
Hadi Otrok
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j73]Azzam Mourad, Hanine Tout, Omar Abdel Wahab, Hadi Otrok, Toufic Dbouk:
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection. IEEE Internet Things J. 8(2): 829-843 (2021) - 2020
- [j72]Maha Kadadha
, Rabeb Mizouni
, Shakti Singh
, Hadi Otrok
, Anis Ouali
:
ABCrowd: An Auction Mechanism on Blockchain for Spatial Crowdsourcing. IEEE Access 8: 12745-12757 (2020) - [j71]Menatalla Abououf
, Hadi Otrok, Shakti Singh
, Rabeb Mizouni
, Anis Ouali
:
A Misbehaving-Proof Game Theoretical Selection Approach for Mobile Crowd Sourcing. IEEE Access 8: 58730-58741 (2020) - [j70]Hanane Lamaazi
, Rabeb Mizouni, Shakti Singh
, Hadi Otrok
:
A Mobile Edge-Based CrowdSensing Framework for Heterogeneous IoT. IEEE Access 8: 207524-207536 (2020) - [j69]Katty Rohoden, Rebeca Estrada
, Hadi Otrok, Zbigniew Dziong:
Evolutionary game theoretical model for stable femtocells' clusters formation in HetNets. Comput. Commun. 161: 266-278 (2020) - [j68]Ehsan Khosrowshahi Asl, Jamal Bentahar
, Rebeca Estrada
, Hadi Otrok, Rabeb Mizouni, Babak Khosravifar:
Dynamic formation of service communities in the cloud under distribution and incomplete information settings. Concurr. Comput. Pract. Exp. 32(1) (2020) - [j67]Mona Taghavi, Jamal Bentahar, Hadi Otrok:
Two-stage game theoretical framework for IaaS market share dynamics. Future Gener. Comput. Syst. 102: 173-189 (2020) - [j66]Ahmad Hammoud, Azzam Mourad
, Hadi Otrok, Omar Abdel Wahab, Haidar Harmanani:
Cloud federation formation using genetic and evolutionary game theoretical models. Future Gener. Comput. Syst. 104: 92-104 (2020) - [j65]Maha Kadadha, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali:
SenseChain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers. Future Gener. Comput. Syst. 105: 650-664 (2020) - [j64]Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabeb Mizouni, Jamal Bentahar:
AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions. IEEE Internet Things Mag. 3(2): 68-73 (2020) - [j63]Omar Abdel Wahab
, Robin Cohen, Jamal Bentahar
, Hadi Otrok
, Azzam Mourad
, Gaith Rjoub:
An endorsement-based trust bootstrapping approach for newcomer cloud services. Inf. Sci. 527: 159-175 (2020) - [j62]Ahmed Alagha, Shakti Singh, Hadi Otrok, Rabeb Mizouni:
RFLS - Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications. J. Netw. Comput. Appl. 170: 102783 (2020) - [j61]Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad
, Hadi Otrok
, Nadjia Kara:
FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory. IEEE/ACM Trans. Netw. 28(4): 1779-1789 (2020) - [j60]Omar Abdel Wahab
, Jamal Bentahar
, Hadi Otrok, Azzam Mourad
:
Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud. IEEE Trans. Serv. Comput. 13(1): 114-129 (2020) - [j59]Mona Taghavi
, Jamal Bentahar
, Hadi Otrok
, Kaveh Bakhtiyari
:
A Blockchain-Based Model for Cloud Service Quality Monitoring. IEEE Trans. Serv. Comput. 13(2): 276-288 (2020) - [j58]Rebeca Estrada
, Rabeb Mizouni
, Hadi Otrok
, Anis Ouali, Jamal Bentahar
:
A Crowd-Sensing Framework for Allocation of Time-Constrained and Location-Based Tasks. IEEE Trans. Serv. Comput. 13(5): 769-785 (2020) - [c48]Hani Sami, Azzam Mourad
, Hadi Otrok, Jamal Bentahar:
FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning. IWCMC 2020: 1824-1829 - [i1]Omar Abdel Wahab, Jamal Bentahar, Robin Cohen, Hadi Otrok, Azzam Mourad:
A two-level solution to fight against dishonest opinions in recommendation-based trust systems. CoRR abs/2006.04803 (2020)
2010 – 2019
- 2019
- [j57]Menatalla Abououf
, Shakti Singh
, Hadi Otrok, Rabeb Mizouni
, Anis Ouali:
Gale-Shapley Matching Game Selection - A Framework for User Satisfaction. IEEE Access 7: 3694-3703 (2019) - [j56]Ahmed Alagha
, Shakti Singh
, Rabeb Mizouni
, Anis Ouali, Hadi Otrok:
Data-Driven Dynamic Active Node Selection for Event Localization in IoT Applications - A Case Study of Radiation Localization. IEEE Access 7: 16168-16183 (2019) - [j55]Katty Rohoden
, Rebeca Estrada
, Hadi Otrok
, Zbigniew Dziong
:
Stable femtocells cluster formation and resource allocation based on cooperative game theory. Comput. Commun. 134: 30-41 (2019) - [j54]Ahmed Suliman, Hadi Otrok, Rabeb Mizouni, Shakti Singh, Anis Ouali:
A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensing. Future Gener. Comput. Syst. 101: 1158-1167 (2019) - [j53]Ahmad Hammoud
, Hadi Otrok, Azzam Mourad
, Omar Abdel Wahab
, Jamal Bentahar
:
On the Detection of Passive Malicious Providers in Cloud Federations. IEEE Commun. Lett. 23(1): 64-67 (2019) - [j52]Menatalla Abououf, Rabeb Mizouni, Shakti Singh, Hadi Otrok, Anis Ouali:
Multi-worker multi-task selection framework in mobile crowd sourcing. J. Netw. Comput. Appl. 130: 52-62 (2019) - [j51]Abdelrahman AlMahmoud
, Ernesto Damiani
, Hadi Otrok, Yousof Al-Hammadi
:
Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection. IEEE Trans. Big Data 5(3): 293-304 (2019) - [j50]Toufic Dbouk, Azzam Mourad
, Hadi Otrok
, Hanine Tout
, Chamseddine Talhi:
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading. IEEE Trans. Netw. Serv. Manag. 16(4): 1665-1680 (2019) - [c47]Menatalla Abououf, Shakti Singh, Rabeb Mizouni, Hadi Otrok:
Impact of Misbehaving Devices in Mobile Crowd Sourcing Systems. SERVICES 2019: 54-59 - 2018
- [j49]Bahia Halawi, Azzam Mourad
, Hadi Otrok, Ernesto Damiani:
Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach. IEEE Access 6: 63890-63904 (2018) - [j48]Katty Rohoden, Rebeca Estrada
, Hadi Otrok, Zbigniew Dziong:
Game theoretical framework for clustering and resource allocation in macro-femtocell networks. Comput. Networks 138: 164-176 (2018) - [j47]Rana Azzam, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Anis Ouali:
A stability-based group recruitment system for continuous mobile crowd sensing. Comput. Commun. 119: 1-14 (2018) - [j46]Omar Abdel Wahab
, Jamal Bentahar, Hadi Otrok, Azzam Mourad
:
Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game. IEEE Trans. Serv. Comput. 11(1): 184-201 (2018) - [j45]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
A Stackelberg game for street-centric QoS-OLSR protocol in urban Vehicular Ad Hoc Networks. Veh. Commun. 13: 64-77 (2018) - [c46]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari
:
Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing. ICSOC 2018: 146-161 - [c45]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
A Cluster-Based QoS-OLSR Protocol for Urban Vehicular Ad Hoc Networks. IWCMC 2018: 554-559 - 2017
- [j44]Doaa Al-Terri, Hadi Otrok
, Hassan R. Barada
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs. Comput. Commun. 104: 108-118 (2017) - [j43]Faryed Eltayesh, Jamal Bentahar, Rabeb Mizouni, Hadi Otrok
, Elhadi M. Shakshuki
:
Refined game-theoretic approach to improve authenticity of outsourced databases. J. Ambient Intell. Humaniz. Comput. 8(3): 329-344 (2017) - [c44]Mona Taghavi, Jamal Bentahar, Hadi Otrok
, Omar Abdel Wahab
, Azzam Mourad
:
On the Effects of User Ratings on the Profitability of Cloud Services. ICWS 2017: 1-8 - [c43]Omar Abdel Wahab
, Jamal Bentahar, Hadi Otrok
, Azzam Mourad
:
I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud. ICWS 2017: 728-735 - [c42]Maha Kadadha, Hadi Otrok
, Hassan R. Barada
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
A street-centric QoS-OLSR Protocol for urban Vehicular Ad Hoc Networks. IWCMC 2017: 1477-1482 - 2016
- [j42]Azzam Mourad
, Hanine Tout, Chamseddine Talhi, Hadi Otrok
, Hamdi Yahyaoui:
From model-driven specification to design-level set-based analysis of XACML policies. Comput. Electr. Eng. 52: 65-79 (2016) - [j41]Rebeca Estrada
, Hadi Otrok
, Zbigniew Dziong:
A novel cluster based resource sharing model for femtocell networks. Comput. Commun. 94: 85-102 (2016) - [j40]Omar Abdel Wahab
, Jamal Bentahar, Hadi Otrok
, Azzam Mourad
:
A Stackelberg game for distributed formation of business-driven services communities. Expert Syst. Appl. 45: 359-372 (2016) - [j39]Omar Abdel Wahab
, Azzam Mourad
, Hadi Otrok
, Jamal Bentahar:
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks. Expert Syst. Appl. 50: 40-54 (2016) - [j38]Rana Azzam, Rabeb Mizouni
, Hadi Otrok
, Anis Ouali, Shakti Singh
:
GRS: A Group-Based Recruitment System for Mobile Crowd Sensing. J. Netw. Comput. Appl. 72: 38-50 (2016) - [j37]Hanaa Marshoud, Hadi Otrok
, Hassan R. Barada
, Rebeca Estrada
, Abdallah Jarray, Zbigniew Dziong:
Realistic framework for resource allocation in macro-femtocell networks based on genetic algorithm. Telecommun. Syst. 63(1): 99-110 (2016) - [j36]Raghad Baiad, Omar Alhussein
, Hadi Otrok
, Sami Muhaidat
:
Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET. Veh. Commun. 5: 9-17 (2016) - [c41]Omar Abdel Wahab
, Jamal Bentahar, Hadi Otrok
, Azzam Mourad
:
How to Distribute the Detection Load among Virtual Machines to Maximize the Detection of Distributed Attacks in the Cloud? SCC 2016: 316-323 - [c40]Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok
, Azzam Mourad
:
An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability. ANT/SEIT 2016: 465-471 - [c39]Toufic Dbouk, Azzam Mourad
, Hadi Otrok
, Chamseddine Talhi:
Towards ad-hoc cloud based approach for mobile intrusion detection. WiMob 2016: 1-8 - 2015
- [j35]Hussein Jebbaoui, Azzam Mourad
, Hadi Otrok
, Ramzi A. Haraty
:
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies. Comput. Electr. Eng. 44: 91-103 (2015) - [j34]Hanine Tout, Azzam Mourad
, Chamseddine Talhi, Hadi Otrok
:
AOMD approach for context-adaptable and conflict-free Web services composition. Comput. Electr. Eng. 44: 200-217 (2015) - [j33]Omar Abdel Wahab
, Jamal Bentahar, Hadi Otrok
, Azzam Mourad
:
A survey on trust and reputation models for Web services: Single, composite, and communities. Decis. Support Syst. 74: 121-134 (2015) - [j32]Rebeca Estrada
, Hadi Otrok
, Zbigniew Dziong, Hassan R. Barada
:
Spectrum sharing model for OFDMA macro-femtocell networks. Int. J. Ad Hoc Ubiquitous Comput. 19(3/4): 241-253 (2015) - [j31]Ahmed Al Dhanhani, Rabeb Mizouni
, Hadi Otrok
, Ahmad Al-Rubaie:
Analysis of collaborative learning in social network sites used in education. Soc. Netw. Anal. Min. 5(1): 65:1-65:18 (2015) - [j30]Ehsan Khosrowshahi Asl, Jamal Bentahar, Hadi Otrok
, Rabeb Mizouni
:
Efficient Community Formation for Web Services. IEEE Trans. Serv. Comput. 8(4): 586-600 (2015) - [j29]Koralia N. Pappi, Panagiotis D. Diamantoulakis, Hadi Otrok
, George K. Karagiannidis
:
Cloud Compute-and-Forward With Relay Cooperation. IEEE Trans. Wirel. Commun. 14(6): 3415-3428 (2015) - [c38]Omar Abdel Wahab
, Jamal Bentahar, Hadi Otrok
, Azzam Mourad
:
Misbehavior Detection Framework for Community-Based Cloud Computing. FiCloud 2015: 181-188 - [c37]Amjad El Khatib, Azzam Mourad
, Hadi Otrok
, Omar Abdel Wahab
, Jamal Bentahar:
A Cooperative Detection Model Based on Artificial Neural Network for VANET QoS-OLSR Protocol. ICUWB 2015: 1-5 - [c36]Doaa Al-Terri, Hadi Otrok
, Hassan R. Barada
, Mahmoud Al-Qutayri
, Raed M. Shubair, Yousof Al-Hammadi
:
QoS-OLSR protocol based on intelligent water drop for Vehicular ad-hoc networks. IWCMC 2015: 1352-1357 - 2014
- [j28]Omar Abdel Wahab
, Hadi Otrok
, Azzam Mourad
:
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Comput. Commun. 41: 43-54 (2014) - [j27]Ehsan Khosrowshahi Asl, Jamal Bentahar, Rabeb Mizouni
, Babak Khosravifar, Hadi Otrok
:
To compete or cooperate? This is the question in communities of autonomous services. Expert Syst. Appl. 41(10): 4878-4890 (2014) - [j26]Ahmed Al Dhanhani, Rabeb Mizouni
, Hadi Otrok
, Ahmad Al-Rubaie:
A game theoretical model for collaborative groups in social applications. Expert Syst. Appl. 41(11): 5056-5065 (2014) - [j25]Hanaa Marshoud, Hadi Otrok
, Hassan R. Barada
:
Macrocell-femtocells resource allocation with hybrid access motivational model. Phys. Commun. 11: 3-14 (2014) - [j24]Rebeca Estrada
, Abdallah Jarray, Hadi Otrok
, Zbigniew Dziong:
Base station selection and resource allocation in macro-femtocell networks under noisy scenario. Wirel. Networks 20(1): 115-131 (2014) - [j23]Omar Abdel Wahab
, Hadi Otrok
, Azzam Mourad
:
A Dempster-Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol. Wirel. Pers. Commun. 75(3): 1635-1667 (2014) - [j22]Nadia Moati, Hadi Otrok
, Azzam Mourad
, Jean-Marc Robert:
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol. Wirel. Pers. Commun. 75(3): 1747-1768 (2014) - [c35]Rami Al-Dalky, Khaled Salah
, Mahmoud Al-Qutayri
, Hadi Otrok
:
Framework for a NetFPGA-based Snort NIDS. CSNDSP 2014: 380-383 - [c34]Rami Al-Dalky, Omar Abduljaleel, Khaled Salah
, Hadi Otrok
, Mahmoud Al-Qutayri
:
A Modbus traffic generator for evaluating the security of SCADA systems. CSNDSP 2014: 809-814 - [c33]Raghad Baiad, Hadi Otrok
, Sami Muhaidat
, Jamal Bentahar:
Cooperative cross layer detection for blackhole attack in VANET-OLSR. IWCMC 2014: 863-868 - [c32]Rami Al-Dalky, Khaled Salah
, Hadi Otrok
, Mahmoud Al-Qutayri
:
Accelerating snort NIDS using NetFPGA-based Bloom filter. IWCMC 2014: 869-874 - 2013
- [j21]Omar Abdel Wahab
, Hadi Otrok
, Azzam Mourad
:
VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks. Comput. Commun. 36(13): 1422-1435 (2013) - [j20]Babak Khosravifar, Jamal Bentahar, Rabeb Mizouni
, Hadi Otrok
, Mahsa Alishahi, Philippe Thiran:
Agent-based game-theoretic model for collaborative web services: Decision making analysis. Expert Syst. Appl. 40(8): 3207-3219 (2013) - [j19]Sara Ayoubi, Azzam Mourad
, Hadi Otrok
, Ahmad Shahin:
New XACML-AspectBPEL approach for composite web services security. Int. J. Web Grid Serv. 9(2): 127-145 (2013) - [j18]Osama Hayatle, Hadi Otrok
, Amr M. Youssef:
A Markov Decision Process Model for High Interaction Honeypots. Inf. Secur. J. A Glob. Perspect. 22(4): 159-170 (2013) - [j17]Hanine Tout, Azzam Mourad
, Hadi Otrok
:
XrML-RBLicensing approach adapted to the BPEL process of composite web services. Serv. Oriented Comput. Appl. 7(3): 217-230 (2013) - [j16]Ahmad Nahar Quttoum, Abdallah Jarray, Hadi Otrok
, Zbigniew Dziong:
An optimal dynamic resources partitioning auction model for virtual private networks. Telecommun. Syst. 53(4): 401-414 (2013) - [j15]Rebeca Estrada
, Abdallah Jarray, Hadi Otrok
, Zbigniew Dziong, Hassan R. Barada
:
Energy-Efficient Resource-Allocation Model for OFDMA Macrocell/Femtocell Networks. IEEE Trans. Veh. Technol. 62(7): 3429-3437 (2013) - [c31]Rebeca Estrada
, Hadi Otrok
, Zbigniew Dziong:
Resource allocation model based on Particle Swarm Optimization for OFDMA macro-femtocell networks. IEEE ANTS 2013: 1-6 - [c30]Ehsan Khosrowshahi Asl, Jamal Bentahar, Hadi Otrok
, Rabeb Mizouni
:
Efficient Coalition Formation for Web Services. IEEE SCC 2013: 737-744 - [c29]Hiba Sanadiki, Hadi Otrok
, Azzam Mourad
, Jean-Marc Robert:
Detecting attacks in QoS-OLSR protocol. IWCMC 2013: 1126-1131 - [c28]Hanaa Marshoud, Hadi Otrok
, Hassan R. Barada
, Rebeca Estrada
, Zbigniew Dziong:
Genetic algorithm based resource allocation and interference mitigation for OFDMA macrocell-femtocells networks. WMNC 2013: 1-7 - 2012
- [j14]Jean-Marc Robert, Hadi Otrok
, Ahmad Nahar Quttoum, Rihab Boukhris:
A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies. Comput. Networks 56(2): 927-939 (2012) - [j13]Jean-Marc Robert, Hadi Otrok
, Abdelkarim Chriqi:
RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput. Commun. 35(4): 487-499 (2012) - [j12]Abdallah Jarray, Ahmad Nahar Quttoum, Hadi Otrok
, Zbigniew Dziong:
DDP: A Dynamic Dimensioning and Partitioning model of Virtual Private Networks resources. Comput. Commun. 35(8): 906-915 (2012) - [j11]Stephane Boyer, Jean-Marc Robert, Hadi Otrok
, Clement Rousseau:
An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol. Int. J. Secur. Networks 7(2): 95-106 (2012) - [j10]Azzam Mourad
, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok
:
A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security. Int. J. Web Grid Serv. 8(4): 361-385 (2012) - [j9]Osama Hayatle, Amr M. Youssef, Hadi Otrok
:
Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies. Inf. Secur. J. A Glob. Perspect. 21(6): 306-316 (2012) - [c27]Stephane Boyer, Jean-Marc Robert, Clement Rousseau, Hadi Otrok
:
A novel reputation-based Tit-for-Tat strategy for IEEE 802.11 CSMA/CA protocol. CCNC 2012: 143-148 - [c26]Ahmed Al Dhanhani, Rabeb Mizouni
, Hadi Otrok
, Ahmad Al-Rubaie:
Game theoretical analysis of collaborative social applications. CollaborateCom 2012: 628-634 - [c25]Osama Hayatle, Hadi Otrok
, Amr M. Youssef:
A game theoretic investigation for high interaction honeypots. ICC 2012: 6662-6667 - [c24]Babak Khosravifar, Mahsa Alishahi, Ehsan Khosrowshahi Asl, Jamal Bentahar, Rabeb Mizouni, Hadi Otrok:
Analyzing Coopetition Strategies of Services within Communities. ICSOC 2012: 656-663 - [c23]Hajer Al Housani, Hadi Otrok
, Rabeb Mizouni
, Jean-Marc Robert, Azzam Mourad
:
Towards Smart Anti-Malwares for Battery-Powered Devices. NTMS 2012: 1-4 - [c22]Hanine Tout, Azzam Mourad
, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok
:
Towards a BPEL model-driven approach for Web services security. PST 2012: 120-127 - [c21]Hanaa Marshoud, Hadi Otrok
, Hassan R. Barada
, Rebeca Estrada
, Abdallah Jarray, Zbigniew Dziong:
Resource allocation in macrocell-femtocell network using genetic algorithm. WiMob 2012: 474-479 - 2011
- [j8]Azzam Mourad
, Hadi Otrok
, Lama Baajour:
New Approach Targeting Security Patterns Development and Deployment. Inf. Secur. J. A Glob. Perspect. 20(4-5): 231-244 (2011) - [j7]Noman Mohammed, Hadi Otrok
, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Trans. Dependable Secur. Comput. 8(1): 89-103 (2011) - [c20]Azzam Mourad
, Hadi Otrok
, Sara Ayoubi:
Toward Systematic Integration of Security Policies into Web Services. EISIC 2011: 220-223 - [c19]Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour:
Toward an abstract language on top of XACML for web services security. ICITST 2011: 254-259 - [c18]Ahmed Al Dhanhani, Rabeb Mizouni, Hadi Otrok, Jason W. P. Ng:
Smart Mobile Assessment Tool. Intelligent Environments (Workshops) 2011: 523-533 - [c17]Hadi Otrok
, Azzam Mourad
, Jean-Marc Robert, Nadia Moati, Hiba Sanadiki:
A cluster-based model for QoS-OLSR protocol. IWCMC 2011: 1099-1104 - [c16]Yassine Snoussi, Jean-Marc Robert, Hadi Otrok
:
Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocol. WiMob 2011: 135-140 - 2010
- [j6]Ahmad Nahar Quttoum, Hadi Otrok
, Zbigniew Dziong:
A collusion-resistant mechanism for autonomic resource management in Virtual Private Networks. Comput. Commun. 33(17): 2070-2078 (2010) - [j5]Abderrezak Rachedi
, Abderrahim Benslimane
, Hadi Otrok
, Noman Mohammed, Mourad Debbabi:
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs. Mob. Networks Appl. 15(2): 191-204 (2010) - [c15]Ahmad Nahar Quttoum, Hadi Otrok
, Zbigniew Dziong:
ARMM: An Autonomic Resource Management Mechanism for Virtual Private Networks. CCNC 2010: 1-6 - [c14]Azzam Mourad
, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok
:
New approach for the dynamic enforcement of Web services security. PST 2010: 189-196 - [c13]Azzam Mourad
, Hadi Otrok
, Lama Baajour:
A Novel Approach for the Development and Deployment of Security Patterns. SocialCom/PASSAT 2010: 914-919
2000 – 2009
- 2009
- [j4]Hadi Otrok
, Benwen Zhu, Hamdi Yahyaoui, Prabir Bhattacharya:
An Intrusion Detection Game Theoretical Model. Inf. Secur. J. A Glob. Perspect. 18(5): 199-212 (2009) - [c12]Abdelkarim Chriqi, Hadi Otrok
, Jean-Marc Robert:
SC-OLSR: Secure Clustering-Based OLSR Model for Ad Hoc Networks. WiMob 2009: 239-245 - 2008
- [j3]Hadi Otrok
, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31(4): 708-721 (2008) - [j2]Hadi Otrok
, Mona Mehrandish, Chadi Assi, Mourad Debbabi, Prabir Bhattacharya:
Game theoretic models for detecting network intrusions. Comput. Commun. 31(10): 1934-1944 (2008) - [c11]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 - [c10]Abderrezak Rachedi
, Abderrahim Benslimane
, Hadi Otrok
, Noman Mohammed, Mourad Debbabi:
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422 - [c9]Shuai Liu, D. Y. Zhang, Xiao Chu, Hadi Otrok
, Prabir Bhattacharya:
A Game Theoretic Approach to Optimize the Performance of Host-Based IDS. WiMob 2008: 448-453 - [c8]Hadi Otrok
, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 - [r1]Chadi Assi, Prabir Bhattacharya, Mourad Debbabi, Mona Mehrandish, Hadi Otrok:
Mobile Security: Game Theory. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [c7]Hadi Otrok
, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya:
Testing Intrusion Detection Systems in MANET: A Comprehensive Study. CNSR 2007: 364-371 - [c6]Hadi Otrok
, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya:
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks. ICDCS Workshops 2007: 86 - [c5]