Madjid Merabti

According to our database1, Madjid Merabti authored at least 210 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Structuring communities for sharing human digital memories in a social P2P network.
Peer-to-Peer Netw. Appl., 2020

Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking.
Future Internet, 2020

A community-based social P2P network for sharing human life digital memories.
Trans. Emerg. Telecommun. Technol., 2020

2019
Cybersecurity Curriculum Design: A Survey.
Trans. Edutainment, 2019

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks.
KSII Trans. Internet Inf. Syst., 2019

2018
Masquerading Attacks Detection in Mobile Ad Hoc Networks.
IEEE Access, 2018

2017
Modelling, validating, and ranking of secure service compositions.
Softw. Pract. Exp., 2017

A feasibility study of stateful automaton packet inspection for streaming application detection systems.
Enterp. Inf. Syst., 2017

2016
Consumer Communications and the Next Generation Broadcast Networks.
IEEE Commun. Mag., 2016

Consumer communications and networking [Series Editorial].
IEEE Commun. Mag., 2016

A Novel Multi-Agent Planning System for Digital Interactive Storytelling.
Comput. Entertain., 2016

2015
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks.
Secur. Commun. Networks, 2015

Fair signature exchange via delegation on ubiquitous networks.
J. Comput. Syst. Sci., 2015

Hosting critical infrastructure services in the cloud environment considerations.
Int. J. Crit. Infrastructures, 2015

Survey of solutions for Peer-to-Peer MMOGs.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
Communication Challenges and Solutions in the Smart Grid
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4939-2184-3, 2014

Monitoring Threats to Composite Services within the Aniketos Run-Time Framework.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Creating human digital memories with the aid of pervasive mobile devices.
Pervasive Mob. Comput., 2014

Coarticulation and speech synchronization in MPEG-4 based facial animation.
Kybernetes, 2014

An access control model for cloud computing.
J. Inf. Secur. Appl., 2014

Using behavioural observation and game technology to support critical infrastructure security.
Int. J. Syst. Syst. Eng., 2014

A Layered Communication Architecture for Power Routing in the Smart Grid.
Int. J. Inf. Technol. Web Eng., 2014

Protecting critical infrastructures through behavioural observation.
Int. J. Crit. Infrastructures, 2014

Behaviour analysis techniques for supporting critical infrastructure security.
Int. J. Crit. Infrastructures, 2014

Trends in consumer communications: networked homes [Guest Editorial].
IEEE Commun. Mag., 2014

Simulating Critical Infrastructure Cascading Failure.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

Spectrum sensing-energy tradeoff in multi-hop cluster based cooperative cognitive radio networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A Survey of Critical Infrastructure Security.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Intelligent agents for automated cloud computing negotiation.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

The Big Data Obstacle of Lifelogging.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Region adaptive digital image watermarking system using DWT-SVD algorithm.
Proceedings of the 2014 NASA/ESA Conference on Adaptive Hardware and Systems, 2014

A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014

Extending AOP Principles for the Description of Network Security Patterns.
Proceedings of the Cyberpatterns, 2014

Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014

2013
Innovative multimedia communication and services.
Telecommun. Syst., 2013

Lightweight Sybil Attack Detection in MANETs.
IEEE Syst. J., 2013

Component-based security system (COMSEC) with QoS for wireless sensor networks.
Secur. Commun. Networks, 2013

Distributed monitoring for misbehaviour detection in wireless sensor networks.
Secur. Commun. Networks, 2013

Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2013

Exploiting linked data to create rich human digital memories.
Comput. Commun., 2013

Survey and Evaluation of Mpeg-4 Based 3D Character Animation Frameworks.
Proceedings of the 5th International Conference on Games and Virtual Worlds for Serious Applications, 2013

Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Framework for Secure Service Composition.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Secure rendering process in cloud computing.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Creating human digital memories for a richer recall of life experiences.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

A novel scalable hybrid architecture for MMOG.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Considering an elastic scaling model for cloud Security.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Behavioural Observation for Critical Infrastructure Security Support.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

Misbehaviour monitoring on system-of-systems components.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
A robust region-adaptive dual image watermarking technique.
J. Vis. Commun. Image Represent., 2012

Inspired Social Spider Behavior for Secure Wireless Sensor Networks.
Int. J. Mob. Comput. Multim. Commun., 2012

Pypette: A Platform for the Evaluation of Live Digital Forensics.
Int. J. Digit. Crime Forensics, 2012

Applying dynamic separation of aspects to distributed systems security: A case study.
IET Softw., 2012

Trends in consumer communications [Series Editorial].
IEEE Commun. Mag., 2012

Trends in consumer communications: Integration, integration and integration [Series Editorial].
IEEE Commun. Mag., 2012

Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Scalable Distributed Signature Detection.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

A zone-based hierarchical framework and clustering scheme for energy-efficient Wireless Sensor Networks.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012

Multiplayer Game Technology to Manage Critical Infrastructure Protection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Framework for multi-agent planning and coordination in DIS.
Proceedings of the Workshop at SIGGRAPH Asia, 2012

A framework for measuring security of services in ubiquitous computing environments.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Managing critical infrastructures through behavioural observation.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

Augmenting human digital memories with physiological data.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

An improved energy detection scheme for cognitive radio networks in low SNR region.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

An MPEG-4 Quadric-based LoD simplification for facial animation.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

A Survey of AoIM, Distribution and Communication in Peer-To-Peer Online Games.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories.
Proceedings of IEEE International Conference on Communications, 2012

Operational Support for Critical Infrastructure Security.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

DIS planning algorithms evaluation.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Evaluation of a Quadric-Based Surface adaptive LOD for MPEG-4 FA.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Monitoring and measuring sedentary behaviour with the aid of human digital memories.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Achieving autonomous fair exchange in ubiquitous network settings.
J. Netw. Comput. Appl., 2011

Fair exchange of valuable information: A generalised framework.
J. Comput. Syst. Sci., 2011

Consumer communication applications drive network integration [Series Editorial].
IEEE Commun. Mag., 2011

A Signature Detection Scheme for Distributed Storage.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Identity management in System-of-Systems Crisis Management situation.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Managing communications complexity in the smart grid using data aggregation.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Highly Realistic MPEG-4 Compliant Facial Animation with Charisma.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

IoMANETs: Mobility architecture for wireless M2M networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Region-Adaptive Watermarking System and Its Application.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Game Based Learning Framework for Virtual 3D Dinosaurs Knowledge.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Information Flow Monitoring: Model, Policy, and Analysis.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Enhancements of the Self-Detection Scheme for Boundary Recognition in Wireless Sensor Networks.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Expanding Tele-care: Using Motion Sensors for Monitoring Purposes.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

SCCIR: Smart Cities Critical Infrastructure Response Framework.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Game based learning with Homura 3D, for dinosaurs life teaching.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Web-based hardware accelerated procedural content generation.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

The effect of direct interactions on reputation based schemes in mobile ad hoc networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

A Sensor Relocation Scheme for Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Security in Wireless Sensor Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

A Novel Intrusion Detection System for Smart Space.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Advances In Peer-To-Peer Content Search.
J. Signal Process. Syst., 2010

Future security challenges in cloud computing.
Int. J. Multim. Intell. Secur., 2010

A self-managing fault management mechanism for wireless sensor networks
CoRR, 2010

Foreword.
Comput. Commun., 2010

Consumer communication applications drive integration and convergence [Series Editorial].
IEEE Commun. Mag., 2010

Charisma: High-performance Web-based MPEG-compliant animation framework.
Comput. Entertain., 2010

Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Data Mishandling and Profile Building in Ubiquitous Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

The Application of MPEG-4 Compliant Animation to a Modern Games Engine and Animation Framework.
Proceedings of the Motion in Games - Third International Conference, 2010

Hybrid Client-Server, Peer-to-Peer framework for MMOG.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Dynamic Device Configuration in Ubiquitous Environments.
Proceedings of the Global Security, Safety, and Sustainability, 2010

Analysis of Digital Image Watermark Attacks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Visualisation of Ubiquitous Home Devices and Services.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

A Wireless Home and Body Sensor Network Platform for the Early Detection of Arthritis.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Peer-to-Peer Overlay Gateway Services for Home Automation and Management.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Body Area Networks for Movement Analysis in Physiotherapy Treatments.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Networking Middleware and Online-Deployment Mechanisms for Java-Based Games.
Trans. Edutainment, 2009

Context-Aware Identity Management in Pervasive Ad-hoc Environments.
Int. J. Adv. Pervasive Ubiquitous Comput., 2009

A framework for physical health improvement using Wireless Sensor Networks and gaming.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

A new self-detection scheme for sensor network boundary recognition.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Remote physiotherapy treatments using wireless body sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Monitoring connectivity in wireless sensor networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Homura and Net-Homura: The creation and web-based deployment of cross-platform 3D games.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Sharing and Protecting Networked Digital Life Memories.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

A Hierarchically Structured Worldwide Sensor Web Architecture.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets).
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Autonomic Networking in Wireless Sensor Networks.
Proceedings of the Autonomic Computing and Networking, 2009

2008
Interactive Storytelling: Approaches and Techniques to Achieve Dynamic Stories.
Trans. Edutainment, 2008

Managing Distributed Networked Appliances in Home Networks.
Proc. IEEE, 2008

A Hybrid Fuzzy ANN System for Agent Adaptation in a First Person Shooter.
Int. J. Comput. Games Technol., 2008

A self-organised middleware architecture for Wireless Sensor Network management.
Int. J. Ad Hoc Ubiquitous Comput., 2008

Balancing intrusion detection resources in ubiquitous computing networks.
Comput. Commun., 2008

Consumer communications and networking [guest editorial].
IEEE Commun. Mag., 2008

Virtual Environments with Content Sharing.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2008

Perceptual User Interface as Games Controller.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

Networked Appliances: Manipulation of 3D Multimedia Streams.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Fault management in wireless sensor networks.
IEEE Wirel. Commun., 2007

Harnessing the Web Technology to Enrich Visually Challenged Users Navigation.
Proceedings of the WEBIST 2007, 2007

Ad Hoc Gateway Service for Automatic Package Delivery using Networked Appliances.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Persistent Storage Middleware Service for Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

BlueBridge: A Wireless Interworking Architecture for the Ubiquitous Home.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Networked Appliances for Home Healthcare and Lifestyle Management.
Proceedings of the Home Networking, 2007

Spider-Net Zone Routing Protocol for Mobile Sink Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

On Securing MANET Routing Protocol Against Control Packet Dropping.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Improving Messaging Security in Structured P2P Overlay Networks.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Towards Energy-Efficient Intrusion Detection in Pervasive Computing.
Proceedings of IEEE International Conference on Communications, 2007

A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Bridging the Gap between Networked Appliances and Virtual Worlds.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Mobile Event Monitoring Protocol for Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Special issue on advances in consumer communications and networking.
Multim. Tools Appl., 2006

Dynamic service composition in home appliance networks.
Multim. Tools Appl., 2006

Practical and efficient fair document exchange over networks.
J. Netw. Comput. Appl., 2006

Digital Rights Management in Ubiquitous Computing.
IEEE Multim., 2006

On Peer-to-Peer Multimedia Content Access and Distribution.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
Proceedings of the Computational Science and Its Applications, 2006

Improving Game Processing in Multithreading and Multiprocessor Architecture.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A framework for intrusion detection in heterogeneous environments.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Interest management and scalability issues in P2P MMOG.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

A semantic clustering routing protocol for wireless sensor networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Higher order neural networks and their applications to financial time series prediction.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

AoIM in peer-to-peer multiplayer online games.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2006

2005
Revocation of privacy-enhanced public-key certificates.
J. Syst. Softw., 2005

Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking.
IEEE J. Sel. Areas Commun., 2005

P2P commercial digital content exchange.
Electron. Commer. Res. Appl., 2005

Agents-based modeling for a peer-to-peer MMOG architecture.
Comput. Entertain., 2005

Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Buffer Overrun Prevention Through Component Composition Analysis.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

A semantic framework for self-adaptive networked appliances.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

Emotional agent model and architecture for NPCs group control and interaction to facilitate leadership roles in computer entertainment.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2005

2004
A unified approach to a fair document exchange system.
J. Syst. Softw., 2004

Autonomous mobile agent based fair exchange.
Comput. Networks, 2004

An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Mobility and Appliance Networks - A New Mobility Model.
Proceedings of the Broadband Satellite Comunication Systems and the Challenges of Mobility, 2004

Implicit functionality: dynamic services composition for home networked appliances.
Proceedings of IEEE International Conference on Communications, 2004

A security framework for executables in a ubiquitous computing environment.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

DiDDeM: a system for early detection of TCP SYN flood attacks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
MNPA: A basis for privacy-enhanced QoS in mobile networks.
Microprocess. Microsystems, 2003

An efficient protocol for anonymous and fair document exchange.
Comput. Networks, 2003

Multi hop communication in global wireless framework.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

An Effective Bandwidth Model for Deterministic QoS Guarantees of VBR Traffic.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

NetHost-Sensor: A Novel Concept in Intrusion Detection Systems.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

DiSUS: Mobile Ad Hoc Network Unstructured Services.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

2002
The Threat From Within -An Analysis of Attacks on anInternal Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Fair-rate GPS: a new class for decoupling delay and bandwidth properties.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Network constrained smoothing: enhanced multiplexing of MPEG-4 video.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

IPMSA: integrated personal mobility services architecture.
Proceedings of the IEEE International Conference on Communications, 2002

Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Resource Allocation Scheme for Deterministic Services of Video Streams.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Cell-by-Cell Round Robin Service Discipline for ATM Networks.
Proceedings of the Networking, 2001

Requirements for a General Framework for Response to Distributed Denial-of-Service.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Advanced security techniques for network protection.
Comput. Commun., 2000

MNPA: a mobile network privacy architecture.
Comput. Commun., 2000

1999
Video-on-demand server: Strategies for improving performance.
IEE Proc. Softw., 1999

A Flexible Approach to Secure and Fair Document Exchange.
Comput. J., 1999

Video on Demand Servers: Storage Architecture with Disk Arrays.
Proceedings of the Eurographics Multimedia Workshop 1999, 1999

1998
A Multi-Tiered Classification Scheme for Component Retrieval.
Proceedings of the 24th EUROMICRO '98 Conference, 1998

1997
Achieving User Privacy in Mobile Networks.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
The World-Wide Web as Platform for Supporting Interactive Concurrent Engineering.
Proceedings of the Advances Information System Engineering, 8th International Conference, 1996

1995
Dynamically Re-configurable Distributed Multimedia Systems: An Object Based Framework.
Proceedings of the 1995 International Conference on Object Oriented Information Systems, 1995

The Design of an Object-Oriented Repository to Support Concurrent Engineering.
Proceedings of the 1995 International Conference on Object Oriented Information Systems, 1995

1990
Book reviews.
Artif. Intell. Rev., 1990

Book reviews.
Artif. Intell. Rev., 1990


  Loading...