


Остановите войну!
for scientists:
Madjid Merabti
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j70]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman
, Anwar Ghani
:
A community-based social P2P network for sharing human life digital memories. Trans. Emerg. Telecommun. Technol. 31(4) (2020) - [j69]William Hurst
, Aaron Boddy, Madjid Merabti, Nathan Shone:
Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking. Future Internet 12(6): 100 (2020) - [j68]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani
:
Structuring communities for sharing human digital memories in a social P2P network. Peer-to-Peer Netw. Appl. 13(5): 1629-1642 (2020) - [i2]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring Communities for Sharing Human Digital Memories in a Social P2P Network. CoRR abs/2004.08441 (2020)
2010 – 2019
- 2019
- [j67]Djedjiga Mouheb, Sohail Abbas, Madjid Merabti:
Cybersecurity Curriculum Design: A Survey. Trans. Edutainment 15: 93-107 (2019) - 2018
- [j66]Sohail Abbas
, Mohammad Faisal
, Haseeb Ur Rahman, Muhammad Zahid Khan, Madjid Merabti, Atta ur Rehman Khan:
Masquerading Attacks Detection in Mobile Ad Hoc Networks. IEEE Access 6: 55013-55025 (2018) - 2017
- [j65]Kuo-Kun Tseng, Jiao Lo, Yiming Liu, Shih-Hao Chang, Madjid Merabti, Felix C. K. Ng, Chun-Ho Wu:
A feasibility study of stateful automaton packet inspection for streaming application detection systems. Enterp. Inf. Syst. 11(9): 1317-1336 (2017) - [j64]Achim D. Brucker
, Bo Zhou, Francesco Malmignati, Qi Shi
, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - 2016
- [j63]Efstathios Goudoulakis, Abdennour El Rhalibi, Madjid Merabti:
A Novel Multi-Agent Planning System for Digital Interactive Storytelling. Comput. Entertain. 14(1): 3:1-3:22 (2016) - [j62]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Consumer communications and networking [Series Editorial]. IEEE Commun. Mag. 54(6): 87 (2016) - [j61]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Consumer Communications and the Next Generation Broadcast Networks. IEEE Commun. Mag. 54(12): 140 (2016) - 2015
- [j60]Áine MacDermott
, Qi Shi, Madjid Merabti, Kashif Kifayat:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [j59]Qi Shi
, Ning Zhang, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4): 615-631 (2015) - [j58]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. Secur. Commun. Networks 8(18): 4041-4052 (2015) - [c133]Sarmad A. Abdulazeez, Abdennour El Rhalibi, Madjid Merabti, Dhiya Al-Jumeily
:
Survey of solutions for Peer-to-Peer MMOGs. ICNC 2015: 1106-1110 - 2014
- [b1]Faycal Bouhafs
, Michael Mackay, Madjid Merabti:
Communication Challenges and Solutions in the Smart Grid. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4939-2183-6, pp. 1-95 - [j57]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Trends in consumer communications: networked homes [Guest Editorial]. IEEE Commun. Mag. 52(6): 184 (2014) - [j56]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Trends in consumer communications [Series Editorial]. IEEE Commun. Mag. 52(12): 142 (2014) - [j55]William Hurst
, Madjid Merabti, Shamaila Iram
, Paul Fergus
:
Protecting critical infrastructures through behavioural observation. Int. J. Crit. Infrastructures 10(2): 174-192 (2014) - [j54]William Hurst
, Madjid Merabti, Paul Fergus
:
Behaviour analysis techniques for supporting critical infrastructure security. Int. J. Crit. Infrastructures 10(3/4): 267-287 (2014) - [j53]Faycal Bouhafs
, Madjid Merabti:
A Layered Communication Architecture for Power Routing in the Smart Grid. Int. J. Inf. Technol. Web Eng. 9(1): 59-69 (2014) - [j52]Laura Pla Beltran, Madjid Merabti, William Hurst
:
Using behavioural observation and game technology to support critical infrastructure security. Int. J. Syst. Syst. Eng. 5(1): 45-67 (2014) - [j51]Younis A. Younis, Kashif Kifayat, Madjid Merabti:
An access control model for cloud computing. J. Inf. Secur. Appl. 19(1): 45-60 (2014) - [j50]Ricardo Leandro Parreira Duarte, Abdennour El Rhalibi, Madjid Merabti:
Coarticulation and speech synchronization in MPEG-4 based facial animation. Kybernetes 43(8): 1165-1182 (2014) - [j49]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Creating human digital memories with the aid of pervasive mobile devices. Pervasive Mob. Comput. 12: 160-178 (2014) - [c132]Chunlin Song, Peng Xiao
, Sud Sudirman
, Madjid Merabti:
Region adaptive digital image watermarking system using DWT-SVD algorithm. AHS 2014: 196-201 - [c131]William Hurst
, Madjid Merabti, Paul Fergus
:
Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures. AINA Workshops 2014: 916-921 - [c130]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
The Big Data Obstacle of Lifelogging. AINA Workshops 2014: 922-926 - [c129]Faisal Alsrheed, Abdennour El Rhalibi, Martin Randles
, Madjid Merabti:
Intelligent agents for automated cloud computing negotiation. ICMCS 2014: 1169-1174 - [c128]William Hurst
, Madjid Merabti, Paul Fergus:
A Survey of Critical Infrastructure Security. Critical Infrastructure Protection 2014: 127-138 - [c127]Ahmed S. B. Kozal
, Madjid Merabti, Faycal Bouhafs
:
Spectrum sensing-energy tradeoff in multi-hop cluster based cooperative cognitive radio networks. INFOCOM Workshops 2014: 765-770 - [c126]Bashar Ahmed Alohali, Madjid Merabti, Kashif Kifayat:
A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid. NGMAST 2014: 326-330 - [c125]Áine MacDermott
, William Hurst
, Qi Shi, Madjid Merabti:
Simulating Critical Infrastructure Cascading Failure. UKSim 2014: 324-329 - [p8]David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. Cyberpatterns 2014: 73-84 - [p7]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p6]Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - [p5]Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - [p4]Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi:
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. Secure and Trustworthy Service Composition 2014: 173-191 - 2013
- [j48]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Trends in consumer communications: integration, integration, and integration [Series editorial]. IEEE Commun. Mag. 51(6) (2013) - [j47]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones, Faycal Bouhafs:
Exploiting linked data to create rich human digital memories. Comput. Commun. 36(15-16): 1639-1656 (2013) - [j46]Qi Shi
, Ning Zhang, Madjid Merabti, Kashif Kifayat:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [j45]Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:
Distributed monitoring for misbehaviour detection in wireless sensor networks. Secur. Commun. Networks 6(4): 388-400 (2013) - [j44]Kashif Kifayat, Madjid Merabti, Qi Shi
, Sohail Abbas
:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [j43]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. IEEE Syst. J. 7(2): 236-248 (2013) - [j42]Shiguo Lian, Madjid Merabti:
Innovative multimedia communication and services. Telecommun. Syst. 54(3): 201-202 (2013) - [c124]Bo Zhou, David Llewellyn-Jones, Qi Shi
, Muhammad Asim, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c123]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Misbehaviour monitoring on system-of-systems components. CRiSIS 2013: 1-6 - [c122]William Hurst
, Madjid Merabti, Paul Fergus
:
Behavioural Observation for Critical Infrastructure Security Support. EMS 2013: 36-41 - [c121]Áine MacDermott
, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155 - [c120]Chris Carter, Abdennour El Rhalibi, Madjid Merabti:
A novel scalable hybrid architecture for MMOG. ICME Workshops 2013: 1-6 - [c119]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Creating human digital memories for a richer recall of life experiences. ICNSC 2013: 246-251 - [c118]Mohd Rizuan Baharon
, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. PST 2013: 82-87 - [c117]Muhammad Asim, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - [c116]Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - [c115]Nathan Shone, Qi Shi
, Madjid Merabti, Kashif Kifayat:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. UIC/ATC 2013: 438-443 - [c114]Ricardo L. Parreira Duarte, Abdennour El Rhalibi, Chris Carter, Madjid Merabti:
Survey and Evaluation of Mpeg-4 Based 3D Character Animation Frameworks. VS-GAMES 2013: 1-8 - 2012
- [j41]Ali C. Begen
, Mario Kolberg
, Madjid Merabti:
Trends in consumer communications: Integration, integration and integration [Series Editorial]. IEEE Commun. Mag. 50(6): 132 (2012) - [j40]Ali C. Begen
, Mario Kolberg
, Madjid Merabti:
Trends in consumer communications [Series Editorial]. IEEE Commun. Mag. 50(11): 130 (2012) - [j39]Miguel García, David Llewellyn-Jones, Francisco Ortin
, Madjid Merabti:
Applying dynamic separation of aspects to distributed systems security: A case study. IET Softw. 6(3): 231-248 (2012) - [j38]Brett Lempereur, Madjid Merabti, Qi Shi
:
Pypette: A Platform for the Evaluation of Live Digital Forensics. Int. J. Digit. Crime Forensics 4(4): 31-46 (2012) - [j37]Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:
Inspired Social Spider Behavior for Secure Wireless Sensor Networks. Int. J. Mob. Comput. Multim. Commun. 4(4): 1-10 (2012) - [j36]Chunlin Song, Sud Sudirman
, Madjid Merabti:
A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3): 549-568 (2012) - [c113]Chelsea Dobbins
, Paul Fergus
, Madjid Merabti, David Llewellyn-Jones:
Monitoring and measuring sedentary behaviour with the aid of human digital memories. CCNC 2012: 395-398 - [c112]Abdennour El Rhalibi, Efstathios Goudoulakis, Madjid Merabti:
DIS planning algorithms evaluation. CCNC 2012: 492-496 - [c111]Abdennour El Rhalibi, Ricardo L. Parreira Duarte, Chris Carter, Simon Cooper, Madjid Merabti:
Evaluation of a Quadric-Based Surface adaptive LOD for MPEG-4 FA. CCNC 2012: 497-501 - [c110]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - [c109]William Hurst
, Madjid Merabti, Paul Fergus
:
Operational Support for Critical Infrastructure Security. HPCC-ICESS 2012: 1473-1478 - [c108]Chelsea Dobbins
, Paul Fergus
, Madjid Merabti, David Llewellyn-Jones:
Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories. ICC 2012: 6101-6105 - [c107]Chris Carter, Abdennour El Rhalibi, Madjid Merabti:
A Survey of AoIM, Distribution and Communication in Peer-To-Peer Online Games. ICCCN 2012: 1-5 - [c106]Ricardo Leandro Parreira Duarte, Abdennour El Rhalibi, Christopher Carter, Simon Cooper, Madjid Merabti:
An MPEG-4 Quadric-based LoD simplification for facial animation. ICMCS 2012: 743-748 - [c105]Ahmed S. B. Kozal
, Madjid Merabti, Faycal Bouhafs
:
An improved energy detection scheme for cognitive radio networks in low SNR region. ISCC 2012: 684-689 - [c104]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Augmenting human digital memories with physiological data. NESEA 2012: 1-7 - [c103]William Hurst
, Madjid Merabti, Paul Fergus
:
Managing critical infrastructures through behavioural observation. NESEA 2012: 1-6 - [c102]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services. PerCom Workshops 2012: 64-69 - [c101]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - [c100]Efstathios Goudoulakis, Abdennour El Rhalibi, Madjid Merabti, A. Taleb-Bendiab:
Framework for multi-agent planning and coordination in DIS. WASA 2012: 65-71 - [c99]Laura Pla Beltran, Madjid Merabti, Qi Shi:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. TrustCom 2012: 549-556 - [c98]Muhammad Zahid Khan, Madjid Merabti, Bob Askwith, Faycal Bouhafs
:
A zone-based hierarchical framework and clustering scheme for energy-efficient Wireless Sensor Networks. Wireless Days 2012: 1-8 - [c97]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
Scalable Distributed Signature Detection. WDFIA 2012: 27-37 - [c96]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques. WDFIA 2012: 87-96 - 2011
- [j35]Ali C. Begen
, Mario Kolberg
, Madjid Merabti, Stan Moyer:
Consumer communication applications drive network integration [Series Editorial]. IEEE Commun. Mag. 49(11): 164-165 (2011) - [j34]Qi Shi
, Ning Zhang, Madjid Merabti:
Fair exchange of valuable information: A generalised framework. J. Comput. Syst. Sci. 77(2): 348-371 (2011) - [j33]Qi Shi
, Ning Zhang, Madjid Merabti, Robert Askwith:
Achieving autonomous fair exchange in ubiquitous network settings. J. Netw. Comput. Appl. 34(2): 653-667 (2011) - [c95]Muhammad Asim, Hala M. Mokhtar, Muhammad Zahid Khan, Madjid Merabti:
A Sensor Relocation Scheme for Wireless Sensor Networks. AINA Workshops 2011: 808-813 - [c94]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones:
The effect of direct interactions on reputation based schemes in mobile ad hoc networks. CCNC 2011: 297-302 - [c93]Abdennour El Rhalibi, Madjid Merabti, Ruwei Yun, Dan Liu:
Game based learning with Homura 3D, for dinosaurs life teaching. CCNC 2011: 332-336 - [c92]Abdennour El Rhalibi, Simon Cooper, Chris Carter, Madjid Merabti, Jon Wetherall:
Web-based hardware accelerated procedural content generation. CCNC 2011: 368-372 - [c91]Paul Fergus
, Mark Taylor, Madjid Merabti, John Haggerty, L. Bracegirdle:
Expanding Tele-care: Using Motion Sensors for Monitoring Purposes. DeSE 2011: 19-23 - [c90]Chunlin Song, Sud Sudirman
, Madjid Merabti, Dhiya Al-Jumeily
:
Region-Adaptive Watermarking System and Its Application. DeSE 2011: 215-220 - [c89]Brett Lempereur, Madjid Merabti, Qi Shi:
Information Flow Monitoring: Model, Policy, and Analysis. DeSE 2011: 227-232 - [c88]Abdennour El Rhalibi, Madjid Merabti, Ruwei Yun, Dan Liu:
Game Based Learning Framework for Virtual 3D Dinosaurs Knowledge. DeSE 2011: 419-424 - [c87]Ijaz Muhammad Khan, Muhammad Zahid Khan, Hala M. Mokhtar, Madjid Merabti:
Enhancements of the Self-Detection Scheme for Boundary Recognition in Wireless Sensor Networks. DeSE 2011: 448-453 - [c86]Andrew Attwood, Madjid Merabti, Paul Fergus
, Omar Abuelma'atti:
SCCIR: Smart Cities Critical Infrastructure Response Framework. DeSE 2011: 460-464 - [c85]Andrew Attwood, Madjid Merabti, Omar Abuelma'atti:
IoMANETs: Mobility architecture for wireless M2M networks. GLOBECOM Workshops 2011: 399-404 - [c84]Abdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti:
Highly Realistic MPEG-4 Compliant Facial Animation with Charisma. ICCCN 2011: 1-6 - [c83]Faycal Bouhafs
, Madjid Merabti:
Managing communications complexity in the smart grid using data aggregation. IWCMC 2011: 1315-1320 - [c82]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - [c81]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
A Signature Detection Scheme for Distributed Storage. WDFIA 2011: 122-132 - 2010
- [j32]Abdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti, Marc Price:
Charisma: High-performance Web-based MPEG-compliant animation framework. Comput. Entertain. 8(2): 8:1-8:15 (2010) - [j31]Mario Kolberg
, Madjid Merabti, Stan Moyer:
Consumer communication applications drive integration and convergence [Series Editorial]. IEEE Commun. Mag. 48(12): 24 (2010) - [j30]Demetres D. Kouvatsos, Madjid Merabti:
Foreword. Comput. Commun. 33(Supplement-1): S1-S2 (2010) - [j29]Kashif Kifayat, Madjid Merabti, Qi Shi:
Future security challenges in cloud computing. Int. J. Multim. Intell. Secur. 1(4): 428-442 (2010) - [j28]Madjid Merabti, Zhu Liu, Heather Yu, Deepa Kundur:
Advances In Peer-To-Peer Content Search. J. Signal Process. Syst. 59(3): 309-318 (2010) - [c80]Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:
A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. CIT 2010: 155-162 - [c79]Kashif Kifayat, Paul Fergus
, Simon Cooper, Madjid Merabti:
Body Area Networks for Movement Analysis in Physiotherapy Treatments. AINA Workshops 2010: 866-872 - [c78]Arshad Muhammad
, Paul Fergus
, Madjid Merabti, Bob Askwith:
Peer-to-Peer Overlay Gateway Services for Home Automation and Management. AINA Workshops 2010: 880-886 - [c77]Arshad Haroon, Paul Fergus
, Amjad Shaheed, Madjid Merabti:
A Wireless Home and Body Sensor Network Platform for the Early Detection of Arthritis. CCNC 2010: 1-5 - [c76]Amjad Shaheed, Paul Fergus
, Omar Abuelma'atti, Madjid Merabti:
Visualisation of Ubiquitous Home Devices and Services. CCNC 2010: 1-5 - [c75]Chunlin Song, Sud Sudirman
, Madjid Merabti, David Llewellyn-Jones:
Analysis of Digital Image Watermark Attacks. CCNC 2010: 1-5 - [c74]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Dynamic Device Configuration in Ubiquitous Environments. ICGS3 2010: 263-273 - [c73]Chris Carter, Abdennour El Rhalibi, Madjid Merabti, A. Taleb-Bendiab:
Hybrid Client-Server, Peer-to-Peer framework for MMOG. ICME 2010: 1558-1563 - [c72]Chris Carter, Simon Cooper, Abdennour El Rhalibi, Madjid Merabti:
The Application of MPEG-4 Compliant Animation to a Modern Games Engine and Animation Framework. MIG 2010: 326-338 - [c71]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Data Mishandling and Profile Building in Ubiquitous Environments. SocialCom/PASSAT 2010: 1056-1063 - [c70]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [c69]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones:
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks. Wireless Days 2010: 1-6 - [p3]Bo Zhou, Qi Shi, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 307-333 - [p2]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552 - [i1]Muhammad Asim, Hala M. Mokhtar, Madjid Merabti:
A self-managing fault management mechanism for wireless sensor networks. CoRR abs/1011.5072 (2010)
2000 – 2009
- 2009
- [j27]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Context-Aware Identity Management in Pervasive Ad-hoc Environments. Int. J. Adv. Pervasive Ubiquitous Comput. 1(4): 29-42 (2009) - [j26]Chris Carter, Abdennour El Rhalibi, Madjid Merabti, Marc Price:
Networking Middleware and Online-Deployment Mechanisms for Java-Based Games. Trans. Edutainment 2: 19-32 (2009) - [c68]Ian Rhead, Madjid Merabti, Hala M. Mokhtar, Paul Fergus
:
A Hierarchically Structured Worldwide Sensor Web Architecture. AINA Workshops 2009: 570-575 - [c67]