c108]Chelsea Dobbins, Paul Fergus, Madjid Merabti, David Llewellyn-Jones:
Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories. ICC 2012: 6101-6105 - [c107]Chris Carter, Abdennour El Rhalibi, Madjid Merabti:
A Survey of AoIM, Distribution and Communication in Peer-To-Peer Online Games. ICCCN 2012: 1-5 - [c106]Ricardo Leandro Parreira Duarte, Abdennour El Rhalibi, Christopher Carter, Simon Cooper, Madjid Merabti:
An MPEG-4 Quadric-based LoD simplification for facial animation. ICMCS 2012: 743-748 - [c105]Ahmed S. B. Kozal, Madjid Merabti, Faycal Bouhafs:
An improved energy detection scheme for cognitive radio networks in low SNR region. ISCC 2012: 684-689 - [c104]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Augmenting human digital memories with physiological data. NESEA 2012: 1-7 - [c103]William Hurst, Madjid Merabti, Paul Fergus:
Managing critical infrastructures through behavioural observation. NESEA 2012: 1-6 - [c102]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services. PerCom Workshops 2012: 64-69 - [c101]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - [c100]Efstathios Goudoulakis, Abdennour El Rhalibi, Madjid Merabti, A. Taleb-Bendiab:
Framework for multi-agent planning and coordination in DIS. WASA 2012: 65-71 - [c99]Laura Pla Beltran, Madjid Merabti, Qi Shi:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. TrustCom 2012: 549-556 - [c98]Muhammad Zahid Khan, Madjid Merabti, Bob Askwith, Faycal Bouhafs:
A zone-based hierarchical framework and clustering scheme for energy-efficient Wireless Sensor Networks. Wireless Days 2012: 1-8 - [c97]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
Scalable Distributed Signature Detection. WDFIA 2012: 27-37 - [c96]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques. WDFIA 2012: 87-96 - 2011
- [j35]Ali C. Begen, Mario Kolberg, Madjid Merabti, Stan Moyer:
Consumer communication applications drive network integration [Series Editorial]. IEEE Commun. Mag. 49(11): 164-165 (2011) - [j34]Qi Shi, Ning Zhang, Madjid Merabti:
Fair exchange of valuable information: A generalised framework. J. Comput. Syst. Sci. 77(2): 348-371 (2011) - [j33]Qi Shi, Ning Zhang, Madjid Merabti, Robert Askwith:
Achieving autonomous fair exchange in ubiquitous network settings. J. Netw. Comput. Appl. 34(2): 653-667 (2011) - [c95]Muhammad Asim, Hala M. Mokhtar, Muhammad Zahid Khan, Madjid Merabti:
A Sensor Relocation Scheme for Wireless Sensor Networks. AINA Workshops 2011: 808-813 - [c94]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
The effect of direct interactions on reputation based schemes in mobile ad hoc networks. CCNC 2011: 297-302 - [c93]Abdennour El Rhalibi, Madjid Merabti, Ruwei Yun, Dan Liu:
Game based learning with Homura 3D, for dinosaurs life teaching. CCNC 2011: 332-336 - [c92]Abdennour El Rhalibi, Simon Cooper, Chris Carter, Madjid Merabti, Jon Wetherall:
Web-based hardware accelerated procedural content generation. CCNC 2011: 368-372 - [c91]Paul Fergus, Mark Taylor, Madjid Merabti, John Haggerty, L. Bracegirdle:
Expanding Tele-care: Using Motion Sensors for Monitoring Purposes. DeSE 2011: 19-23 - [c90]Chunlin Song, Sud Sudirman, Madjid Merabti, Dhiya Al-Jumeily:
Region-Adaptive Watermarking System and Its Application. DeSE 2011: 215-220 - [c89]Brett Lempereur, Madjid Merabti, Qi Shi:
Information Flow Monitoring: Model, Policy, and Analysis. DeSE 2011: 227-232 - [c88]Abdennour El Rhalibi, Madjid Merabti, Ruwei Yun, Dan Liu:
Game Based Learning Framework for Virtual 3D Dinosaurs Knowledge. DeSE 2011: 419-424 - [c87]Ijaz Muhammad Khan, Muhammad Zahid Khan, Hala M. Mokhtar, Madjid Merabti:
Enhancements of the Self-Detection Scheme for Boundary Recognition in Wireless Sensor Networks. DeSE 2011: 448-453 - [c86]Andrew Attwood, Madjid Merabti, Paul Fergus, Omar Abuelma'atti:
SCCIR: Smart Cities Critical Infrastructure Response Framework. DeSE 2011: 460-464 - [c85]Andrew Attwood, Madjid Merabti, Omar Abuelma'atti:
IoMANETs: Mobility architecture for wireless M2M networks. GLOBECOM Workshops 2011: 399-404 - [c84]Abdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti:
Highly Realistic MPEG-4 Compliant Facial Animation with Charisma. ICCCN 2011: 1-6 - [c83]Faycal Bouhafs, Madjid Merabti:
Managing communications complexity in the smart grid using data aggregation. IWCMC 2011: 1315-1320 - [c82]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - [c81]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
A Signature Detection Scheme for Distributed Storage. WDFIA 2011: 122-132 - 2010
- [j32]Abdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti, Marc Price:
Charisma: High-performance Web-based MPEG-compliant animation framework. Comput. Entertain. 8(2): 8:1-8:15 (2010) - [j31]Mario Kolberg, Madjid Merabti, Stan Moyer:
Consumer communication applications drive integration and convergence [Series Editorial]. IEEE Commun. Mag. 48(12): 24 (2010) - [j30]Demetres D. Kouvatsos, Madjid Merabti:
Foreword. Comput. Commun. 33(Supplement-1): S1-S2 (2010) - [j29]Kashif Kifayat, Madjid Merabti, Qi Shi:
Future security challenges in cloud computing. Int. J. Multim. Intell. Secur. 1(4): 428-442 (2010) - [j28]Madjid Merabti, Zhu Liu, Heather Yu, Deepa Kundur:
Advances In Peer-To-Peer Content Search. J. Signal Process. Syst. 59(3): 309-318 (2010) - [c80]Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:
A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. CIT 2010: 155-162 - [c79]Kashif Kifayat, Paul Fergus, Simon Cooper, Madjid Merabti:
Body Area Networks for Movement Analysis in Physiotherapy Treatments. AINA Workshops 2010: 866-872 - [c78]Arshad Muhammad, Paul Fergus, Madjid Merabti, Bob Askwith:
Peer-to-Peer Overlay Gateway Services for Home Automation and Management. AINA Workshops 2010: 880-886 - [c77]Arshad Haroon, Paul Fergus, Amjad Shaheed, Madjid Merabti:
A Wireless Home and Body Sensor Network Platform for the Early Detection of Arthritis. CCNC 2010: 1-5 - [c76]Amjad Shaheed, Paul Fergus, Omar Abuelma'atti, Madjid Merabti:
Visualisation of Ubiquitous Home Devices and Services. CCNC 2010: 1-5 - [c75]Chunlin Song, Sud Sudirman, Madjid Merabti, David Llewellyn-Jones:
Analysis of Digital Image Watermark Attacks. CCNC 2010: 1-5 - [c74]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Dynamic Device Configuration in Ubiquitous Environments. ICGS3 2010: 263-273 - [c73]Chris Carter, Abdennour El Rhalibi, Madjid Merabti, A. Taleb-Bendiab:
Hybrid Client-Server, Peer-to-Peer framework for MMOG. ICME 2010: 1558-1563 - [c72]Chris Carter, Simon Cooper, Abdennour El Rhalibi, Madjid Merabti:
The Application of MPEG-4 Compliant Animation to a Modern Games Engine and Animation Framework. MIG 2010: 326-338 - [c71]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Data Mishandling and Profile Building in Ubiquitous Environments. SocialCom/PASSAT 2010: 1056-1063 - [c70]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [c69]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks. Wireless Days 2010: 1-6 - [p3]Bo Zhou, Qi Shi, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 307-333 - [p2]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552 - [i1]Muhammad Asim, Hala M. Mokhtar, Madjid Merabti:
A self-managing fault management mechanism for wireless sensor networks. CoRR abs/1011.5072 (2010)
2000 – 2009
- 2009
- [j27]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Context-Aware Identity Management in Pervasive Ad-hoc Environments. Int. J. Adv. Pervasive Ubiquitous Comput. 1(4): 29-42 (2009) - [j26]Chris Carter, Abdennour El Rhalibi, Madjid Merabti, Marc Price:
Networking Middleware and Online-Deployment Mechanisms for Java-Based Games. Trans. Edutainment 2: 19-32 (2009) - [c68]Ian Rhead, Madjid Merabti, Hala M. Mokhtar, Paul Fergus:
A Hierarchically Structured Worldwide Sensor Web Architecture. AINA Workshops 2009: 570-575 - [c67]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). AINA Workshops 2009: 588-594 - [c66]Ian Rhead, Madjid Merabti, Hala M. Mokhtar, Paul Fergus:
A Hierarchically Structured Worldwide Sensor Web Architecture. CCNC 2009: 1-2 - [c65]Madjid Merabti:
Sharing and Protecting Networked Digital Life Memories. CIIA 2009 - [c64]Chris Carter, Abdennour El Rhalibi, Madjid Merabti, Marc Price:
Homura and Net-Homura: The creation and web-based deployment of cross-platform 3D games. ICUMT 2009: 1-8 - [c63]Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, David Llewellyn-Jones:
Monitoring connectivity in wireless sensor networks. ISCC 2009: 507-512 - [c62]Paul Fergus, K. Kafiyat, Madjid Merabti, A. Taleb-Bendiab, Abdennour El Rhalibi:
Remote physiotherapy treatments using wireless body sensor networks. IWCMC 2009: 1191-1197 - [c61]Ijaz Muhammad Khan, Hala M. Mokhtar, Madjid Merabti:
A new self-detection scheme for sensor network boundary recognition. LCN 2009: 241-244 - [c60]Paul Fergus, Kashif Kifayat, Simon Cooper, Madjid Merabti, Abdennour El Rhalibi:
A framework for physical health improvement using Wireless Sensor Networks and gaming. PervasiveHealth 2009: 1-4 - [p1]Mengjie Yu, Hala M. Mokhtar, Madjid Merabti:
Autonomic Networking in Wireless Sensor Networks. Autonomic Computing and Networking 2009: 261-284 - 2008
- [j25]Mario Kolberg, Madjid Merabti, Stan Moyer:
Consumer communications and networking [guest editorial]. IEEE Commun. Mag. 46(12): 30-31 (2008) - [j24]Bo Zhou, Qi Shi, Madjid Merabti:
Balancing intrusion detection resources in ubiquitous computing networks. Comput. Commun. 31(15): 3643-3653 (2008) - [j23]Mengjie Yu, Hala M. Mokhtar, Madjid Merabti:
A self-organised middleware architecture for Wireless Sensor Network management. Int. J. Ad Hoc Ubiquitous Comput. 3(3): 135-145 (2008) - [j22]Abdennour El Rhalibi, Madjid Merabti:
A Hybrid Fuzzy ANN System for Agent Adaptation in a First Person Shooter. Int. J. Comput. Games Technol. 2008: 432365:1-432365:18 (2008) - [j21]Madjid Merabti, Paul Fergus, Omar Abuelma'atti, Hong Heather Yu, Charlie Judice:
Managing Distributed Networked Appliances in Home Networks. Proc. IEEE 96(1): 166-185 (2008) - [j20]Madjid Merabti, Abdennour El Rhalibi, Yuanyuan Shen, Jorge Daniel, Alcantara Melendez, Marc Price:
Interactive Storytelling: Approaches and Techniques to Achieve Dynamic Stories. Trans. Edutainment 1: 118-134 (2008) - [c59]Kenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, Madjid Merabti:
A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance. AINA Workshops 2008: 1444-1449 - [c58]Abdennour El Rhalibi, Madjid Merabti, Paul Fergus, Yuanyuan Shen:
Perceptual User Interface as Games Controller. CCNC 2008: 1059-1064 - [c57]Paul Fergus, David Llewellyn-Jones, Amjad Shaheed, Madjid Merabti, Abdennour El Rhalibi:
Networked Appliances: Manipulation of 3D Multimedia Streams. CCNC 2008: 1117-1122 - [c56]Madjid Merabti, Abdennour El Rhalibi, Amjad Shaheed, Paul Fergus, Marc Price:
Virtual Environments with Content Sharing. Edutainment 2008: 328-342 - 2007
- [j19]Mengjie Yu, Hala M. Mokhtar, Madjid Merabti:
Fault management in wireless sensor networks. IEEE Wirel. Commun. 14(6): 13-19 (2007) - [c55]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49 - [c54]Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:
Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. AINA Workshops (1) 2007: 846-851 - [c53]Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar:
Mobile Event Monitoring Protocol for Wireless Sensor Networks. AINA Workshops (1) 2007: 864-869 - [c52]Tarag Fahad, Djamel Djenouri, Robert Askwith, Madjid Merabti:
A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. AINA Workshops (1) 2007: 882-887 - [c51]E. Catherine L. Watts, Madjid Merabti, A. Taleb-Bendiab:
A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. AINA Workshops (1) 2007: 923-928 - [c50]Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi:
Bridging the Gap between Networked Appliances and Virtual Worlds. AINA Workshops (1) 2007: 935-940 - [c49]Rozaida Ghazali, Abir Jaafar Hussain, Dhiya Al-Jumeily, Madjid Merabti:
Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting. ICANNGA (2) 2007: 123-132 - [c48]Bo Zhou, Qi Shi, Madjid Merabti:
Towards Energy-Efficient Intrusion Detection in Pervasive Computing. ICC 2007: 1417-1422 - [c47]Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar:
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks. ICC 2007: 3876-3881 - [c46]Deepa Kundur, Zhu Liu, Madjid Merabti, Heather Yu:
Advances in Peer-to-Peer Content Search. ICME 2007: 404-407 - [c45]Heather Yu, John F. Buford, Madjid Merabti:
Improving Messaging Security in Structured P2P Overlay Networks. ICME 2007: 408-411 - [c44]Djamel Djenouri, Othmane Mahmoudi, Mohamed Bouamama, David Llewellyn-Jones, Madjid Merabti:
On Securing MANET Routing Protocol Against Control Packet Dropping. ICPS 2007: 100-108 - [c43]Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:
Spider-Net Zone Routing Protocol for Mobile Sink Wireless Sensor Networks. ICWN 2007: 209-215 - [c42]Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon:
Networked Appliances for Home Healthcare and Lifestyle Management. IHN 2007: 313-328 - [c41]Omar Abuelma'atti, Anirach Mingkhwan, Madjid Merabti, Robert Askwith:
BlueBridge: A Wireless Interworking Architecture for the Ubiquitous Home. WCNC 2007: 2344-2349 - [c40]Huma Javed, Madjid Merabti, Robert Askwith:
A Persistent Storage Middleware Service for Wireless Sensor Networks. WCNC 2007: 2490-2494 - [c39]Arshad Muhammad, Madjid Merabti, Bob Askwith, Paul Fergus:
Ad Hoc Gateway Service for Automatic Package Delivery using Networked Appliances. WCNC 2007: 2576-2581 - [c38]Hulya Francis, Madjid Merabti, A. Taleb-Bendiab:
Harnessing the Web Technology to Enrich Visually Challenged Users Navigation. WEBIST (1) 2007: 189-196 - 2006
- [j18]Madjid Merabti, David Llewellyn-Jones:
Digital Rights Management in Ubiquitous Computing. IEEE Multim. 13(2): 32-42 (2006) - [j17]Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith:
Practical and efficient fair document exchange over networks. J. Netw. Comput. Appl. 29(1): 46-61 (2006) - [j16]Marco Roccetti, S.-H. Gary Chan, Madjid Merabti, Stan Moyer, Mehmet Ulema, Heather Yu:
Special issue on advances in consumer communications and networking. Multim. Tools Appl. 29(3): 209-210 (2006) - [j15]Anirach Mingkhwan, Paul Fergus, Omar Abuelma'atti, Madjid Merabti, Bob Askwith, Martin Hanneghan:
Dynamic service composition in home appliance networks. Multim. Tools Appl. 29(3): 257-284 (2006) - [c37]Abdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen:
AoIM in peer-to-peer multiplayer online games. Advances in Computer Entertainment Technology 2006: 71 - [c36]Rozaida Ghazali, Abir Jaafar Hussain, Madjid Merabti:
Higher order neural networks and their applications to financial time series prediction. Artificial Intelligence and Soft Computing 2006: 120-125 - [c35]Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar:
A semantic clustering routing protocol for wireless sensor networks. CCNC 2006: 351-355 - [c34]Abdennour El Rhalibi, Madjid Merabti:
Interest management and scalability issues in P2P MMOG. CCNC 2006: 1188-1192 - [c33]Bo Zhou, Qi Shi, Madjid Merabti:
A framework for intrusion detection in heterogeneous environments. CCNC 2006: 1244-1248 - [c32]Bo Zhou, Qi Shi, Madjid Merabti:
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. COMPSAC (2) 2006: 203-208 - [c31]Abdennour El Rhalibi, Madjid Merabti, Yuanyuan Shen:
Improving Game Processing in Multithreading and Multiprocessor Architecture. Edutainment 2006: 669-679 - [c30]Bo Zhou, Qi Shi, Madjid Merabti:
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. ICCSA (4) 2006: 352-359 - [c29]Zhu Liu, Heather Yu, Deepa Kundur, Madjid Merabti:
On Peer-to-Peer Multimedia Content Access and Distribution. ICME 2006: 557-560 - 2005
- [j14]Abdennour El Rhalibi, Madjid Merabti:
Agents-based modeling for a peer-to-peer MMOG architecture. Comput. Entertain. 3(2): 3 (2005) - [j13]Gurleen Kaur Arora, Martin Hanneghan, Madjid Merabti:
P2P commercial digital content exchange. Electron. Commer. Res. Appl. 4(3): 250-263 (2005) - [j12]John Haggerty, Qi Shi, Madjid Merabti:
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE J. Sel. Areas Commun. 23(10): 1994-2002 (2005) - [j11]Ning Zhang, Qi Shi, Madjid Merabti:
Revocation of privacy-enhanced public-key certificates. J. Syst. Softw. 75(1-2): 205-214 (2005) - [c28]Abdennour El Rhalibi, Nick Baker, Madjid Merabti:
Emotional agent model and architecture for NPCs group control and interaction to facilitate leadership roles in computer entertainment. Advances in Computer Entertainment Technology 2005: 156-163 - [c27]Paul Fergus, Madjid Merabti, Martin Hanneghan, A. Taleb-Bendiab, Anirach Mingkhwan:
A semantic framework for self-adaptive networked appliances. CCNC 2005: 229-234 - [c26]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Buffer Overrun Prevention Through Component Composition Analysis. COMPSAC (1) 2005: 156-163 - [c25]John Haggerty, Qi Shi, Madjid Merabti:
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. SEC 2005: 327-342 - [c24]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. SecureComm 2005: 243-248 - 2004
- [j10]Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith:
Autonomous mobile agent based fair exchange. Comput. Networks 46(6): 751-770 (2004) - [j9]Ning Zhang, Qi Shi, Madjid Merabti:
A unified approach to a fair document exchange system. J. Syst. Softw. 72(1): 83-96 (2004) - [c23]John Haggerty, Tom Berry, Qi Shi, Madjid Merabti:
DiDDeM: a system for early detection of TCP SYN flood attacks. GLOBECOM 2004: 2037-2042 - [c22]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
A security framework for executables in a ubiquitous computing environment. GLOBECOM 2004: 2158-2163 - [c21]Anirach Mingkhwan, Paul Fergus, Omar Abuelma'atti, Madjid Merabti:
Implicit functionality: dynamic services composition for home networked appliances. ICC 2004: 43-47 - [c20]Bob Askwith, Madjid Merabti, Anirach Mingkhwan:
Mobility and Appliance Networks - A New Mobility Model. Broadband Satellite Comunication Systems 2004: 237-247 - [c19]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. ITCC (1) 2004: 112-117 - 2003
- [j8]Ning Zhang, Qi Shi, Madjid Merabti:
An efficient protocol for anonymous and fair document exchange. Comput. Networks 41(1): 19-28 (2003) - [j7]Bob Askwith, Madjid Merabti, Qi Shi:
MNPA: A basis for privacy-enhanced QoS in mobile networks. Microprocess. Microsystems 27(2): 93-100 (2003) - [c18]Paul Fergus, Anirach Mingkhwan, Madjid Merabti, Martin Hanneghan:
DiSUS: Mobile Ad Hoc Network Unstructured Services. PWC 2003: 484-491 - [c17]Abiola Abimbola, Qi Shi, Madjid Merabti:
NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. ISCC 2003: 232-237 - [c16]Hala M. Mokhtar, Rubem Pereira, Madjid Merabti:
An Effective Bandwidth Model for Deterministic QoS Guarantees of VBR Traffic. ISCC 2003: 1318-1323 - [c15]Anirach Mingkhwan, Omar Abuelma'atti, Madjid Merabti, Bob Askwith:
Multi hop communication in global wireless framework. WCNC 2003: 1011-1016 - 2002
- [c14]John Haggerty, Qi Shi, Madjid Merabti:
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. ACSAC 2002: 413-422 - [c13]Anirach Mingkhwan, Madjid Merabti, Bob Askwith:
IPMSA: integrated personal mobility services architecture. ICC 2002: 2019-2023 - [c12]Chris Bewick, Rubem Pereira, Madjid Merabti:
Network constrained smoothing: enhanced multiplexing of MPEG-4 video. ISCC 2002: 114-119 - [c11]Hala M. Mokhtar, Rubem Pereira, Madjid Merabti:
Fair-rate GPS: a new class for decoupling delay and bandwidth properties. ISCC 2002: 583-588 - [c10]John Haggerty, Qi Shi, Madjid Merabti:
The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146 - 2001
- [c9]D. W. Gresty, Qi Shi, Madjid Merabti:
Requirements for a General Framework for Response to Distributed Denial-of-Service. ACSAC 2001: 422-429 - [c8]Hala M. Mokhtar, Rubem Pereira, Madjid Merabti:
Cell-by-Cell Round Robin Service Discipline for ATM Networks. ICN (2) 2001: 507-516 - [c7]Hala M. Mokhtar, Rubem Pereira, Madjid Merabti:
Resource Allocation Scheme for Deterministic Services of Video Streams. ISCC 2001: 353-358 - 2000
- [j6]Madjid Merabti, Qi Shi, Rolf Oppliger:
Advanced security techniques for network protection. Comput. Commun. 23(17): 1581-1583 (2000) - [j5]Bob Askwith, Madjid Merabti, Qi Shi:
MNPA: a mobile network privacy architecture. Comput. Commun. 23(18): 1777-1788 (2000)
1990 – 1999
- 1999
- [j4]Ning Zhang, Qi Shi, Madjid Merabti:
A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999) - [j3]Putra Sumari, Madjid Merabti, Rubem Pereira:
Video-on-demand server: Strategies for improving performance. IEE Proc. Softw. 146(1): 33-38 (1999) - [c6]Putra Sumari, Madjid Merabti, Rubem Pereira:
Video on Demand Servers: Storage Architecture with Disk Arrays. Eurographics Multimedia Workshop 1999: 73-82 - 1998
- [c5]Ewan Smith, Adil Al-Yasiri, Madjid Merabti:
A Multi-Tiered Classification Scheme for Component Retrieval. EUROMICRO 1998: 20882-20889 - 1997
- [c4]Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley:
Achieving User Privacy in Mobile Networks. ACSAC 1997: 108- - 1996
- [c3]Martin Hanneghan, Madjid Merabti, Gary J. Colquhoun:
The World-Wide Web as Platform for Supporting Interactive Concurrent Engineering. CAiSE 1996: 301-318 - 1995
- [c2]Andrew Symons, Madjid Merabti, Carl Bamford:
Dynamically Re-configurable Distributed Multimedia Systems: An Object Based Framework. OOIS 1995: 173-188 - [c1]Martin Hanneghan, Madjid Merabti, Gary J. Colquhoun:
The Design of an Object-Oriented Repository to Support Concurrent Engineering. OOIS 1995: 200-215 - 1990
- [j2]David Gilmore, Geoff Cumming, Simon Ross, John Rosbottom, Elpida T. Keravnou, Tony Dodd, Madjid Merabti, G. Byron, Leonard Bolc, Ian Crookston:
Book reviews. Artif. Intell. Rev. 4(1): 61-78 (1990) - [j1]Tony Drapkin, Allan Ramsay, Steve Hedges, Aidan P. Magill, Edwin P. Curran, Madjid Merabti, Miranda Davies, Tony Dodd, Terence C. Fogarty:
Book reviews. Artif. Intell. Rev. 4(4): 295-320 (1990)
Coauthor Index
aka: Bob Askwith
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint