2008 |
11 | | Tarek Elfouly,
Mohamed Saleh,
Quatibah M. Malluhi:
Efficient Forward Error Correction for Reliable Transmission in Packet Networks.
PDPTA 2008: 103-109 |
2007 |
10 | EE | Mohamed Saleh,
Mourad Debbabi:
Modeling Security Protocols as Games.
IAS 2007: 253-260 |
9 | EE | Mohamed Saleh,
Mourad Debbabi:
Verifying Security Properties of Cryptoprotocols: A Novel Approach.
SEFM 2007: 349-360 |
8 | EE | Mohamed Saleh:
Estimating market shares in each market segment using the information entropy concept.
Applied Mathematics and Computation 190(2): 1735-1739 (2007) |
7 | EE | Mohamed Saleh,
Ali Reza Arasteh,
Assaad Sakha,
Mourad Debbabi:
Forensic analysis of logs: Modeling and verification.
Knowl.-Based Syst. 20(7): 671-682 (2007) |
2006 |
6 | | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Common Criteria Approach to J2ME CLDC Security Requirements.
SoMeT 2006: 177-194 |
5 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Security Evaluation of J2ME CLDC Embedded Java Platform.
Journal of Object Technology 5(2): 125-154 (2006) |
2005 |
4 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Java for Mobile Devices: A Security Study.
ACSAC 2005: 235-244 |
3 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Security Analysis of Mobile Java.
DEXA Workshops 2005: 231-235 |
2 | EE | Mourad Debbabi,
Mohamed Saleh:
Game Semantics Model for Security Protocols.
ICFEM 2005: 125-140 |
1 | EE | Mourad Debbabi,
Mohamed Saleh,
Chamseddine Talhi,
Sami Zhioua:
Security Analysis of Wireless Java.
PST 2005 |