default search action
Mohamed Hamdi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c108]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
An Authentication Protocol for Healthcare Application: A Case Study of a Diabetic Patient. AINA (1) 2023: 434-445 - [c107]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A Secure Emergency Framework in an IoT Based Patient Monitoring System. SECRYPT 2023: 844-849 - 2022
- [c106]Sihem Omri, Manel Abdelkader, Mohamed Hamdi, Tai-Hoon Kim:
Safety Issues Investigation in Deep Learning Based Chatbots Answers to Medical Advice Requests. ICONIP (5) 2022: 597-605 - [c105]Mohamed Hamdi:
Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications. SIN 2022: 1 - 2021
- [j21]Haythem Hayouni, Mohamed Hamdi:
A novel energy-efficient encryption algorithm for secure data in WSNs. J. Supercomput. 77(5): 4754-4777 (2021) - [c104]Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:
An Efficient and Privacy-Preserving Billing Protocol for Smart Metering. AINA (2) 2021: 691-702 - 2020
- [j20]Amel Arfaoui, Omar Rafik Merad Boudia, Ali Kribeche, Sidi-Mohammed Senouci, Mohamed Hamdi:
Context-aware access control and anonymous authentication in WBAN. Comput. Secur. 88 (2020)
2010 – 2019
- 2019
- [j19]Amel Arfaoui, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
Game-based adaptive anomaly detection in wireless body area networks. Comput. Networks 163 (2019) - [j18]Manel Medhioub, Mohamed Hamdi:
An identity-based cryptographic scheme for cloud storage applications. Int. J. Grid Util. Comput. 10(2): 93-104 (2019) - [c103]Amel Arfaoui, Soumaya Cherkaoui, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
Context-Aware Adaptive Authentication and Authorization in Internet of Things. ICC 2019: 1-6 - [c102]Emna Jaidane, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A New Trust Architecture for Smart Vehicular Systems. ICETE (1) 2019: 387-392 - [c101]Mourad Nasri, Mohamed Hamdi:
WCDMA Mean User Throughput Prediction Using Linear Regression Algorithm. ICIN 2019: 139-144 - [c100]Mourad Nasri, Mohamed Hamdi:
LTE QoS Parameters Prediction Using Multivariate Linear Regression Algorithm. ICIN 2019: 145-150 - [c99]Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:
A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid. IWCMC 2019: 1060-1066 - [c98]Rihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim:
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid. IWCMC 2019: 1067-1072 - [c97]Emna Jaidane, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A new vehicular blackbox architecture based on searchable encryption. IWCMC 2019: 1073-1078 - 2018
- [c96]Neila Mekki, Mohamed Hamdi, Taoufik Aguili:
Chaotic Cryptosystems for Multimedia Transmission Opportunities, Challenge and Limitations. SSD 2018: 208-213 - [c95]Marwa Chamekh, Mohamed Hamdi, Sadok El Asmi, Tai-Hoon Kim:
Security of RFID Based Internet of Things Applications: Requirements and Open Issues. SSD 2018: 699-703 - [c94]Amel Arfaoui, Asma Ben Letaifa, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
A stochastic game for adaptive security in constrained wireless body area networks. CCNC 2018: 1-7 - [c93]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system. CommNet 2018: 1-10 - [c92]Amel Arfaoui, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
Game-Based Adaptive Remote Access VPN for IoT: Application to e-Health. GLOBECOM 2018: 1-7 - [c91]Amel Arfaoui, Ali Kribeche, Omar Rafik Merad Boudia, Asma Ben Letaifa, Sidi Mohammed Senouci, Mohamed Hamdi:
Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks. ICC 2018: 1-7 - [c90]Emna Jaidane, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
An infrastructurless vehicle blackbox system. IINTEC 2018: 1-5 - [c89]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
Biometric-based Per-Packet Authentication Techniques in Communication Networks. IWCMC 2018: 273-278 - [c88]Amel Arfaoui, Asma Ben Letaifa, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks. IWCMC 2018: 606-611 - [c87]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network. IWCMC 2018: 774-779 - [c86]Amel Arfaoui, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
Game-Based Adaptive Risk Management in Wireless Body Area Networks. IWCMC 2018: 1087-1093 - [c85]Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
A Fair Resource Allocation Approach in Cloud Computing Environments. WETICE 2018: 54-57 - [c84]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints. WETICE 2018: 100-105 - [c83]Jaweher Zouari, Mohamed Hamdi, Tai-Hoon Kim:
Privacy Preserving Profile Matching Protocol for Human-Centric Social Internet of Things. WETICE 2018: 181-186 - [c82]Marwa Chamekh, Mohamed Hamdi, Sadok El Asmi, Tai-Hoon Kim:
Secured Distributed IoT Based Supply Chain Architecture. WETICE 2018: 199-202 - [c81]Marwa Chamekh, Sadok El Asmi, Mohamed Hamdi, Tai-Hoon Kim:
IoT Based Tracking System For Supply Chain Management. WINCOM 2018: 1-5 - 2017
- [c80]Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim:
Adaptive Risk Management Framework for Cloud Computing. AINA 2017: 1154-1161 - [c79]Marwa Chamekh, Mohamed Hamdi, Sadok El Asmi:
A new architecture for supply-chain management. CCNC 2017: 77-82 - [c78]Manel Medhioub, Tai-Hoon Kim, Mohamed Hamdi:
Adaptive risk treatment for cloud computing based on Markovian game. CCNC 2017: 236-241 - [c77]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
Video streaming strategy based on feedback control loop theory in cloud platform. ICUFN 2017: 854-859 - [c76]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
A novel privacy technique for Augmented Reality cloud gaming based on image authentication. IWCMC 2017: 252-257 - [c75]Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
Adaptive encryption for real time mobile multimedia services. IWCMC 2017: 282-286 - [c74]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
A new biometric-based security framework for cloud storage. IWCMC 2017: 390-395 - [c73]Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
A secure data storage based on revocation game-theoretic approaches in cloud computing environments. IWCMC 2017: 435-440 - [c72]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
A novel adaptive streaming approach for cloud-based mobile video games. IWCMC 2017: 1072-1077 - [c71]Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
Energy consumption comparison for mobile video streaming encryption algorithm. IWCMC 2017: 1350-1355 - [c70]Marwa Chamekh, Sadok El Asmi, Mohamed Hamdi, Tai-Hoon Kim:
Context aware middleware for RFID based pharmaceutical supply chain. IWCMC 2017: 1915-1920 - [c69]Jaweher Zouari, Mohamed Hamdi, Tai-Hoon Kim:
A privacy-preserving homomorphic encryption scheme for the Internet of Things. IWCMC 2017: 1939-1944 - [c68]Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:
Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System. SECRYPT 2017: 554-559 - [c67]Jaweher Zouari, Mohamed Hamdi, Tai-Hoon Kim:
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors. SCSS 2017: 63-67 - 2016
- [c66]Haythem Hayouni, Mohamed Hamdi:
A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks. ADHOC-NOW 2016: 263-276 - [c65]Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
Real-Time User Experience Evaluation for Cloud-Based Mobile Video. AINA Workshops 2016: 204-208 - [c64]Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi:
A new security games based reaction algorithm against DOS attacks in VANETs. CCNC 2016: 837-840 - [c63]Mohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi:
A new group Diffie-Hellman key generation proposal for secure VANET communications. CCNC 2016: 992-995 - [c62]Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
On video stream encryption efficiency for mobile cloud system. ICMCS 2016: 372-376 - [c61]Haythem Hayouni, Mohamed Hamdi:
Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues. ICNSC 2016: 1-6 - [c60]Ihsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim:
Chaotic construction of cryptographic keys based on biometric data. HPCS 2016: 509-516 - [c59]Jaweher Zouari, Mohamed Hamdi:
AIDF: An identity as a service framework for the cloud. ISNCC 2016: 1-5 - [c58]Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim:
A New Authentication Scheme for Cloud-based Storage Applications. SIN 2016: 57-60 - [c57]Rahma Gharsallaoui, Mohamed Hamdi, Tai-Hoon Kim:
Image compression with optimal traversal using wavelet and percolation theories. SoftCOM 2016: 1-6 - 2015
- [j17]Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
An overview on coalitional game-theoretic approaches for resource allocation in cloud computing architectures. Int. J. Cloud Comput. 4(1): 63-77 (2015) - [c56]Zohir Irki, Abdelatif Oussar, Mohamed Hamdi, Fatah Seddi:
A fuzzy UV-disparity based approach for following a leader mobile robot. ICAR 2015: 170-175 - [c55]Haythem Hayouni, Mohamed Hamdi:
Energy efficient key management scheme for clustered hierarchical wireless sensor networks. ICNSC 2015: 105-109 - [c54]Mohamed Nidhal Mejri, Mohamed Hamdi:
Recent advances in cryptographic solutions for vehicular networks. ISNCC 2015: 1-7 - [c53]Haythem Hayouni, Mohamed Hamdi, Tai-Hoon Kim:
A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks. IWCMC 2015: 1193-1198 - [c52]Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
Toward Quality of Experience models of cloud-based mobile services. IWCMC 2015: 1510-1514 - 2014
- [j16]Boutheina A. Fessi, Salah Benabdallah, Noureddine Boudriga, Mohamed Hamdi:
A multi-attribute decision model for intrusion response system. Inf. Sci. 270: 237-254 (2014) - [j15]Mohamed Nidhal Mejri, Jalel Ben-Othman, Mohamed Hamdi:
Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 1(2): 53-66 (2014) - [c51]Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
A Novel Approach for Fair and Secure Resource Allocation in Storage Cloud Architectures Based on DRF Mechanism. HPCC/CSS/ICESS 2014: 998-1001 - [c50]Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
A Coalitional Game-Theoretic Approach for QoS-Based and Secure Data Storage in Cloud Environment. HPCC/CSS/ICESS 2014: 1048-1054 - [c49]Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
A revocation game model for secure cloud storage. HPCS 2014: 1016-1017 - [c48]Mohamed Hamdi, Habtamu Abie:
Game-based adaptive security in the Internet of Things for eHealth. ICC 2014: 920-925 - [c47]Nouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
Forensic investigation in Mobile Cloud environment. ISNCC 2014: 1-5 - [c46]Zohir Irki, Abdelatif Oussar, Mohamed Hamdi, Fatah Seddi:
A Fuzzy UV-disparity based approach for obstacles avoidance. IWSSIP 2014: 67-70 - 2013
- [c45]Mohamed Hamdi:
Secure cooperative physical-layer coding for the internet of things. ASPI@UbiComp 2013: 4:1-4:7 - [c44]Yared Berhanu, Habtamu Abie, Mohamed Hamdi:
A testbed for adaptive security for IoT in eHealth. ASPI@UbiComp 2013: 5:1-5:8 - [c43]Stefan Poslad, Mohamed Hamdi, Habtamu Abie:
Adaptive security and privacy management for the internet of things (ASPI 2013). UbiComp (Adjunct Publication) 2013: 373-378 - [c42]Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane:
A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures. WETICE 2013: 336-341 - 2012
- [j14]Mohamed Hamdi, Nabil Tabbane, Tai-Hoon Kim, Sajid Hussain:
Web Services in Multimedia Communication. Adv. Multim. 2012: 129504:1-129504:2 (2012) - [j13]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Unifying identity management for fourth generation wireless networks. IET Commun. 6(18): 3222-3230 (2012) - [c41]Mohamed Hamdi:
Security of cloud computing, storage, and networking. CTS 2012: 1-5 - [c40]Mohamed Hamdi, Mahmoud Hamouda, Farhat Fnaiech, Kamal Al-Haddad:
Space vector pulse width modulation of multilevel inverters: A new method for selecting the appropriate small hexagon. IECON 2012: 774-779 - [c39]Ramzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi:
A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks. TrustCom 2012: 1077-1082 - 2011
- [j12]Nejla Essaddi, Mohamed Hamdi, Sami Habib, Noureddine Boudriga:
Evolutionary strategies for non-uniform deployment in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 7(3/4): 331-354 (2011) - [j11]Noureddine Boudriga, Mohamed Hamdi, S. Sitharama Iyengar:
Coverage Assessment and Target Tracking in 3D Domains. Sensors 11(10): 9904-9927 (2011) - [c38]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks. IWCMC 2011: 1250-1255 - 2010
- [j10]Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping. Simul. 86(4): 217-227 (2010) - [c37]Ramzi Bellazreg, Mohamed Hamdi, Noureddine Boudriga:
On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks. AICCSA 2010: 1-8 - [c36]Nejla Essaddi, Mohamed Hamdi, Sami Habib, Noureddine Boudriga:
Optimizing area coverage in Wireless Sensor Networks. AICCSA 2010: 1-6 - [c35]Mohamed Hamdi, Noureddine Boudriga, Habtamu Abie, Mieso K. Denko:
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments. DCNET/OPTICS 2010: 85-92 - [c34]M'hamed Chammem, Mohamed Hamdi, Noureddine Boudriga:
A Novel Modular Black-box Architecture for Secure Vehicular Networks. DCNET/OPTICS 2010: 93-103 - [c33]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Mobility and Security Models for Wireless Sensor Networks using Voronoi Tessellations. DCNET/OPTICS 2010: 104-113 - [c32]Mohamed Hamdi, Noureddine Boudriga:
Content-based network filtering of encrypted image data. WCNIS 2010: 343-348 - [c31]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
A new tracking-aware gossiping scheme for Wireless Sensor Networks. WCNIS 2010: 349-354
2000 – 2009
- 2009
- [j9]Mohamed Hamdi, Amel Meddeb-Makhlouf, Noureddine Boudriga:
Multilayer Statistical Intrusion Detection in Wireless Networks. EURASIP J. Adv. Signal Process. 2009 (2009) - [j8]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams. J. Networks 4(7): 589-597 (2009) - [c30]Maha Sliti, Mohamed Hamdi, Noureddine Boudriga:
Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks. AICCSA 2009: 633-636 - [c29]Mohamed Hamdi, Nejla Essaddi, Noureddine Boudriga:
ReAlSec: A Relational Language for Advanced Security Engineering. AINA 2009: 596-601 - [c28]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
A Dynamic Mobile Grid System for 4G Networks. FGIT-GDC 2009: 140-147 - [c27]Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Efficient Resource Reservation for Optical Burst Switching Networks. GLOBECOM 2009: 1-5 - [c26]Mohamed Hamdi, Noureddine Boudriga:
A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks. ICC 2009: 1-5 - [c25]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry. ICME 2009: 346-349 - [c24]M'hamed Chammem, Mohamed Hamdi, Noureddine Boudriga:
A platform for secure multi-service vehicular communication. ICUMT 2009: 1-6 - [c23]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks. ICUMT 2009: 1-8 - [c22]Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga:
A public key algorithm for optical communication based on lattice cryptography. ISCC 2009: 200-205 - [c21]Boutheina A. Fessi, Salah Benabdallah, Mohamed Hamdi, Noureddine Boudriga:
A new genetic algorithm approach for intrusion response system in computer networks. ISCC 2009: 342-347 - [c20]Ramzi Bellazreg, Mohamed Hamdi, Noureddine Boudriga:
Coverage control and irregular radio propagation in eireless sensor networks. WCNC 2009: 2474-2479 - 2008
- [j7]Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
WHOMoVeS: An optimized broadband sensor network for military vehicle tracking. Int. J. Commun. Syst. 21(3): 277-300 (2008) - [j6]Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:
Heterogeneous Security Policy Validation: From Formal to Executable Specifications. J. Networks 3(8): 55-69 (2008) - [j5]Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking. IEEE Syst. J. 2(1): 74-82 (2008) - [c19]Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga:
Automated Intrusion Response System: Surveys and Analysis. Security and Management 2008: 149-155 - [c18]Souheil Ben Ayed, Mohamed Hamdi, Noureddine Boudriga:
DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks. GLOBECOM 2008: 193-197 - [c17]Mohamed Hamdi, Noureddine Boudriga:
Chaotic Progressive Access Control for JPEG2000 Images Repositories. GLOBECOM 2008: 1867-1871 - [c16]Maha Sliti, Mohamed Hamdi, Noureddine Boudriga:
An elliptic threshold signature framework for k-security in wireless sensor networks. ICECS 2008: 226-229 - [c15]Mohamed Hamdi, Noureddine Boudriga:
Four dimensional chaotic ciphers for secure image transmission. ICME 2008: 437-440 - [c14]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks. NTMS 2008: 1-5 - [c13]Farouk Khelil, Mohamed Hamdi, Sylvain Guilley, Jean-Luc Danger, Nidhal Selmane:
Fault Analysis Attack on an FPGA AES Implementation. NTMS 2008: 1-5 - [c12]Mohamed Hamdi, Nejla Essaddi, Noureddine Boudriga:
Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies. WCNC 2008: 2567-2572 - 2007
- [j4]Mohamed Hamdi, Noureddine Boudriga:
Detecting Denial-of-Service attacks using the wavelet transform. Comput. Commun. 30(16): 3203-3213 (2007) - [j3]Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga:
A decisional framework system for computer network intrusion detection. Eur. J. Oper. Res. 177(3): 1824-1838 (2007) - [c11]Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga:
Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. AICCSA 2007: 252-257 - [c10]Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga:
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. AICCSA 2007: 825-832 - [c9]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
Sensor Activity Scheduling for Efficient WSN-based Tracking. AICCSA 2007: 840-847 - [c8]Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:
Security policy validation using temporal executable specifications. SMC 2007: 2848-2853 - 2006
- [c7]Mohamed Hamdi, Noureddine Boudriga:
Towards a Relational Calculus for Security Library Management. GLOBECOM 2006 - [c6]Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Designing a Wireless Sensor Network for Mobile Target Localization and Tracking. GLOBECOM 2006 - 2005
- [j2]Mohamed Hamdi, Noureddine Boudriga:
Computer and network security risk management: theory, challenges, and countermeasures. Int. J. Commun. Syst. 18(8): 763-793 (2005) - [c5]Mohamed Hamdi, Nouha Grira, Noureddine Boudriga:
Detecting distributed computer network attacks: A multi-dimensional wavelet approach. ICECS 2005: 1-5 - 2004
- [c4]Mohamed Hamdi, Noureddine Boudriga:
An Abstract Reduction Model for Computer Security Risk. SEC 2004: 1-16 - [c3]Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:
Collective computer incident response using cognitive maps. SMC (1) 2004: 1080-1085 - 2003
- [c2]Mohamed Hamdi, Noureddine Boudriga:
Algebraic specification of network security risk management. FMSE 2003: 52-60 - 2002
- [j1]Amel Benazza-Benyahia, Jean-Christophe Pesquet, Mohamed Hamdi:
Vector-lifting schemes for lossless coding and progressive archival of multispectral images. IEEE Trans. Geosci. Remote. Sens. 40(9): 2011-2024 (2002) - 2001
- [c1]Amel Benazza-Benyahia, Jean-Christophe Pesquet, Mohamed Hamdi:
Lossless coding for progressive archival of multispectral images. ICASSP 2001: 1817-1820
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint