Hadi Otrok

According to our database1, Hadi Otrok authored at least 110 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud.
IEEE Trans. Services Computing, 2020

Two-stage game theoretical framework for IaaS market share dynamics.
Future Gener. Comput. Syst., 2020

SenseChain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers.
Future Gener. Comput. Syst., 2020

Cloud federation formation using genetic and evolutionary game theoretical models.
Future Gener. Comput. Syst., 2020

Dynamic formation of service communities in the cloud under distribution and incomplete information settings.
Concurrency and Computation: Practice and Experience, 2020

ABCrowd: An Auction Mechanism on Blockchain for Spatial Crowdsourcing.
IEEE Access, 2020

2019
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading.
IEEE Trans. Network and Service Management, 2019

Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection.
IEEE Trans. Big Data, 2019

Multi-worker multi-task selection framework in mobile crowd sourcing.
J. Netw. Comput. Appl., 2019

On the Detection of Passive Malicious Providers in Cloud Federations.
IEEE Communications Letters, 2019

A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing.
Future Gener. Comput. Syst., 2019

Stable femtocells cluster formation and resource allocation based on cooperative game theory.
Comput. Commun., 2019

Data-Driven Dynamic Active Node Selection for Event Localization in IoT Applications - A Case Study of Radiation Localization.
IEEE Access, 2019

Gale-Shapley Matching Game Selection - A Framework for User Satisfaction.
IEEE Access, 2019

Impact of Misbehaving Devices in Mobile Crowd Sourcing Systems.
Proceedings of the 2019 IEEE World Congress on Services, 2019

2018
A Stackelberg game for street-centric QoS-OLSR protocol in urban Vehicular Ad Hoc Networks.
Vehicular Communications, 2018

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game.
IEEE Trans. Services Computing, 2018

A stability-based group recruitment system for continuous mobile crowd sensing.
Comput. Commun., 2018

Game theoretical framework for clustering and resource allocation in macro-femtocell networks.
Comput. Networks, 2018

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach.
IEEE Access, 2018

A Cluster-Based QoS-OLSR Protocol for Urban Vehicular Ad Hoc Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

2017
Refined game-theoretic approach to improve authenticity of outsourced databases.
J. Ambient Intell. Humaniz. Comput., 2017

Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs.
Comput. Commun., 2017

A street-centric QoS-OLSR Protocol for urban Vehicular Ad Hoc Networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

On the Effects of User Ratings on the Profitability of Cloud Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET.
Vehicular Communications, 2016

Realistic framework for resource allocation in macro-femtocell networks based on genetic algorithm.
Telecommunication Systems, 2016

GRS: A Group-Based Recruitment System for Mobile Crowd Sensing.
J. Netw. Comput. Appl., 2016

CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks.
Expert Syst. Appl., 2016

A Stackelberg game for distributed formation of business-driven services communities.
Expert Syst. Appl., 2016

A novel cluster based resource sharing model for femtocell networks.
Comput. Commun., 2016

From model-driven specification to design-level set-based analysis of XACML policies.
Comput. Electr. Eng., 2016

Towards ad-hoc cloud based approach for mobile intrusion detection.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability.
Proceedings of the 7th International Conference on Ambient Systems, 2016

How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud?
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Cloud Compute-and-Forward With Relay Cooperation.
IEEE Trans. Wireless Communications, 2015

Efficient Community Formation for Web Services.
IEEE Trans. Services Computing, 2015

Analysis of collaborative learning in social network sites used in education.
Social Netw. Analys. Mining, 2015

Spectrum sharing model for OFDMA macro-femtocell networks.
IJAHUC, 2015

A survey on trust and reputation models for Web services: Single, composite, and communities.
Decis. Support Syst., 2015

AOMD approach for context-adaptable and conflict-free Web services composition.
Comput. Electr. Eng., 2015

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies.
Comput. Electr. Eng., 2015

QoS-OLSR protocol based on intelligent water drop for Vehicular ad-hoc networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

Misbehavior Detection Framework for Community-Based Cloud Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

2014
A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol.
Wireless Personal Communications, 2014

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol.
Wireless Personal Communications, 2014

Base station selection and resource allocation in macro-femtocell networks under noisy scenario.
Wireless Networks, 2014

Macrocell-femtocells resource allocation with hybrid access motivational model.
Phys. Commun., 2014

A game theoretical model for collaborative groups in social applications.
Expert Syst. Appl., 2014

To compete or cooperate? This is the question in communities of autonomous services.
Expert Syst. Appl., 2014

A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles.
Comput. Commun., 2014

Cooperative cross layer detection for blackhole attack in VANET-OLSR.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Accelerating snort NIDS using NetFPGA-based Bloom filter.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Framework for a NetFPGA-based Snort NIDS.
Proceedings of the 9th International Symposium on Communication Systems, 2014

A Modbus traffic generator for evaluating the security of SCADA systems.
Proceedings of the 9th International Symposium on Communication Systems, 2014

2013
Energy-Efficient Resource-Allocation Model for OFDMA Macrocell/Femtocell Networks.
IEEE Trans. Vehicular Technology, 2013

An optimal dynamic resources partitioning auction model for virtual private networks.
Telecommunication Systems, 2013

XrML-RBLicensing approach adapted to the BPEL process of composite web services.
Service Oriented Computing and Applications, 2013

A Markov Decision Process Model for High Interaction Honeypots.
Information Security Journal: A Global Perspective, 2013

New XACML-AspectBPEL approach for composite web services security.
IJWGS, 2013

Agent-based game-theoretic model for collaborative web services: Decision making analysis.
Expert Syst. Appl., 2013

VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks.
Comput. Commun., 2013

Genetic algorithm based resource allocation and interference mitigation for OFDMA macrocell-femtocells networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Detecting attacks in QoS-OLSR protocol.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Efficient Coalition Formation for Web Services.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

Resource allocation model based on Particle Swarm Optimization for OFDMA macro-femtocell networks.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies.
Information Security Journal: A Global Perspective, 2012

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security.
IJWGS, 2012

An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol.
IJSN, 2012

RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks.
Comput. Commun., 2012

DDP: A Dynamic Dimensioning and Partitioning model of Virtual Private Networks resources.
Comput. Commun., 2012

A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies.
Comput. Networks, 2012

Resource allocation in macrocell-femtocell network using genetic algorithm.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

Towards a BPEL model-driven approach for Web services security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Towards Smart Anti-Malwares for Battery-Powered Devices.
Proceedings of the 5th International Conference on New Technologies, 2012

Analyzing Coopetition Strategies of Services within Communities.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012

A game theoretic investigation for high interaction honeypots.
Proceedings of IEEE International Conference on Communications, 2012

Game theoretical analysis of collaborative social applications.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

A novel reputation-based Tit-for-Tat strategy for IEEE 802.11 CSMA/CA protocol.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Sec. Comput., 2011

New Approach Targeting Security Patterns Development and Deployment.
Information Security Journal: A Global Perspective, 2011

Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocol.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

A cluster-based model for QoS-OLSR protocol.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Smart Mobile Assessment Tool.
Proceedings of the Workshop Proceedings of the 7th International Conference on Intelligent Environments, 2011

Toward an abstract language on top of XACML for web services security.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Toward Systematic Integration of Security Policies into Web Services.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs.
MONET, 2010

A collusion-resistant mechanism for autonomic resource management in Virtual Private Networks.
Comput. Commun., 2010

A Novel Approach for the Development and Deployment of Security Patterns.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

New approach for the dynamic enforcement of Web services security.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
An Intrusion Detection Game Theoretical Model.
Information Security Journal: A Global Perspective, 2009

SC-OLSR: Secure Clustering-Based OLSR Model for Ad Hoc Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

2008
Mobile Security: Game Theory.
Encyclopedia of Wireless and Mobile Communications, 2008

A game-theoretic intrusion detection model for mobile ad hoc networks.
Comput. Commun., 2008

Game theoretic models for detecting network intrusions.
Comput. Commun., 2008

A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Game Theoretic Approach to Optimize the Performance of Host-Based IDS.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Testing Intrusion Detection Systems in MANET: A Comprehensive Study.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A Comparative Study of El-Gamal Based Cryptographic Algorithms.
RITA, 2005

Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
A Comparative Study of Elgamal Based Cryptographic Algorithms.
Proceedings of the ICEIS 2004, 2004

A Comparative Study of RSA based Cryptographic Algorithms.
Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2004


  Loading...