


Остановите войну!
for scientists:


default search action
Madjid Merabti
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j71]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman
, Anwar Ghani
:
A community-based social P2P network for sharing human life digital memories. Trans. Emerg. Telecommun. Technol. 31(4) (2020) - [j70]William Hurst
, Aaron Boddy, Madjid Merabti, Nathan Shone:
Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking. Future Internet 12(6): 100 (2020) - [j69]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani
:
Structuring communities for sharing human digital memories in a social P2P network. Peer-to-Peer Netw. Appl. 13(5): 1629-1642 (2020) - [i2]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring Communities for Sharing Human Digital Memories in a Social P2P Network. CoRR abs/2004.08441 (2020)
2010 – 2019
- 2019
- [j68]Sohail Abbas, Madjid Merabti, Kashif Kifayat, Thar Baker
:
Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks. KSII Trans. Internet Inf. Syst. 13(12): 6214-6242 (2019) - [j67]Djedjiga Mouheb
, Sohail Abbas, Madjid Merabti:
Cybersecurity Curriculum Design: A Survey. Trans. Edutainment 15: 93-107 (2019) - 2018
- [j66]Sohail Abbas
, Mohammad Faisal
, Haseeb Ur Rahman, Muhammad Zahid Khan
, Madjid Merabti, Atta ur Rehman Khan:
Masquerading Attacks Detection in Mobile Ad Hoc Networks. IEEE Access 6: 55013-55025 (2018) - 2017
- [j65]Kuo-Kun Tseng, Jiao Lo, Yiming Liu, Shih-Hao Chang, Madjid Merabti, Felix C. K. Ng, Chun-Ho Wu:
A feasibility study of stateful automaton packet inspection for streaming application detection systems. Enterp. Inf. Syst. 11(9): 1317-1336 (2017) - [j64]Achim D. Brucker
, Bo Zhou, Francesco Malmignati, Qi Shi
, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - 2016
- [j63]Efstathios Goudoulakis, Abdennour El Rhalibi, Madjid Merabti:
A Novel Multi-Agent Planning System for Digital Interactive Storytelling. Comput. Entertain. 14(1): 3:1-3:22 (2016) - [j62]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Consumer communications and networking [Series Editorial]. IEEE Commun. Mag. 54(6): 87 (2016) - [j61]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Consumer Communications and the Next Generation Broadcast Networks. IEEE Commun. Mag. 54(12): 140 (2016) - 2015
- [j60]Áine MacDermott
, Qi Shi, Madjid Merabti, Kashif Kifayat:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [j59]Qi Shi
, Ning Zhang, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4): 615-631 (2015) - [j58]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. Secur. Commun. Networks 8(18): 4041-4052 (2015) - [c133]Sarmad A. Abdulazeez, Abdennour El Rhalibi, Madjid Merabti, Dhiya Al-Jumeily
:
Survey of solutions for Peer-to-Peer MMOGs. ICNC 2015: 1106-1110 - 2014
- [b1]Faycal Bouhafs
, Michael Mackay, Madjid Merabti:
Communication Challenges and Solutions in the Smart Grid. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4939-2183-6, pp. 1-95 - [j57]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Trends in consumer communications: networked homes [Guest Editorial]. IEEE Commun. Mag. 52(6): 184 (2014) - [j56]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Trends in consumer communications [Series Editorial]. IEEE Commun. Mag. 52(12): 142 (2014) - [j55]William Hurst
, Madjid Merabti, Shamaila Iram
, Paul Fergus
:
Protecting critical infrastructures through behavioural observation. Int. J. Crit. Infrastructures 10(2): 174-192 (2014) - [j54]William Hurst
, Madjid Merabti, Paul Fergus
:
Behaviour analysis techniques for supporting critical infrastructure security. Int. J. Crit. Infrastructures 10(3/4): 267-287 (2014) - [j53]Faycal Bouhafs
, Madjid Merabti:
A Layered Communication Architecture for Power Routing in the Smart Grid. Int. J. Inf. Technol. Web Eng. 9(1): 59-69 (2014) - [j52]Laura Pla Beltran, Madjid Merabti, William Hurst
:
Using behavioural observation and game technology to support critical infrastructure security. Int. J. Syst. Syst. Eng. 5(1): 45-67 (2014) - [j51]Younis A. Younis
, Kashif Kifayat, Madjid Merabti:
An access control model for cloud computing. J. Inf. Secur. Appl. 19(1): 45-60 (2014) - [j50]Ricardo Leandro Parreira Duarte, Abdennour El Rhalibi, Madjid Merabti:
Coarticulation and speech synchronization in MPEG-4 based facial animation. Kybernetes 43(8): 1165-1182 (2014) - [j49]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Creating human digital memories with the aid of pervasive mobile devices. Pervasive Mob. Comput. 12: 160-178 (2014) - [c132]Chunlin Song, Peng Xiao
, Sud Sudirman
, Madjid Merabti:
Region adaptive digital image watermarking system using DWT-SVD algorithm. AHS 2014: 196-201 - [c131]William Hurst
, Madjid Merabti, Paul Fergus
:
Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures. AINA Workshops 2014: 916-921 - [c130]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
The Big Data Obstacle of Lifelogging. AINA Workshops 2014: 922-926 - [c129]Faisal Alsrheed, Abdennour El Rhalibi, Martin Randles
, Madjid Merabti:
Intelligent agents for automated cloud computing negotiation. ICMCS 2014: 1169-1174 - [c128]William Hurst
, Madjid Merabti, Paul Fergus:
A Survey of Critical Infrastructure Security. Critical Infrastructure Protection 2014: 127-138 - [c127]Ahmed S. B. Kozal
, Madjid Merabti, Faycal Bouhafs
:
Spectrum sensing-energy tradeoff in multi-hop cluster based cooperative cognitive radio networks. INFOCOM Workshops 2014: 765-770 - [c126]Bashar Ahmed Alohali, Madjid Merabti, Kashif Kifayat:
A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid. NGMAST 2014: 326-330 - [c125]Áine MacDermott
, William Hurst
, Qi Shi, Madjid Merabti:
Simulating Critical Infrastructure Cascading Failure. UKSim 2014: 324-329 - [p8]David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. Cyberpatterns 2014: 73-84 - [p7]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim
, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p6]Muhammad Asim
, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - [p5]Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - [p4]Brett Lempereur, Dhouha Ayed, Muhammad Asim
, Madjid Merabti, Qi Shi:
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. Secure and Trustworthy Service Composition 2014: 173-191 - 2013
- [j48]Ali C. Begen
, Mario Kolberg, Madjid Merabti:
Trends in consumer communications: integration, integration, and integration [Series editorial]. IEEE Commun. Mag. 51(6) (2013) - [j47]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones, Faycal Bouhafs:
Exploiting linked data to create rich human digital memories. Comput. Commun. 36(15-16): 1639-1656 (2013) - [j46]Qi Shi
, Ning Zhang, Madjid Merabti, Kashif Kifayat:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [j45]Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:
Distributed monitoring for misbehaviour detection in wireless sensor networks. Secur. Commun. Networks 6(4): 388-400 (2013) - [j44]Kashif Kifayat, Madjid Merabti, Qi Shi
, Sohail Abbas
:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [j43]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. IEEE Syst. J. 7(2): 236-248 (2013) - [j42]Shiguo Lian, Madjid Merabti:
Innovative multimedia communication and services. Telecommun. Syst. 54(3): 201-202 (2013) - [c124]Bo Zhou, David Llewellyn-Jones, Qi Shi
, Muhammad Asim
, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c123]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Misbehaviour monitoring on system-of-systems components. CRiSIS 2013: 1-6 - [c122]William Hurst
, Madjid Merabti, Paul Fergus
:
Behavioural Observation for Critical Infrastructure Security Support. EMS 2013: 36-41 - [c121]Áine MacDermott
, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155 - [c120]Chris Carter, Abdennour El Rhalibi, Madjid Merabti:
A novel scalable hybrid architecture for MMOG. ICME Workshops 2013: 1-6 - [c119]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Creating human digital memories for a richer recall of life experiences. ICNSC 2013: 246-251 - [c118]Mohd Rizuan Baharon
, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. PST 2013: 82-87 - [c117]Muhammad Asim
, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - [c116]Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - [c115]Nathan Shone, Qi Shi
, Madjid Merabti, Kashif Kifayat:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. UIC/ATC 2013: 438-443 - [c114]Ricardo L. Parreira Duarte, Abdennour El Rhalibi, Chris Carter, Madjid Merabti:
Survey and Evaluation of Mpeg-4 Based 3D Character Animation Frameworks. VS-GAMES 2013: 1-8 - 2012
- [j41]Ali C. Begen
, Mario Kolberg
, Madjid Merabti:
Trends in consumer communications: Integration, integration and integration [Series Editorial]. IEEE Commun. Mag. 50(6): 132 (2012) - [j40]Ali C. Begen
, Mario Kolberg
, Madjid Merabti:
Trends in consumer communications [Series Editorial]. IEEE Commun. Mag. 50(11): 130 (2012) - [j39]Miguel García, David Llewellyn-Jones, Francisco Ortin
, Madjid Merabti:
Applying dynamic separation of aspects to distributed systems security: A case study. IET Softw. 6(3): 231-248 (2012) - [j38]Brett Lempereur, Madjid Merabti, Qi Shi
:
Pypette: A Platform for the Evaluation of Live Digital Forensics. Int. J. Digit. Crime Forensics 4(4): 31-46 (2012) - [j37]Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:
Inspired Social Spider Behavior for Secure Wireless Sensor Networks. Int. J. Mob. Comput. Multim. Commun. 4(4): 1-10 (2012) - [j36]Chunlin Song, Sud Sudirman
, Madjid Merabti:
A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3): 549-568 (2012) - [c113]Chelsea Dobbins
, Paul Fergus
, Madjid Merabti, David Llewellyn-Jones:
Monitoring and measuring sedentary behaviour with the aid of human digital memories. CCNC 2012: 395-398 - [c112]Abdennour El Rhalibi, Efstathios Goudoulakis, Madjid Merabti:
DIS planning algorithms evaluation. CCNC 2012: 492-496 - [c111]Abdennour El Rhalibi, Ricardo L. Parreira Duarte, Chris Carter, Simon Cooper, Madjid Merabti:
Evaluation of a Quadric-Based Surface adaptive LOD for MPEG-4 FA. CCNC 2012: 497-501 - [c110]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim
, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - [c109]William Hurst
, Madjid Merabti, Paul Fergus
:
Operational Support for Critical Infrastructure Security. HPCC-ICESS 2012: 1473-1478 - [c108]Chelsea Dobbins
, Paul Fergus
, Madjid Merabti, David Llewellyn-Jones:
Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories. ICC 2012: 6101-6105 - [c107]Chris Carter, Abdennour El Rhalibi, Madjid Merabti:
A Survey of AoIM, Distribution and Communication in Peer-To-Peer Online Games. ICCCN 2012: 1-5 - [c106]Ricardo Leandro Parreira Duarte, Abdennour El Rhalibi, Christopher Carter, Simon Cooper, Madjid Merabti:
An MPEG-4 Quadric-based LoD simplification for facial animation. ICMCS 2012: 743-748 - [c105]Ahmed S. B. Kozal
, Madjid Merabti, Faycal Bouhafs
:
An improved energy detection scheme for cognitive radio networks in low SNR region. ISCC 2012: 684-689 - [c104]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Augmenting human digital memories with physiological data. NESEA 2012: 1-7 - [c103]William Hurst
, Madjid Merabti, Paul Fergus
:
Managing critical infrastructures through behavioural observation. NESEA 2012: 1-6 - [c102]Chelsea Dobbins
, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones:
Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services. PerCom Workshops 2012: 64-69 - [c101]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - [c100]Efstathios Goudoulakis, Abdennour El Rhalibi, Madjid Merabti, A. Taleb-Bendiab:
Framework for multi-agent planning and coordination in DIS. WASA 2012: 65-71 - [c99]Laura Pla Beltran, Madjid Merabti, Qi Shi
:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. TrustCom 2012: 549-556 - [c98]Muhammad Zahid Khan, Madjid Merabti, Bob Askwith, Faycal Bouhafs
:
A zone-based hierarchical framework and clustering scheme for energy-efficient Wireless Sensor Networks. Wireless Days 2012: 1-8 - [c97]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
Scalable Distributed Signature Detection. WDFIA 2012: 27-37 - [c96]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques. WDFIA 2012: 87-96 - 2011
- [j35]Ali C. Begen
, Mario Kolberg
, Madjid Merabti, Stan Moyer:
Consumer communication applications drive network integration [Series Editorial]. IEEE Commun. Mag. 49(11): 164-165 (2011) - [j34]Qi Shi
, Ning Zhang, Madjid Merabti:
Fair exchange of valuable information: A generalised framework. J. Comput. Syst. Sci. 77(2): 348-371 (2011) - [j33]Qi Shi
, Ning Zhang, Madjid Merabti, Robert Askwith:
Achieving autonomous fair exchange in ubiquitous network settings. J. Netw. Comput. Appl. 34(2): 653-667 (2011) - [c95]Muhammad Asim
, Hala M. Mokhtar, Muhammad Zahid Khan, Madjid Merabti:
A Sensor Relocation Scheme for Wireless Sensor Networks. AINA Workshops 2011: 808-813 - [c94]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones:
The effect of direct interactions on reputation based schemes in mobile ad hoc networks. CCNC 2011: 297-302 - [c93]Abdennour El Rhalibi, Madjid Merabti, Ruwei Yun, Dan Liu:
Game based learning with Homura 3D, for dinosaurs life teaching. CCNC 2011: 332-336 - [c92]Abdennour El Rhalibi, Simon Cooper, Chris Carter, Madjid Merabti, Jon Wetherall:
Web-based hardware accelerated procedural content generation. CCNC 2011: 368-372 - [c91]Paul Fergus
, Mark Taylor, Madjid Merabti, John Haggerty, L. Bracegirdle:
Expanding Tele-care: Using Motion Sensors for Monitoring Purposes. DeSE 2011: 19-23 - [c90]Chunlin Song, Sud Sudirman
, Madjid Merabti, Dhiya Al-Jumeily
:
Region-Adaptive Watermarking System and Its Application. DeSE 2011: 215-220 - [c89]Brett Lempereur, Madjid Merabti, Qi Shi:
Information Flow Monitoring: Model, Policy, and Analysis. DeSE 2011: 227-232 - [c88]Abdennour El Rhalibi, Madjid Merabti, Ruwei Yun, Dan Liu:
Game Based Learning Framework for Virtual 3D Dinosaurs Knowledge. DeSE 2011: 419-424 - [c87]Ijaz Muhammad Khan, Muhammad Zahid Khan, Hala M. Mokhtar, Madjid Merabti:
Enhancements of the Self-Detection Scheme for Boundary Recognition in Wireless Sensor Networks. DeSE 2011: 448-453 - [c86]Andrew Attwood, Madjid Merabti, Paul Fergus
, Omar Abuelma'atti:
SCCIR: Smart Cities Critical Infrastructure Response Framework. DeSE 2011: 460-464 - [c85]Andrew Attwood, Madjid Merabti, Omar Abuelma'atti:
IoMANETs: Mobility architecture for wireless M2M networks. GLOBECOM Workshops 2011: 399-404 - [c84]Abdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti:
Highly Realistic MPEG-4 Compliant Facial Animation with Charisma. ICCCN 2011: 1-6 - [c83]Faycal Bouhafs
, Madjid Merabti:
Managing communications complexity in the smart grid using data aggregation. IWCMC 2011: 1315-1320 - [c82]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - [c81]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
A Signature Detection Scheme for Distributed Storage. WDFIA 2011: 122-132 - 2010
- [j32]Abdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti, Marc Price:
Charisma: High-performance Web-based MPEG-compliant animation framework. Comput. Entertain. 8(2): 8:1-8:15 (2010) - [j31]Mario Kolberg
, Madjid Merabti, Stan Moyer:
Consumer communication applications drive integration and convergence [Series Editorial]. IEEE Commun. Mag. 48(12): 24 (2010) - [j30]Demetres D. Kouvatsos, Madjid Merabti:
Foreword. Comput. Commun. 33(Supplement-1): S1-S2 (2010) - [j29]Kashif Kifayat, Madjid Merabti, Qi Shi:
Future security challenges in cloud computing. Int. J. Multim. Intell. Secur. 1(4): 428-442 (2010) - [j28]Madjid Merabti, Zhu Liu, Heather Yu, Deepa Kundur:
Advances In Peer-To-Peer Content Search. J. Signal Process. Syst. 59(3): 309-318 (2010) - [c80]Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:
A Causal Model Method for Fault Diagnosis in Wireless Sensor Networks. CIT 2010: 155-162 - [c79]Kashif Kifayat, Paul Fergus
, Simon Cooper, Madjid Merabti:
Body Area Networks for Movement Analysis in Physiotherapy Treatments. AINA Workshops 2010: 866-872 - [c78]Arshad Muhammad
, Paul Fergus
, Madjid Merabti, Bob Askwith:
Peer-to-Peer Overlay Gateway Services for Home Automation and Management. AINA Workshops 2010: 880-886 - [c77]Arshad Haroon, Paul Fergus
, Amjad Shaheed, Madjid Merabti:
A Wireless Home and Body Sensor Network Platform for the Early Detection of Arthritis. CCNC 2010: 1-5 - [c76]Amjad Shaheed, Paul Fergus
, Omar Abuelma'atti, Madjid Merabti:
Visualisation of Ubiquitous Home Devices and Services. CCNC 2010: 1-5 - [c75]Chunlin Song, Sud Sudirman
, Madjid Merabti, David Llewellyn-Jones:
Analysis of Digital Image Watermark Attacks. CCNC 2010: 1-5 - [c74]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Dynamic Device Configuration in Ubiquitous Environments. ICGS3 2010: 263-273 - [c73]Chris Carter, Abdennour El Rhalibi, Madjid Merabti, A. Taleb-Bendiab:
Hybrid Client-Server, Peer-to-Peer framework for MMOG. ICME 2010: 1558-1563 - [c72]Chris Carter, Simon Cooper, Abdennour El Rhalibi, Madjid Merabti:
The Application of MPEG-4 Compliant Animation to a Modern Games Engine and Animation Framework. MIG 2010: 326-338 - [c71]Abdullahi Arabo, Qi Shi
, Madjid Merabti:
Data Mishandling and Profile Building in Ubiquitous Environments. SocialCom/PASSAT 2010: 1056-1063 - [c70]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [c69]Sohail Abbas
, Madjid Merabti, David Llewellyn-Jones:
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks. Wireless Days 2010: 1-6 - [p3]Bo Zhou, Qi Shi, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 307-333 - [p2]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552 - [i1]Muhammad Asim, Hala M. Mokhtar, Madjid Merabti:
A self-managing fault management mechanism for wireless sensor networks. CoRR abs/1011.5072 (2010)
2000 – 2009
- 2009
- [j27]