Alia Fourati

According to our database1, Alia Fourati authored at least 11 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Optimal Deployment of Security Policies: Application to Industrial Control Systems.
Proceedings of the 14th European Dependable Computing Conference, 2018

2015
An Attack Execution Model for Industrial Control Systems Security Assessment.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

2008
Detecting forged routing messages in ad hoc networks.
Telecommun. Syst., 2008

2007
Secure and fair auctions over ad hoc networks.
Int. J. Electron. Bus., 2007

An IDS First Line of Defense for Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2006
A shared secret-based algorithm for securing the OLSR routing protocol.
Telecommun. Syst., 2006

Deploying Auctions over Ad Hoc Networks.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

2005
Securing OLSR Routes.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

2004
Security issues of m-commerce over hotspot networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

2002
A SET Based Approach to Secure the Payment in Mobile Commerce.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Wireless set: an approach for the deployment of set over WAP mobile networks.
Proceedings of the Network Control and Engineering for QoS, 2002


  Loading...