Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("DEBBABI, Mourad")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 11 of 11

  • Page / 1
Export

Selection :

  • and

Game semantics model for security protocolsDEBBABI, Mourad; SALEH, Mohamed.Lecture notes in computer science. 2005, pp 125-140, issn 0302-9743, isbn 3-540-29797-9, 1Vol, 16 p.Conference Paper

A systematic approach for detecting and clustering distributed cyber scanningBOU-HARB, Elias; DEBBABI, Mourad; ASSI, Chadi et al.Computer networks (1999). 2013, Vol 57, Num 18, pp 3826-3839, issn 1389-1286, 14 p.Article

A formal verification framework for SysML activity diagramsOUCHANI, Samir; OTMANE AÏT MOHAMED; DEBBABI, Mourad et al.Expert systems with applications. 2014, Vol 41, Num 6, pp 2713-2728, issn 0957-4174, 16 p.Article

Anonymity meets game theory: secure data integration with malicious participantsMOHAMMED, Noman; FUNG, Benjamin C. M; DEBBABI, Mourad et al.The VLDB journal. 2011, Vol 20, Num 4, pp 567-588, issn 1066-8888, 22 p.Article

On fingerprinting probing activitiesBOU-HARB, Elias; DEBBABI, Mourad; ASSI, Chadi et al.Computers & security. 2014, Vol 43, pp 35-48, issn 0167-4048, 14 p.Article

Towards a formal semantics for AspectJ weavingBELBLIDIA, Nadia; DEBBABI, Mourad.Lecture notes in computer science. 2006, pp 155-171, issn 0302-9743, isbn 3-540-40927-0, 1Vol, 17 p.Conference Paper

Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité = New pointcuts and primitives for security hardening concernsMOURAD, Azzam; LAVERDIERE, Marc-André; SOEANU, Andrei et al.TSI. Technique et science informatiques. 2009, Vol 28, Num 5, pp 611-644, issn 0752-4072, 34 p.Article

A new logic for electronic commerce protocolsADI, Kamel; DEBBABI, Mourad; MEJRI, Mohamed et al.Theoretical computer science. 2003, Vol 291, Num 3, pp 223-283, issn 0304-3975, 61 p.Article

Game theoretic models for detecting network intrusionsOTROK, Hadi; MEHRANDISH, Mona; ASSI, Chadi et al.Computer communications. 2008, Vol 31, Num 10, pp 1934-1944, issn 0140-3664, 11 p.Article

Execution monitoring enforcement under memory-limitation constraintsTALHI, Chamseddine; TAWBI, Nadia; DEBBABI, Mourad et al.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 158-184, issn 0890-5401, 27 p.Conference Paper

A game-theoretic intrusion detection model for mobile ad hoc networksOTROK, Hadi; MOHAMMED, Noman; LINGYU WANG et al.Computer communications. 2008, Vol 31, Num 4, pp 708-721, issn 0140-3664, 14 p.Article

  • Page / 1