2008 |
13 | EE | Noman Mohammed,
Hadi Otrok,
Lingyu Wang,
Mourad Debbabi,
Prabir Bhattacharya:
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
WCNC 2008: 2816-2821 |
12 | EE | Abderrezak Rachedi,
Abderrahim Benslimane,
Hadi Otrok,
Noman Mohammed,
Mourad Debbabi:
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.
WiMob 2008: 417-422 |
11 | EE | Shuai Liu,
D. Y. Zhang,
Xiao Chu,
Hadi Otrok,
Prabir Bhattacharya:
A Game Theoretic Approach to Optimize the Performance of Host-Based IDS.
WiMob 2008: 448-453 |
10 | EE | Hadi Otrok,
Noman Mohammed,
Lingyu Wang,
Mourad Debbabi,
Prabir Bhattacharya:
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
WiMob 2008: 608-612 |
9 | EE | Hadi Otrok,
Mona Mehrandish,
Chadi Assi,
Mourad Debbabi,
Prabir Bhattacharya:
Game theoretic models for detecting network intrusions.
Computer Communications 31(10): 1934-1944 (2008) |
8 | EE | Hadi Otrok,
Noman Mohammed,
Lingyu Wang,
Mourad Debbabi,
Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks.
Computer Communications 31(4): 708-721 (2008) |
2007 |
7 | EE | Hadi Otrok,
Joey Paquet,
Mourad Debbabi,
Prabir Bhattacharya:
Testing Intrusion Detection Systems in MANET: A Comprehensive Study.
CNSR 2007: 364-371 |
6 | EE | Hadi Otrok,
Mourad Debbabi,
Chadi Assi,
Prabir Bhattacharya:
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks.
ICDCS Workshops 2007: 86 |
2006 |
5 | EE | Mona Mehrandish,
Hadi Otrok,
Mourad Debbabi,
Chadi Assi,
Prabir Bhattacharya:
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
GLOBECOM 2006 |
2005 |
4 | EE | Ramzi A. Haraty,
Hadi Otrok,
A. Nasser Kassar:
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm.
AICCSA 2005: 91 |
3 | | Ramzi A. Haraty,
Abdul Nasser El-Kassar,
Hadi Otrok:
A Comparative Study of El-Gamal Based Cryptographic Algorithms.
RITA 12(1): 7-22 (2005) |
2004 |
2 | | Ramzi A. Haraty,
Abdul Nasser El-Kassar,
Hadi Otrok:
A Comparative Study of RSA based Cryptographic Algorithms.
IASSE 2004: 183-188 |
1 | | Ramzi A. Haraty,
Hadi Otrok,
Abdul Nasser El-Kassar:
A Comparative Study of Elgamal Based Cryptographic Algorithms.
ICEIS (3) 2004: 79-84 |