Mohamed Hamdi
Mohamed Hamdi
University of Carthage
Verified email at - Homepage
Cited by
Cited by
Survey on VANET security challenges and possible cryptographic solutions
MN Mejri, J Ben-Othman, M Hamdi
Vehicular Communications 1 (2), 53-66, 2014
MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students
MS Hamdi
Applied Soft Computing 7 (3), 746-771, 2007
Game-based adaptive security in the Internet of Things for eHealth
M Hamdi, H Abie
2014 IEEE international conference on communications (ICC), 920-925, 2014
Improving multi-objective code-smells correction using development history
A Ouni, M Kessentini, H Sahraoui, K Inoue, MS Hamdi
Journal of Systems and Software 105, 18-39, 2015
Software engineering using artificial intelligence techniques: Current state and open problems
HH Ammar, W Abdelmoez, MS Hamdi
Proceedings of the First Taibah University International Conference on …, 2012
Detecting Denial-of-Service attacks using the wavelet transform
M Hamdi, N Boudriga
Computer Communications 30 (16), 3203-3213, 2007
A survey on security models, techniques, and tools for the internet of things
R Benabdessalem, M Hamdi, TH Kim
2014 7th International Conference on Advanced Software Engineering and Its …, 2014
Vector-lifting schemes for lossless coding and progressive archival of multispectral images
A Benazza-Benyahia, JC Pesquet, M Hamdi
IEEE Transactions on Geoscience and Remote Sensing 40 (9), 2011-2024, 2002
WHOMoVeS: An optimized broadband sensor network for military vehicle tracking
M Hamdi, N Boudriga, MS Obaidat
International Journal of Communication Systems 21 (3), 277-300, 2008
Context-aware access control and anonymous authentication in WBAN
A Arfaoui, ORM Boudia, A Kribeche, SM Senouci, M Hamdi
Computers & Security 88, 101496, 2020
A machine learning approach for big data in oil and gas pipelines
A Mohamed, MS Hamdi, S Tahar
2015 3rd International Conference on Future Internet of Things and Cloud …, 2015
A testbed for adaptive security for IoT in eHealth
Y Berhanu, H Abie, M Hamdi
Proceedings of the International Workshop on Adaptive Security, 1-8, 2013
Security of cloud computing, storage, and networking
M Hamdi
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
Computer and network security risk management: theory, challenges, and countermeasures
M Hamdi, N Boudriga
International journal of communication systems 18 (8), 763-793, 2005
Fault Analysis Attack on an FPGA AES Implementation
F Khelil, M Hamdi, S Guilley, JL Danger, N Selmane
New Technologies, Mobility and Security, 2008. NTMS'08., 1-5, 2008
MASACAD: a multiagent based approach to information customization
MS Hamdi
IEEE Intelligent Systems 21 (1), 60-67, 2006
A survey on encryption schemes in wireless sensor networks
H Hayouni, M Hamdi, TH Kim
2014 7th International Conference on Advanced Software Engineering and Its …, 2014
A multi-attribute decision model for intrusion response system
BA Fessi, S Benabdallah, N Boudriga, M Hamdi
Information Sciences 270, 237-254, 2014
Big data analytics for short and medium-term electricity load forecasting using an AI techniques ensembler
N Ayub, M Irfan, M Awais, U Ali, T Ali, M Hamdi, A Alghamdi, ...
Energies 13 (19), 5193, 2020
Algebraic specification of network security risk management
M Hamdi, N Boudriga
Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003
The system can't perform the operation now. Try again later.
Articles 1–20