2008 |
18 | EE | Mohamed Hamdi,
Noureddine Boudriga:
Chaotic Progressive Access Control for JPEG2000 Images Repositories.
GLOBECOM 2008: 1867-1871 |
17 | EE | Souheil Ben Ayed,
Mohamed Hamdi,
Noureddine Boudriga:
DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks.
GLOBECOM 2008: 193-197 |
16 | | Boutheina A. Fessi,
Mohamed Hamdi,
Salah Benabdallah,
Noureddine Boudriga:
Automated Intrusion Response System: Surveys and Analysis.
Security and Management 2008: 149-155 |
15 | EE | Mohamed Hamdi,
Nejla Essaddi,
Noureddine Boudriga:
Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies.
WCNC 2008: 2567-2572 |
14 | EE | Mohamed Hamdi,
Noureddine Boudriga,
Mohammad S. Obaidat:
WHOMoVeS: An optimized broadband sensor network for military vehicle tracking.
Int. J. Communication Systems 21(3): 277-300 (2008) |
13 | EE | Jihène Krichène,
Mohamed Hamdi,
Noureddine Boudriga:
Heterogeneous Security Policy Validation: From Formal to Executable Specifications.
JNW 3(8): 55-69 (2008) |
2007 |
12 | EE | Mohamed Hamdi,
Ramzi Bellazreg,
Noureddine Boudriga:
Doppler Effect on Location-Based Tracking in Mobile Sensor Networks.
AICCSA 2007: 252-257 |
11 | EE | Amel Meddeb-Makhlouf,
Mohamed Hamdi,
Noureddine Boudriga:
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection.
AICCSA 2007: 825-832 |
10 | EE | Nejla Essaddi,
Mohamed Hamdi,
Noureddine Boudriga:
Sensor Activity Scheduling for Efficient WSN-based Tracking.
AICCSA 2007: 840-847 |
9 | EE | Jihène Krichène,
Mohamed Hamdi,
Noureddine Boudriga:
Security policy validation using temporal executable specifications.
SMC 2007: 2848-2853 |
8 | EE | Mohamed Hamdi,
Noureddine Boudriga:
Detecting Denial-of-Service attacks using the wavelet transform.
Computer Communications 30(16): 3203-3213 (2007) |
7 | EE | Boutheina A. Fessi,
Mohamed Hamdi,
Salah Benabdallah,
Noureddine Boudriga:
A decisional framework system for computer network intrusion detection.
European Journal of Operational Research 177(3): 1824-1838 (2007) |
2006 |
6 | EE | Mohamed Hamdi,
Noureddine Boudriga,
Mohammad S. Obaidat:
Designing a Wireless Sensor Network for Mobile Target Localization and Tracking.
GLOBECOM 2006 |
5 | EE | Mohamed Hamdi,
Noureddine Boudriga:
Towards a Relational Calculus for Security Library Management.
GLOBECOM 2006 |
2005 |
4 | EE | Mohamed Hamdi,
Noureddine Boudriga:
Computer and network security risk management: theory, challenges, and countermeasures.
Int. J. Communication Systems 18(8): 763-793 (2005) |
2004 |
3 | | Mohamed Hamdi,
Noureddine Boudriga:
An Abstract Reduction Model for Computer Security Risk.
SEC 2004: 1-16 |
2 | EE | Jihène Krichène,
Mohamed Hamdi,
Noureddine Boudriga:
Collective computer incident response using cognitive maps.
SMC (1) 2004: 1080-1085 |
2003 |
1 | EE | Mohamed Hamdi,
Noureddine Boudriga:
Algebraic specification of network security risk management.
FMSE 2003: 52-60 |