Analyzing multiple logs for forensic evidence AR Arasteh, M Debbabi, A Sakha, M Saleh digital investigation 4, 82-91, 2007 | 94 | 2007 |
Security evaluation of J2ME CLDC embedded Java platform. M Debbabi, MM Saleh, C Talhi, S Zhioua J. Object Technol. 5 (2), 125-154, 2006 | 38 | 2006 |
Java for mobile devices: A security study M Debbabi, M Saleh, C Talhi, S Zhioua 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005 | 26 | 2005 |
Forensic analysis of logs: Modeling and verification M Saleh, AR Arasteh, A Sakha, M Debbabi Knowledge-Based Systems 20 (7), 671-682, 2007 | 17 | 2007 |
Security analysis of mobile Java M Debbabi, M Saleh, C Talhi, S Zhioua 16th International Workshop on Database and Expert Systems Applications …, 2005 | 17 | 2005 |
Embedded Java security: security for mobile devices M Debbabi, M Saleh, C Talhi, S Zhioua Springer Science & Business Media, 2007 | 15 | 2007 |
Mechanism design for decentralized vehicle routing problem M Saleh, A Soeanu, S Ray, M Debbabi, J Berger, A Boukhtouta Proceedings of the 27th Annual ACM Symposium on Applied Computing, 749-754, 2012 | 11 | 2012 |
Security Analysis of Wireless Java. M Debbabi, MM Saleh, C Talhi, S Zhioua PST, 2005 | 9 | 2005 |
Assessing the use of IP network management protocols in smart grids M Saleh, MA Abdou, M Aboulhassan 2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016 | 7 | 2016 |
Authentication in flat Wireless Sensor Networks with mobile nodes M Saleh, N El-Meniawy, E Sourour 2015 IEEE 12th International Conference on Networking, Sensing and Control …, 2015 | 7 | 2015 |
An Authentication Protocol for the Medical Internet of Things N El-Meniawy, MRM Rizk, MA Ahmed, M Saleh Symmetry 14 (7), 1483, 2022 | 6 | 2022 |
Impact of MD5 Authentication on Routing Traffic for the Case of: EIGRP, RIPv2 and OSPF KA Al-Saud, HM Tahir, M Saleh, M Saleh Science Publications, 2008 | 5 | 2008 |
A game-theoretic framework for specification and verification of cryptographic protocols M Saleh, M Debbabi Formal aspects of computing 22, 585-609, 2010 | 4 | 2010 |
Verifying security properties of cryptoprotocols: A novel approach M Saleh, M Debbabi Fifth IEEE International Conference on Software Engineering and Formal …, 2007 | 4 | 2007 |
Modeling security protocols as games M Saleh, M Debbabi Third International Symposium on Information Assurance and Security, 253-260, 2007 | 4 | 2007 |
Modeling Family Behavior in Crowd Simulation L Eliyan, O Halabi, M Saleh 2018 international conference on computer and applications (ICCA), 66-70, 2018 | 3 | 2018 |
A Performance Comparison of MD5 Authenticated Routing Traffic with EIGRP, RIPv2, and OSPF KA Al-Saud, H Tahir, M Saleh, M Saleh Update 9, 06, 2010 | 3 | 2010 |
Routing-guided authentication in wireless sensor networks M Saleh, N El-Meniawy, E Sourour 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor …, 2015 | 2 | 2015 |
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF K Abu Al-Saud, H Tahir, M Saleh, M Saleh INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY 7 (4), 380-387, 2010 | 2 | 2010 |
Characteristics of agent-based hierarchical diff-edf schedulability over heterogeneous real-time packet networks M Saleh, ZA Othman, M Saleh EuroJournals Publishing, Inc., 2009 | 2 | 2009 |