Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("OTROK, Hadi")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 15 of 15

  • Page / 1
Export

Selection :

  • and

New XACML-AspectBPEL approach for composite web services securityAYOUBI, Sara; MOURAD, Azzam; OTROK, Hadi et al.International journal of web and grid services (Print). 2013, Vol 9, Num 2, pp 127-145, issn 1741-1106, 19 p.Article

Base station selection and resource allocation in macro―femtocell networks under noisy scenarioESTRADA, Rebeca; JARRAY, Abdallah; OTROK, Hadi et al.Wireless networks. 2014, Vol 20, Num 1, pp 115-131, issn 1022-0038, 17 p.Article

A cooperative watchdog model based on Dempster―Shafer for detecting misbehaving vehiclesOMAR ABDEL WAHAB; OTROK, Hadi; MOURAD, Azzam et al.Computer communications. 2014, Vol 41, pp 43-54, issn 0140-3664, 12 p.Article

VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc NetworksOMAR ABDEL WAHAB; OTROK, Hadi; MOURAD, Azzam et al.Computer communications. 2013, Vol 36, Num 13, pp 1422-1435, issn 0140-3664, 14 p.Article

A Markov Decision Process Model for High Interaction HoneypotsHAYATLE, Osama; OTROK, Hadi; YOUSSEF, Amr et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 159-170, issn 1939-3555, 12 p.Article

A game theoretical model for collaborative groups in social applicationsAL-DHANHANI, Ahmed; MIZOUNI, Rabeb; OTROK, Hadi et al.Expert systems with applications. 2014, Vol 41, Num 11, pp 5056-5065, issn 0957-4174, 10 p.Article

Game theoretic models for detecting network intrusionsOTROK, Hadi; MEHRANDISH, Mona; ASSI, Chadi et al.Computer communications. 2008, Vol 31, Num 10, pp 1934-1944, issn 0140-3664, 11 p.Article

Energy-Efficient Resource-Allocation Model for OFDMA Macrocell/Femtocell NetworksESTRADA, Rebeca; JARRAY, Abdallah; OTROK, Hadi et al.IEEE transactions on vehicular technology. 2013, Vol 62, Num 7, pp 3429-3437, issn 0018-9545, 9 p.Article

An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocolBOYER, Stéphane; ROBERT, Jean-Marc; OTROK, Hadi et al.International journal of security and networks (Print). 2012, Vol 7, Num 2, pp 95-106, issn 1747-8405, 12 p.Article

To compete or cooperate? This is the question in communities of autonomous servicesEHSAN KHOSROWSHAHI ASL; BENTAHAR, Jamal; MIZOUNI, Rabeb et al.Expert systems with applications. 2014, Vol 41, Num 10, pp 4878-4890, issn 0957-4174, 13 p.Article

A collusion-resistant mechanism for autonomic resource management in Virtual Private NetworksNAHAR QUTTOUM, Ahmad; OTROK, Hadi; DZIONG, Zbigniew et al.Computer communications. 2010, Vol 33, Num 17, pp 2070-2078, issn 0140-3664, 9 p.Article

A Dempster―Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR ProtocolWAHAB, Omar Abdel; OTROK, Hadi; MOURAD, Azzam et al.Wireless personal communications. 2014, Vol 75, Num 3, pp 1635-1667, issn 0929-6212, 33 p.Article

Agent-based game-theoretic model for collaborative web services: Decision making analysisKHOSRAVIFAR, Babak; BENTAHAR, Jamal; MIZOUNI, Rabeb et al.Expert systems with applications. 2013, Vol 40, Num 8, pp 3207-3219, issn 0957-4174, 13 p.Article

Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR ProtocolMOATI, Nadia; OTROK, Hadi; MOURAD, Azzam et al.Wireless personal communications. 2014, Vol 75, Num 3, pp 1747-1768, issn 0929-6212, 22 p.Article

A game-theoretic intrusion detection model for mobile ad hoc networksOTROK, Hadi; MOHAMMED, Noman; LINGYU WANG et al.Computer communications. 2008, Vol 31, Num 4, pp 708-721, issn 0140-3664, 14 p.Article

  • Page / 1