Segui
Mohamed Saleh
Mohamed Saleh
Email verificata su pua.edu.eg
Titolo
Citata da
Citata da
Anno
Analyzing multiple logs for forensic evidence
AR Arasteh, M Debbabi, A Sakha, M Saleh
digital investigation 4, 82-91, 2007
942007
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, MM Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
382006
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
262005
Forensic analysis of logs: Modeling and verification
M Saleh, AR Arasteh, A Sakha, M Debbabi
Knowledge-Based Systems 20 (7), 671-682, 2007
172007
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
172005
Embedded Java security: security for mobile devices
M Debbabi, M Saleh, C Talhi, S Zhioua
Springer Science & Business Media, 2007
152007
Mechanism design for decentralized vehicle routing problem
M Saleh, A Soeanu, S Ray, M Debbabi, J Berger, A Boukhtouta
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 749-754, 2012
112012
Security Analysis of Wireless Java.
M Debbabi, MM Saleh, C Talhi, S Zhioua
PST, 2005
92005
Assessing the use of IP network management protocols in smart grids
M Saleh, MA Abdou, M Aboulhassan
2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016
72016
Authentication in flat Wireless Sensor Networks with mobile nodes
M Saleh, N El-Meniawy, E Sourour
2015 IEEE 12th International Conference on Networking, Sensing and Control …, 2015
72015
An Authentication Protocol for the Medical Internet of Things
N El-Meniawy, MRM Rizk, MA Ahmed, M Saleh
Symmetry 14 (7), 1483, 2022
62022
Impact of MD5 Authentication on Routing Traffic for the Case of: EIGRP, RIPv2 and OSPF
KA Al-Saud, HM Tahir, M Saleh, M Saleh
Science Publications, 2008
52008
A game-theoretic framework for specification and verification of cryptographic protocols
M Saleh, M Debbabi
Formal aspects of computing 22, 585-609, 2010
42010
Verifying security properties of cryptoprotocols: A novel approach
M Saleh, M Debbabi
Fifth IEEE International Conference on Software Engineering and Formal …, 2007
42007
Modeling security protocols as games
M Saleh, M Debbabi
Third International Symposium on Information Assurance and Security, 253-260, 2007
42007
Modeling Family Behavior in Crowd Simulation
L Eliyan, O Halabi, M Saleh
2018 international conference on computer and applications (ICCA), 66-70, 2018
32018
A Performance Comparison of MD5 Authenticated Routing Traffic with EIGRP, RIPv2, and OSPF
KA Al-Saud, H Tahir, M Saleh, M Saleh
Update 9, 06, 2010
32010
Routing-guided authentication in wireless sensor networks
M Saleh, N El-Meniawy, E Sourour
2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor …, 2015
22015
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
K Abu Al-Saud, H Tahir, M Saleh, M Saleh
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY 7 (4), 380-387, 2010
22010
Characteristics of agent-based hierarchical diff-edf schedulability over heterogeneous real-time packet networks
M Saleh, ZA Othman, M Saleh
EuroJournals Publishing, Inc., 2009
22009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20