dblp.uni-trier.dewww.uni-trier.de

Hadi Otrok

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EENoman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821
12EEAbderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi: A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422
11EEShuai Liu, D. Y. Zhang, Xiao Chu, Hadi Otrok, Prabir Bhattacharya: A Game Theoretic Approach to Optimize the Performance of Host-Based IDS. WiMob 2008: 448-453
10EEHadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612
9EEHadi Otrok, Mona Mehrandish, Chadi Assi, Mourad Debbabi, Prabir Bhattacharya: Game theoretic models for detecting network intrusions. Computer Communications 31(10): 1934-1944 (2008)
8EEHadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008)
2007
7EEHadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya: Testing Intrusion Detection Systems in MANET: A Comprehensive Study. CNSR 2007: 364-371
6EEHadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya: A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. ICDCS Workshops 2007: 86
2006
5EEMona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya: A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. GLOBECOM 2006
2005
4EERamzi A. Haraty, Hadi Otrok, A. Nasser Kassar: Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm. AICCSA 2005: 91
3 Ramzi A. Haraty, Abdul Nasser El-Kassar, Hadi Otrok: A Comparative Study of El-Gamal Based Cryptographic Algorithms. RITA 12(1): 7-22 (2005)
2004
2 Ramzi A. Haraty, Abdul Nasser El-Kassar, Hadi Otrok: A Comparative Study of RSA based Cryptographic Algorithms. IASSE 2004: 183-188
1 Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar: A Comparative Study of Elgamal Based Cryptographic Algorithms. ICEIS (3) 2004: 79-84

Coauthor Index

1Chadi Assi [5] [6] [9]
2Abderrahim Benslimane [12]
3Prabir Bhattacharya [5] [6] [7] [8] [9] [10] [11] [13]
4Xiao Chu [11]
5Mourad Debbabi [5] [6] [7] [8] [9] [10] [12] [13]
6Abdul Nasser El-Kassar [1] [2] [3]
7Ramzi A. Haraty [1] [2] [3] [4]
8A. Nasser Kassar [4]
9Shuai Liu [11]
10Mona Mehrandish [5] [9]
11Noman Mohammed [8] [10] [12] [13]
12Joey Paquet [7]
13Abderrezak Rachedi [12]
14Lingyu Wang [8] [10] [13]
15D. Y. Zhang [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)