Survey on VANET security challenges and possible cryptographic solutions MN Mejri, J Ben-Othman, M Hamdi Vehicular Communications 1 (2), 53-66, 2014 | 680 | 2014 |
MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students MS Hamdi Applied Soft Computing 7 (3), 746-771, 2007 | 106 | 2007 |
Game-based adaptive security in the Internet of Things for eHealth M Hamdi, H Abie 2014 IEEE international conference on communications (ICC), 920-925, 2014 | 92 | 2014 |
Improving multi-objective code-smells correction using development history A Ouni, M Kessentini, H Sahraoui, K Inoue, MS Hamdi Journal of Systems and Software 105, 18-39, 2015 | 86 | 2015 |
Software engineering using artificial intelligence techniques: Current state and open problems HH Ammar, W Abdelmoez, MS Hamdi Proceedings of the First Taibah University International Conference on …, 2012 | 78 | 2012 |
Detecting Denial-of-Service attacks using the wavelet transform M Hamdi, N Boudriga Computer Communications 30 (16), 3203-3213, 2007 | 58 | 2007 |
A survey on security models, techniques, and tools for the internet of things R Benabdessalem, M Hamdi, TH Kim 2014 7th International Conference on Advanced Software Engineering and Its …, 2014 | 57 | 2014 |
Vector-lifting schemes for lossless coding and progressive archival of multispectral images A Benazza-Benyahia, JC Pesquet, M Hamdi IEEE Transactions on Geoscience and Remote Sensing 40 (9), 2011-2024, 2002 | 55 | 2002 |
WHOMoVeS: An optimized broadband sensor network for military vehicle tracking M Hamdi, N Boudriga, MS Obaidat International Journal of Communication Systems 21 (3), 277-300, 2008 | 52 | 2008 |
A machine learning approach for big data in oil and gas pipelines A Mohamed, MS Hamdi, S Tahar 2015 3rd International Conference on Future Internet of Things and Cloud …, 2015 | 49 | 2015 |
Context-aware access control and anonymous authentication in WBAN A Arfaoui, ORM Boudia, A Kribeche, SM Senouci, M Hamdi Computers & Security 88, 101496, 2020 | 48 | 2020 |
A testbed for adaptive security for IoT in eHealth Y Berhanu, H Abie, M Hamdi Proceedings of the International Workshop on Adaptive Security, 1-8, 2013 | 48 | 2013 |
Security of cloud computing, storage, and networking M Hamdi 2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012 | 46 | 2012 |
Computer and network security risk management: theory, challenges, and countermeasures M Hamdi, N Boudriga International journal of communication systems 18 (8), 763-793, 2005 | 45 | 2005 |
Fault Analysis Attack on an FPGA AES Implementation F Khelil, M Hamdi, S Guilley, JL Danger, N Selmane New Technologies, Mobility and Security, 2008. NTMS'08., 1-5, 2008 | 43 | 2008 |
MASACAD: a multiagent based approach to information customization MS Hamdi IEEE Intelligent Systems 21 (1), 60-67, 2006 | 43 | 2006 |
A survey on encryption schemes in wireless sensor networks H Hayouni, M Hamdi, TH Kim 2014 7th International Conference on Advanced Software Engineering and Its …, 2014 | 40 | 2014 |
A multi-attribute decision model for intrusion response system BA Fessi, S Benabdallah, N Boudriga, M Hamdi Information Sciences 270, 237-254, 2014 | 39 | 2014 |
Big data analytics for short and medium-term electricity load forecasting using an AI techniques ensembler N Ayub, M Irfan, M Awais, U Ali, T Ali, M Hamdi, A Alghamdi, ... Energies 13 (19), 5193, 2020 | 37 | 2020 |
Algebraic specification of network security risk management M Hamdi, N Boudriga Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 37 | 2003 |