Hadi Otrok

Orcid: 0000-0002-9574-5384

According to our database1, Hadi Otrok authored at least 200 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Overcoming cold start and sensor bias: A deep learning-based framework for IoT-enabled monitoring applications.
J. Netw. Comput. Appl., February, 2024

TRACE: Transformer-based continuous tracking framework using IoT and MCS.
J. Netw. Comput. Appl., February, 2024

Multiple Source Localization in IoT: A Conditional GAN and Image-Processing-Based Framework.
IEEE Internet Things J., February, 2024

Explainable AI for Event and Anomaly Detection and Classification in Healthcare Monitoring Systems.
IEEE Internet Things J., January, 2024

LearnChain: Transparent and cooperative reinforcement learning on Blockchain.
Future Gener. Comput. Syst., January, 2024

Blockchain-Assisted Demonstration Cloning for Multiagent Deep Reinforcement Learning.
IEEE Internet Things J., 2024

2023
A Survey on Explainable Artificial Intelligence for Cybersecurity.
IEEE Trans. Netw. Serv. Manag., December, 2023

Reward shaping using convolutional neural network.
Inf. Sci., November, 2023

Reinforcement learning framework for UAV-based target localization applications.
Internet Things, October, 2023

Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management.
IEEE Trans. Netw. Serv. Manag., September, 2023

On-Demand-FL: A Dynamic and Efficient Multicriteria Federated Learning Client Deployment Scheme.
IEEE Internet Things J., September, 2023

Multiagent Deep Reinforcement Learning With Demonstration Cloning for Target Localization.
IEEE Internet Things J., August, 2023

A deep learning framework for target localization in error-prone environment.
Internet Things, July, 2023

A predictive target tracking framework for IoT using CNN-LSTM.
Internet Things, July, 2023

Crowdsourced last mile delivery: Collaborative workforce assignment.
Internet Things, July, 2023

ModularFed: Leveraging modularity in federated learning frameworks.
Internet Things, July, 2023

Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources.
IEEE Trans. Netw. Serv. Manag., June, 2023

Dynamic Fog Federation Scheme for Internet of Vehicles.
IEEE Trans. Netw. Serv. Manag., June, 2023

Influence- and Interest-Based Worker Recruitment in Crowdsourcing Using Online Social Networks.
IEEE Trans. Netw. Serv. Manag., June, 2023

A machine learning-based framework for user recruitment in continuous mobile crowdsensing.
Ad Hoc Networks, June, 2023

A matching game-based crowdsourcing framework for last-mile delivery: Ground-vehicles and Unmanned-Aerial Vehicles.
J. Netw. Comput. Appl., April, 2023

Data independent warmup scheme for non-IID federated learning.
Inf. Sci., April, 2023

Blockcheck: A consortium blockchain-based conformance checking framework for business processes.
Internet Things, April, 2023

A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions.
IEEE Internet Things J., March, 2023

Deep reinforcement learning for the computation offloading in MIMO-based Edge Computing.
Ad Hoc Networks, March, 2023

Reinforcement Learning Framework for Server Placement and Workload Allocation in Multiaccess Edge Computing.
IEEE Internet Things J., January, 2023

A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations.
IEEE Trans. Serv. Comput., 2023

Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients.
IEEE Trans. Serv. Comput., 2023

FedMint: Intelligent Bilateral Client Selection in Federated Learning With Newcomer IoT Devices.
IEEE Internet Things J., 2023

A reinforcement learning model for the reliability of blockchain oracles.
Expert Syst. Appl., 2023

The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions.
CoRR, 2023

A Survey on Explainable Artificial Intelligence for Network Cybersecurity.
CoRR, 2023

Towards Mutual Trust-Based Matching For Federated Learning Client Selection.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Blockchain-based Reputation Management Framework for Crowdsourced Last-mile Delivery.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Towards On-Demand Deployment of Multiple Clients and Heterogeneous Models in Federated Learning.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

QoS-OLSR 2.0: A Quality-of-Service Optimized Link State Routing protocol for Mesh Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Towards Trust Driven On-Demand Client Deployment in Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Towards Instant Clustering Approach for Federated Learning Client Selection.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Towards Stable Federated Fog Formation Using Federated Learning and Evolutionary Game Theory.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A V2V charging allocation protocol for electric vehicles in VANET.
Veh. Commun., 2022

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement.
IEEE Trans. Serv. Comput., 2022

Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model.
ACM Trans. Internet Techn., 2022

On Demand Fog Federations for Horizontal Federated Learning in IoV.
IEEE Trans. Netw. Serv. Manag., 2022

A Stable Matching Game for V2V Energy Sharing-A User Satisfaction Framework.
IEEE Trans. Intell. Transp. Syst., 2022

Direct Electric Vehicle to Vehicle (V2V) Power Transfer Using On-Board Drivetrain and Motor Windings.
IEEE Trans. Ind. Electron., 2022

Graph convolutional recurrent networks for reward shaping in reinforcement learning.
Inf. Sci., 2022

An Efficient Vehicle-to-Vehicle (V2V) Energy Sharing Framework.
IEEE Internet Things J., 2022

Self-Supervised Online and Lightweight Anomaly and Event Detection for IoT Devices.
IEEE Internet Things J., 2022

Smart-3DM: Data-driven decision making using smart edge computing in hetero-crowdsensing environment.
Future Gener. Comput. Syst., 2022

On-chain behavior prediction Machine Learning model for blockchain-based crowdsourcing.
Future Gener. Comput. Syst., 2022

Target localization using Multi-Agent Deep Reinforcement Learning with Proximal Policy Optimization.
Future Gener. Comput. Syst., 2022

ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme.
CoRR, 2022

Reinforcement Learning Framework for Server Placement and Workload Allocation in Multi-Access Edge Computing.
CoRR, 2022

IoT Sensor Selection for Target Localization: A Reinforcement Learning based Approach.
Ad Hoc Networks, 2022

A Biometrics-Based Behavioral Trust Framework for Continuous Mobile Crowd Sensing Recruitment.
IEEE Access, 2022

Trust-3DM: Trustworthiness-Based Data-Driven Decision-Making Framework Using Smart Edge Computing for Continuous Sensing.
IEEE Access, 2022

A Context-Aware Blockchain-Based Crowdsourcing Framework: Open Challenges and Opportunities.
IEEE Access, 2022

Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics.
IEEE Access, 2022

Data-Driven Federated Autonomous Driving.
Proceedings of the Mobile Web and Intelligent Information Systems, 2022

PackChain: Toward a Blockchain-based Management Platform for Last-mile Delivery.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

A Cluster-based Quality-of-Service Optimized Link State Routing protocol for Mesh Networks.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Towards Bilateral Client Selection in Federated Learning Using Matching Game Theory.
Proceedings of the IEEE Global Communications Conference, 2022

Independent and Identically Distributed (IID) Data Assessment in Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Task coalition formation for Mobile CrowdSensing based on workers' routes preferences.
Veh. Commun., 2021

Matching game theoretical model for stable relay selection in a UAV-assisted internet of vehicles.
Veh. Commun., 2021

Stable coalitions for urban-VANET: A hedonic game approach.
Veh. Commun., 2021

AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach.
IEEE Trans. Netw. Serv. Manag., 2021

Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game.
IEEE Trans. Dependable Secur. Comput., 2021

A Novel Federated Fog Architecture Embedding Intelligent Formation.
IEEE Netw., 2021

How Artificial Intelligence and Mobile Crowd Sourcing are Inextricably Intertwined.
IEEE Netw., 2021

Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing.
J. Netw. Comput. Appl., 2021

SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks.
J. Netw. Comput. Appl., 2021

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection.
IEEE Internet Things J., 2021

Stable federated fog formation: An evolutionary game theoretical approach.
Future Gener. Comput. Syst., 2021

Federated Machine Learning: Survey, Multi-Level Classification, Desirable Criteria and Future Directions in Communication and Networking Systems.
IEEE Commun. Surv. Tutorials, 2021

A blockchain-enabled relay selection for QoS-OLSR in urban VANET: A Stackelberg game model.
Ad Hoc Networks, 2021

A Crowd-Based Efficient Fault-Proof Localization System for IoT and MCS.
IEEE Access, 2021

2020
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud.
IEEE Trans. Serv. Comput., 2020

A Blockchain-Based Model for Cloud Service Quality Monitoring.
IEEE Trans. Serv. Comput., 2020

A Crowd-Sensing Framework for Allocation of Time-Constrained and Location-Based Tasks.
IEEE Trans. Serv. Comput., 2020

FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory.
IEEE/ACM Trans. Netw., 2020

RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications.
J. Netw. Comput. Appl., 2020

An endorsement-based trust bootstrapping approach for newcomer cloud services.
Inf. Sci., 2020

AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions.
IEEE Internet Things Mag., 2020

Two-stage game theoretical framework for IaaS market share dynamics.
Future Gener. Comput. Syst., 2020

SenseChain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers.
Future Gener. Comput. Syst., 2020

Cloud federation formation using genetic and evolutionary game theoretical models.
Future Gener. Comput. Syst., 2020

A two-level solution to fight against dishonest opinions in recommendation-based trust systems.
CoRR, 2020

Dynamic formation of service communities in the cloud under distribution and incomplete information settings.
Concurr. Comput. Pract. Exp., 2020

Evolutionary game theoretical model for stable femtocells' clusters formation in HetNets.
Comput. Commun., 2020

A Mobile Edge-Based CrowdSensing Framework for Heterogeneous IoT.
IEEE Access, 2020

<i>ABCrowd</i>: An <i>A</i>uction Mechanism on <i>B</i>lockchain for Spatial <i>Crowd</i>sourcing.
IEEE Access, 2020

A Misbehaving-Proof Game Theoretical Selection Approach for Mobile Crowd Sourcing.
IEEE Access, 2020

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading.
IEEE Trans. Netw. Serv. Manag., 2019

Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection.
IEEE Trans. Big Data, 2019

Multi-worker multi-task selection framework in mobile crowd sourcing.
J. Netw. Comput. Appl., 2019

On the Detection of Passive Malicious Providers in Cloud Federations.
IEEE Commun. Lett., 2019

A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing.
Future Gener. Comput. Syst., 2019

Stable femtocells cluster formation and resource allocation based on cooperative game theory.
Comput. Commun., 2019

Data-Driven Dynamic Active Node Selection for Event Localization in IoT Applications - A Case Study of Radiation Localization.
IEEE Access, 2019

Gale-Shapley Matching Game Selection - A Framework for User Satisfaction.
IEEE Access, 2019

Impact of Misbehaving Devices in Mobile Crowd Sourcing Systems.
Proceedings of the 2019 IEEE World Congress on Services, 2019

2018
A Stackelberg game for street-centric QoS-OLSR protocol in urban Vehicular Ad Hoc Networks.
Veh. Commun., 2018

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game.
IEEE Trans. Serv. Comput., 2018

A stability-based group recruitment system for continuous mobile crowd sensing.
Comput. Commun., 2018

Game theoretical framework for clustering and resource allocation in macro-femtocell networks.
Comput. Networks, 2018

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach.
IEEE Access, 2018

A Cluster-Based QoS-OLSR Protocol for Urban Vehicular Ad Hoc Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

2017
Refined game-theoretic approach to improve authenticity of outsourced databases.
J. Ambient Intell. Humaniz. Comput., 2017

Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs.
Comput. Commun., 2017

A street-centric QoS-OLSR Protocol for urban Vehicular Ad Hoc Networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

On the Effects of User Ratings on the Profitability of Cloud Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET.
Veh. Commun., 2016

Realistic framework for resource allocation in macro-femtocell networks based on genetic algorithm.
Telecommun. Syst., 2016

GRS: A Group-Based Recruitment System for Mobile Crowd Sensing.
J. Netw. Comput. Appl., 2016

CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks.
Expert Syst. Appl., 2016

A Stackelberg game for distributed formation of business-driven services communities.
Expert Syst. Appl., 2016

A novel cluster based resource sharing model for femtocell networks.
Comput. Commun., 2016

From model-driven specification to design-level set-based analysis of XACML policies.
Comput. Electr. Eng., 2016

Towards ad-hoc cloud based approach for mobile intrusion detection.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability.
Proceedings of the 7th International Conference on Ambient Systems, 2016

How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud?
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Cloud Compute-and-Forward With Relay Cooperation.
IEEE Trans. Wirel. Commun., 2015

Efficient Community Formation for Web Services.
IEEE Trans. Serv. Comput., 2015

Analysis of collaborative learning in social network sites used in education.
Soc. Netw. Anal. Min., 2015

Spectrum sharing model for OFDMA macro-femtocell networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

A survey on trust and reputation models for Web services: Single, composite, and communities.
Decis. Support Syst., 2015

AOMD approach for context-adaptable and conflict-free Web services composition.
Comput. Electr. Eng., 2015

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies.
Comput. Electr. Eng., 2015

QoS-OLSR protocol based on intelligent water drop for Vehicular ad-hoc networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

Misbehavior Detection Framework for Community-Based Cloud Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

2014
A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol.
Wirel. Pers. Commun., 2014

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol.
Wirel. Pers. Commun., 2014

Base station selection and resource allocation in macro-femtocell networks under noisy scenario.
Wirel. Networks, 2014

Macrocell-femtocells resource allocation with hybrid access motivational model.
Phys. Commun., 2014

A game theoretical model for collaborative groups in social applications.
Expert Syst. Appl., 2014

To compete or cooperate? This is the question in communities of autonomous services.
Expert Syst. Appl., 2014

A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles.
Comput. Commun., 2014

Cooperative cross layer detection for blackhole attack in VANET-OLSR.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Accelerating snort NIDS using NetFPGA-based Bloom filter.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Framework for a NetFPGA-based Snort NIDS.
Proceedings of the 9th International Symposium on Communication Systems, 2014

A Modbus traffic generator for evaluating the security of SCADA systems.
Proceedings of the 9th International Symposium on Communication Systems, 2014

2013
Energy-Efficient Resource-Allocation Model for OFDMA Macrocell/Femtocell Networks.
IEEE Trans. Veh. Technol., 2013

An optimal dynamic resources partitioning auction model for virtual private networks.
Telecommun. Syst., 2013

XrML-RBLicensing approach adapted to the BPEL process of composite web services.
Serv. Oriented Comput. Appl., 2013

A Markov Decision Process Model for High Interaction Honeypots.
Inf. Secur. J. A Glob. Perspect., 2013

New XACML-AspectBPEL approach for composite web services security.
Int. J. Web Grid Serv., 2013

Agent-based game-theoretic model for collaborative web services: Decision making analysis.
Expert Syst. Appl., 2013

VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks.
Comput. Commun., 2013

Genetic algorithm based resource allocation and interference mitigation for OFDMA macrocell-femtocells networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Detecting attacks in QoS-OLSR protocol.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Botnet detection: A cooperative game theoretical correlation-based model.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

Efficient Coalition Formation for Web Services.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

Resource allocation model based on Particle Swarm Optimization for OFDMA macro-femtocell networks.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies.
Inf. Secur. J. A Glob. Perspect., 2012

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security.
Int. J. Web Grid Serv., 2012

An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol.
Int. J. Secur. Networks, 2012

RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks.
Comput. Commun., 2012

DDP: A Dynamic Dimensioning and Partitioning model of Virtual Private Networks resources.
Comput. Commun., 2012

A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies.
Comput. Networks, 2012

Resource allocation in macrocell-femtocell network using genetic algorithm.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Towards a BPEL model-driven approach for Web services security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Towards Smart Anti-Malwares for Battery-Powered Devices.
Proceedings of the 5th International Conference on New Technologies, 2012

Analyzing Coopetition Strategies of Services within Communities.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012

A game theoretic investigation for high interaction honeypots.
Proceedings of IEEE International Conference on Communications, 2012

Game theoretical analysis of collaborative social applications.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

A novel reputation-based Tit-for-Tat strategy for IEEE 802.11 CSMA/CA protocol.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Secur. Comput., 2011

New Approach Targeting Security Patterns Development and Deployment.
Inf. Secur. J. A Glob. Perspect., 2011

Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocol.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

A cluster-based model for QoS-OLSR protocol.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Smart Mobile Assessment Tool.
Proceedings of the Workshop Proceedings of the 7th International Conference on Intelligent Environments, 2011

Toward an abstract language on top of XACML for web services security.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Toward Systematic Integration of Security Policies into Web Services.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs.
Mob. Networks Appl., 2010

A collusion-resistant mechanism for autonomic resource management in Virtual Private Networks.
Comput. Commun., 2010

A Novel Approach for the Development and Deployment of Security Patterns.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

New approach for the dynamic enforcement of Web services security.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

ARMM: An Autonomic Resource Management Mechanism for Virtual Private Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
An Intrusion Detection Game Theoretical Model.
Inf. Secur. J. A Glob. Perspect., 2009

SC-OLSR: Secure Clustering-Based OLSR Model for Ad Hoc Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

2008
Mobile Security: Game Theory.
Encyclopedia of Wireless and Mobile Communications, 2008

A game-theoretic intrusion detection model for mobile ad hoc networks.
Comput. Commun., 2008

Game theoretic models for detecting network intrusions.
Comput. Commun., 2008

A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Game Theoretic Approach to Optimize the Performance of Host-Based IDS.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Testing Intrusion Detection Systems in MANET: A Comprehensive Study.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A Comparative Study of El-Gamal Based Cryptographic Algorithms.
RITA, 2005

Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
A Comparative Study of Elgamal Based Cryptographic Algorithms.
Proceedings of the ICEIS 2004, 2004

A Comparative Study of RSA based Cryptographic Algorithms.
Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2004


  Loading...