Search

Your search keyword '"Mohamed Mosbah"' showing total 51 results

Search Constraints

Start Over You searched for: Author "Mohamed Mosbah" Remove constraint Author: "Mohamed Mosbah" Publisher ieee Remove constraint Publisher: ieee
51 results on '"Mohamed Mosbah"'

Search Results

1. SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks

10. End-to-End Network Slicing for ITS-G5 Vehicular Communications

11. Implementation and Assessment of IEEE 802.11BD for Improved Road Safety

13. On the Application of Machine Learning for Cut-in Maneuver Recognition in Platooning Scenarios

14. A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning

15. A Comprehensive Survey on Broadcasting Emergency Messages

16. An Evaluative Review of the Formal Verification for VANET Protocols

17. Data Gathering for Internet of Vehicles Safety

18. Proving Distributed Algorithms for Wireless Sensor Networks by Combining Refinement and Local Computations

19. SniffDroid: Detection of Inter-App Privacy Leaks in Android

20. Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks

21. A correct-by-construction approach for proving distributed algorithms in spanning trees

22. A broadcast authentication scheme in IoT environments

23. NDRECT: Node-disjoint routes establishment for critical traffic in WSNs

24. A Refinement-Based Approach for Proving Distributed Algorithms on Evolving Graphs

25. Study of context-awareness efficiency applied to duty cycled wireless sensor networks

26. Fast synchronisation protocol with collision handling for wireless ad hoc networks

27. Distributed Computation and Maintenance of a Spanning Tree in Dynamic Networks by Mobile Agents

28. Towards a General Framework for Ensuring and Reusing Proofs of Termination Detection in Distributed Computing

29. A formal pattern for dynamic networks through evolving graphs

30. A secure authentication mechanism for resource constrained devices

32. ECAB: An Efficient Context-Aware multi-hop Broadcasting protocol for wireless sensor networks

33. Enhanced LEAP authentication delay for higher immunity against DoS attack

34. ViSiDiA: A Java Framework for Designing, Simulating, and Visualizing Distributed Algorithms

35. Enhancing Proofs of Local Computations through Formal Event-B Modularization

36. Greedy Flooding in Redoubtable Sensor Networks

37. MASS: An efficient and secure broadcast authentication scheme for resource constrained devices

38. A Multipath Layered Cluster Based Routing for Ad Hoc Networks

39. An optimized layered cluster-based routing protocol for ad hoc networks

40. Modeling Source Authentication Protocols in Wireless Sensor Networks Using HLPSL

41. A layered cluster based routing for an ad hoc environment

42. A dynamic power saving mechanism

43. A formal security framework for mobile agent systems: Specification and verification

44. Electing a leader in the local computation model using mobile agents

47. A Domain Specific Language for Securing Distributed Systems

48. A Formal Approach to prevent Attacks on Mobile Agent Systems

49. A Conceptual Model for Secure Mobile Agent Systems

Catalog

Books, media, physical & digital resources