dblp.uni-trier.dewww.uni-trier.de

Mohamed Hamdi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
18EEMohamed Hamdi, Noureddine Boudriga: Chaotic Progressive Access Control for JPEG2000 Images Repositories. GLOBECOM 2008: 1867-1871
17EESouheil Ben Ayed, Mohamed Hamdi, Noureddine Boudriga: DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks. GLOBECOM 2008: 193-197
16 Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga: Automated Intrusion Response System: Surveys and Analysis. Security and Management 2008: 149-155
15EEMohamed Hamdi, Nejla Essaddi, Noureddine Boudriga: Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies. WCNC 2008: 2567-2572
14EEMohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat: WHOMoVeS: An optimized broadband sensor network for military vehicle tracking. Int. J. Communication Systems 21(3): 277-300 (2008)
13EEJihène Krichène, Mohamed Hamdi, Noureddine Boudriga: Heterogeneous Security Policy Validation: From Formal to Executable Specifications. JNW 3(8): 55-69 (2008)
2007
12EEMohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga: Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. AICCSA 2007: 252-257
11EEAmel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga: Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. AICCSA 2007: 825-832
10EENejla Essaddi, Mohamed Hamdi, Noureddine Boudriga: Sensor Activity Scheduling for Efficient WSN-based Tracking. AICCSA 2007: 840-847
9EEJihène Krichène, Mohamed Hamdi, Noureddine Boudriga: Security policy validation using temporal executable specifications. SMC 2007: 2848-2853
8EEMohamed Hamdi, Noureddine Boudriga: Detecting Denial-of-Service attacks using the wavelet transform. Computer Communications 30(16): 3203-3213 (2007)
7EEBoutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga: A decisional framework system for computer network intrusion detection. European Journal of Operational Research 177(3): 1824-1838 (2007)
2006
6EEMohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat: Designing a Wireless Sensor Network for Mobile Target Localization and Tracking. GLOBECOM 2006
5EEMohamed Hamdi, Noureddine Boudriga: Towards a Relational Calculus for Security Library Management. GLOBECOM 2006
2005
4EEMohamed Hamdi, Noureddine Boudriga: Computer and network security risk management: theory, challenges, and countermeasures. Int. J. Communication Systems 18(8): 763-793 (2005)
2004
3 Mohamed Hamdi, Noureddine Boudriga: An Abstract Reduction Model for Computer Security Risk. SEC 2004: 1-16
2EEJihène Krichène, Mohamed Hamdi, Noureddine Boudriga: Collective computer incident response using cognitive maps. SMC (1) 2004: 1080-1085
2003
1EEMohamed Hamdi, Noureddine Boudriga: Algebraic specification of network security risk management. FMSE 2003: 52-60

Coauthor Index

1Souheil Ben Ayed [17]
2Ramzi Bellazreg [12]
3Salah Benabdallah [7] [16]
4Noureddine Boudriga [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]
5Nejla Essaddi [10] [15]
6Boutheina A. Fessi [7] [16]
7Jihène Krichène [2] [9] [13]
8Amel Meddeb-Makhlouf [11]
9Mohammad S. Obaidat [6] [14]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)