Nabil El-Kadhi

According to our database1, Nabil El-Kadhi authored at least 25 papers between 2004 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Mobile Agents and Artificial Neural Networks for Intrusion Detection.
J. Softw., 2012

2010
An Agile Approach for Mobile applications Security.
Proceedings of the 2010 International Conference on Security & Management, 2010

Management scheme for intelligent terminals for the information super-highways.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Agent IDS based on Misuse Approach.
J. Softw., 2009

Distributed Agent Architecture for Intrusion Detection Based on New Metrics.
Proceedings of the Third International Conference on Network and System Security, 2009

Security Ontology Proposal for Mobile Applications.
Proceedings of the MDM 2009, 2009

Ontology Driven Security for Mobile Applications.
Proceedings of the 2009 International Conference on Security & Management, 2009

Artificial Neural Network for IDS Solution.
Proceedings of the 2009 International Conference on Security & Management, 2009

Towards mosques management information system.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Formal automated transformation of SDL specifications to Lotos specifications.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Towards a Mobile Applications Security Approach.
Proceedings of the 2008 International Conference on Security & Management, 2008

Formal Automated Transformation of SDL Specifications to Estelle Specifications.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008

2007
Qualitative and Quantitative Criteria for the Concept Evaluation Task.
Proceedings of the World Congress on Engineering, 2007

Relation Extraction and Validation Algorithm.
Proceedings of the Distributed Computing and Internet Technology, 2007

Intelligent Mobile Agent for Intrusion Detection System.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
WaterMed: A watermarking method for medical digital images.
J. Comput. Methods Sci. Eng., 2006

Extension and use of KMRCRelat algorithm for biological problems.
J. Comput. Methods Sci. Eng., 2006

Advanced method for cryptographic protocol verification.
J. Comput. Methods Sci. Eng., 2006

A bidirectional Bluetooth authentication scheme based on game-theoretic framwork.
Proceedings of the 2006 International Conference on Wireless Networks, 2006

2005
KMRCRelat Algorithm for finding repeated words in sequences: Application on biological sequences.
J. Comput. Methods Sci. Eng., 2005

Formal methods: Importance, experience, and comparative analysis.
J. Comput. Methods Sci. Eng., 2005

Formal method for automated testing data flow aspects of communications protocols, software, and systems specified in Lotos.
J. Comput. Methods Sci. Eng., 2005

Formal Method for Automated Transformation of Lotos Specifications to Estelle Specifications.
Int. J. Softw. Eng. Knowl. Eng., 2005

2004
Using Correlation Detection for IMA-IDS Architecture.
Proceedings of the 2nd International Conference Computing, 2004


  Loading...