| 2008 |
| 57 | EE | Kenvi Wang,
Tong-Tai Chiang,
Lin-Yi Peng,
Madjid Merabti:
A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance.
AINA Workshops 2008: 1444-1449 |
| 56 | EE | Madjid Merabti,
Abdennour El Rhalibi,
Amjad Shaheed,
Paul Fergus,
Marc Price:
Virtual Environments with Content Sharing.
Edutainment 2008: 328-342 |
| 55 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Balancing intrusion detection resources in ubiquitous computing networks.
Computer Communications 31(15): 3643-3653 (2008) |
| 54 | EE | Mengjie Yu,
Hala M. Mokhtar,
Madjid Merabti:
A self-organised middleware architecture for Wireless Sensor Network management.
IJAHUC 3(3): 135-145 (2008) |
| 53 | EE | Madjid Merabti,
Abdennour El Rhalibi,
Yuanyuan Shen,
Jorge Daniel,
Alcantara Melendez,
Marc Price:
Interactive Storytelling: Approaches and Techniques to Achieve Dynamic Stories.
T. Edutainment 1: 118-134 (2008) |
| 2007 |
| 52 | EE | Shih-Hao Chang,
Madjid Merabti,
Hala M. Mokhtar:
Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks.
AINA Workshops (1) 2007: 846-851 |
| 51 | EE | Faycal Bouhafs,
Madjid Merabti,
Hala M. Mokhtar:
Mobile Event Monitoring Protocol for Wireless Sensor Networks.
AINA Workshops (1) 2007: 864-869 |
| 50 | EE | Tarag Fahad,
Djamel Djenouri,
Robert Askwith,
Madjid Merabti:
A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET.
AINA Workshops (1) 2007: 882-887 |
| 49 | EE | E. C. L. Watts,
Madjid Merabti,
A. Taleb-Bendiab:
A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality.
AINA Workshops (1) 2007: 923-928 |
| 48 | EE | Paul Fergus,
David Llewellyn-Jones,
Madjid Merabti,
Abdennour El Rhalibi:
Bridging the Gap between Networked Appliances and Virtual Worlds.
AINA Workshops (1) 2007: 935-940 |
| 47 | EE | Kashif Kifayat,
Madjid Merabti,
Qi Shi,
David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
IAS 2007: 44-49 |
| 46 | EE | Rozaida Ghazali,
Abir Jaafar Hussain,
Dhiya Al-Jumeily,
Madjid Merabti:
Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting.
ICANNGA (2) 2007: 123-132 |
| 45 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Towards Energy-Efficient Intrusion Detection in Pervasive Computing.
ICC 2007: 1417-1422 |
| 44 | EE | Faycal Bouhafs,
Madjid Merabti,
Hala M. Mokhtar:
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks.
ICC 2007: 3876-3881 |
| 43 | EE | Deepa Kundur,
Zhu Liu,
Madjid Merabti,
Heather Yu:
Advances in Peer-to-Peer Content Search.
ICME 2007: 404-407 |
| 42 | EE | Heather Yu,
John Buford,
Madjid Merabti:
Improving Messaging Security in Structured P2P Overlay Networks.
ICME 2007: 408-411 |
| 41 | | Shih-Hao Chang,
Madjid Merabti,
Hala M. Mokhtar:
Spider-Net Zone Routing Protocol for Mobile Sink Wireless Sensor Networks.
ICWN 2007: 209-215 |
| 2006 |
| 40 | EE | Abdennour El Rhalibi,
Madjid Merabti,
Yuanyuan Shen:
AoIM in peer-to-peer multiplayer online games.
Advances in Computer Entertainment Technology 2006: 71 |
| 39 | | Rozaida Ghazali,
Abir Jaafar Hussain,
Madjid Merabti:
Higher order neural networks and their applications to financial time series prediction.
Artificial Intelligence and Soft Computing 2006: 120-125 |
| 38 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test.
COMPSAC (2) 2006: 203-208 |
| 37 | EE | Abdennour El Rhalibi,
Madjid Merabti,
Yuanyuan Shen:
Improving Game Processing in Multithreading and Multiprocessor Architecture.
Edutainment 2006: 669-679 |
| 36 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
ICCSA (4) 2006: 352-359 |
| 35 | EE | Zhu Liu,
Heather Yu,
Deepa Kundur,
Madjid Merabti:
On Peer-to-Peer Multimedia Content Access and Distribution.
ICME 2006: 557-560 |
| 34 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti,
Robert Askwith:
Practical and efficient fair document exchange over networks.
J. Network and Computer Applications 29(1): 46-61 (2006) |
| 33 | EE | Marco Roccetti,
Gary Chan,
Madjid Merabti,
Stan Moyer,
Mehmet Ulema,
Heather Yu:
Special issue on advances in consumer communications and networking.
Multimedia Tools Appl. 29(3): 209-210 (2006) |
| 32 | EE | Anirach Mingkhwan,
Paul Fergus,
O. Abuelma'atti,
Madjid Merabti,
Bob Askwith,
M. B. Hanneghan:
Dynamic service composition in home appliance networks.
Multimedia Tools Appl. 29(3): 257-284 (2006) |
| 2005 |
| 31 | EE | Abdennour El Rhalibi,
Nick Baker,
Madjid Merabti:
Emotional agent model and architecture for NPCs group control and interaction to facilitate leadership roles in computer entertainment.
Advances in Computer Entertainment Technology 2005: 156-163 |
| 30 | EE | David Llewellyn-Jones,
Madjid Merabti,
Qi Shi,
Bob Askwith:
Buffer Overrun Prevention Through Component Composition Analysis.
COMPSAC (1) 2005: 156-163 |
| 29 | | John Haggerty,
Qi Shi,
Madjid Merabti:
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
SEC 2005: 327-342 |
| 28 | EE | Abdennour El Rhalibi,
Madjid Merabti:
Agents-based modeling for a peer-to-peer MMOG architecture.
Computers in Entertainment 3(2): 3 (2005) |
| 27 | EE | G. Arora,
Martin Hanneghan,
Madjid Merabti:
P2P commercial digital content exchange.
Electronic Commerce Research and Applications 4(3): 250-263 (2005) |
| 26 | EE | John Haggerty,
Qi Shi,
Madjid Merabti:
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking.
IEEE Journal on Selected Areas in Communications 23(10): 1994-2002 (2005) |
| 25 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti:
Revocation of privacy-enhanced public-key certificates.
Journal of Systems and Software 75(1-2): 205-214 (2005) |
| 2004 |
| 24 | EE | David Llewellyn-Jones,
Madjid Merabti,
Qi Shi,
Bob Askwith:
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
ITCC (1) 2004: 112-117 |
| 23 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti,
Robert Askwith:
Autonomous mobile agent based fair exchange.
Computer Networks 46(6): 751-770 (2004) |
| 22 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti:
A unified approach to a fair document exchange system.
Journal of Systems and Software 72(1): 83-96 (2004) |
| 2003 |
| 21 | EE | Hala M. Mokhtar,
Rubem Pereira,
Madjid Merabti:
An Effective Bandwidth Model for Deterministic QoS Guarantees of VBR Traffic.
ISCC 2003: 1318-1323 |
| 20 | EE | Abiola Abimbola,
Qi Shi,
Madjid Merabti:
NetHost-Sensor: A Novel Concept in Intrusion Detection Systems.
ISCC 2003: 232-237 |
| 19 | EE | Paul Fergus,
Anirach Mingkhwan,
Madjid Merabti,
Martin Hanneghan:
DiSUS: Mobile Ad Hoc Network Unstructured Services.
PWC 2003: 484-491 |
| 18 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti:
An efficient protocol for anonymous and fair document exchange.
Computer Networks 41(1): 19-28 (2003) |
| 17 | EE | Bob Askwith,
Madjid Merabti,
Qi Shi:
MNPA: A basis for privacy-enhanced QoS in mobile networks.
Microprocessors and Microsystems 27(2): 93-100 (2003) |
| 2002 |
| 16 | EE | John Haggerty,
Qi Shi,
Madjid Merabti:
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks.
ACSAC 2002: 413-422 |
| 15 | EE | Chris Bewick,
Rubem Pereira,
Madjid Merabti:
Network constrained smoothing: enhanced multiplexing of MPEG-4 video.
ISCC 2002: 114-119 |
| 14 | EE | Hala M. Mokhtar,
Rubem Pereira,
Madjid Merabti:
Fair-rate GPS: a new class for decoupling delay and bandwidth properties.
ISCC 2002: 583-588 |
| 13 | | John Haggerty,
Qi Shi,
Madjid Merabti:
The Threat From Within -An Analysis of Attacks on anInternal Network.
SEC 2002: 133-146 |
| 2001 |
| 12 | EE | D. W. Gresty,
Qi Shi,
Madjid Merabti:
Requirements for a General Framework for Response to Distributed Denial-of-Service.
ACSAC 2001: 422-432 |
| 11 | EE | Hala M. Mokhtar,
Rubem Pereira,
Madjid Merabti:
Cell-by-Cell Round Robin Service Discipline for ATM Networks.
ICN (2) 2001: 507-516 |
| 10 | EE | Hala M. Mokhtar,
Rubem Pereira,
Madjid Merabti:
Resource Allocation Scheme for Deterministic Services of Video Streams.
ISCC 2001: 353-358 |
| 2000 |
| 9 | EE | Madjid Merabti,
Qi Shi,
Rolf Oppliger:
Advanced security techniques for network protection.
Computer Communications 23(17): 1581-1583 (2000) |
| 8 | EE | Bob Askwith,
Madjid Merabti,
Qi Shi:
MNPA: a mobile network privacy architecture.
Computer Communications 23(18): 1777-1788 (2000) |
| 1999 |
| 7 | | Ning Zhang,
Qi Shi,
Madjid Merabti:
A Flexible Approach to Secure and Fair Document Exchange.
Comput. J. 42(7): 569-581 (1999) |
| 6 | | Putra Sumari,
Madjid Merabti,
Rubem Pereira:
Video-on-demand server: Strategies for improving performance.
IEE Proceedings - Software 146(1): 33-38 (1999) |
| 1998 |
| 5 | EE | Ewan Smith,
Adil Al-Yasiri,
Madjid Merabti:
A Multi-Tiered Classification Scheme for Component Retrieval.
EUROMICRO 1998: 20882-20889 |
| 1997 |
| 4 | EE | Bob Askwith,
Madjid Merabti,
Qi Shi,
K. Whiteley:
Achieving User Privacy in Mobile Networks.
ACSAC 1997: 108- |
| 1996 |
| 3 | | Martin Hanneghan,
Madjid Merabti,
Gary Colquhoun:
The World-Wide Web as Platform for Supporting Interactive Concurrent Engineering.
CAiSE 1996: 301-318 |
| 1995 |
| 2 | | Andrew Symons,
Madjid Merabti,
Carl Bamford:
Dynamically Re-configurable Distributed Multimedia Systems: An Object Based Framework.
OOIS 1995: 173-188 |
| 1 | | Martin Hanneghan,
Madjid Merabti,
Gary Colquhoun:
The Design of an Object-Oriented Repository to Support Concurrent Engineering.
OOIS 1995: 200-215 |