Mohamed Mostafa Saleh

Orcid: 0000-0001-7981-8187

According to our database1, Mohamed Mostafa Saleh authored at least 20 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Optimal proactive monitor placement & scheduling for IoT networks.
J. Oper. Res. Soc., 2022

BinHOA: Efficient Binary Horse Herd Optimization Method for Feature Selection: Analysis and Validations.
IEEE Access, 2022

2021
An Improved Equilibrium Optimizer Algorithm for Features Selection: Methods and Analysis.
IEEE Access, 2021

2019
Solving Constrained Non-linear Integer and Mixed-Integer Global Optimization Problems Using Enhanced Directed Differential Evolution Algorithm.
Proceedings of the Machine Learning Paradigms: Theory and Application, 2019

Enhanced Directed Differential Evolution Algorithm for Solving Constrained Engineering Optimization Problems.
Int. J. Appl. Metaheuristic Comput., 2019

2018
An Energy-Efficient Multiobjective Scheduling Model for Monitoring in Internet of Things.
IEEE Internet Things J., 2018

Enhancing AGDE Algorithm Using Population Size Reduction for Global Numerical Optimization.
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2018

2016
Distributed monitoring in 6LoWPAN based Internet of Things.
Proceedings of the International Conference on Selected Topics in Mobile & Wireless Networking, 2016

2012
Mechanism design for decentralized vehicle routing problem.
Proceedings of the ACM Symposium on Applied Computing, 2012

2010
A game-theoretic framework for specification and verification of cryptographic protocols.
Formal Aspects Comput., 2010

2007
Forensic analysis of logs: Modeling and verification.
Knowl. Based Syst., 2007

Analyzing multiple logs for forensic evidence.
Digit. Investig., 2007

Verifying Security Properties of Cryptoprotocols: A Novel Approach.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

Modeling Security Protocols as Games.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Security Evaluation of J2ME CLDC Embedded Java Platform.
J. Object Technol., 2006

Common Criteria Approach to J2ME CLDC Security Requirements.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

2005
Security Analysis of Wireless Java.
Proceedings of the Third Annual Conference on Privacy, 2005

Game Semantics Model for Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2005

Security Analysis of Mobile Java.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Java for Mobile Devices: A Security Study.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005


  Loading...