Follow
Mohamed Saleh
Mohamed Saleh
Verified email at pua.edu.eg
Title
Cited by
Cited by
Year
Analyzing multiple logs for forensic evidence
AR Arasteh, M Debbabi, A Sakha, M Saleh
digital investigation 4, 82-91, 2007
962007
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, MM Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
382006
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
262005
Forensic analysis of logs: Modeling and verification
M Saleh, AR Arasteh, A Sakha, M Debbabi
Knowledge-Based Systems 20 (7), 671-682, 2007
182007
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
182005
Embedded Java security: security for mobile devices
M Debbabi, M Saleh, C Talhi, S Zhioua
Springer Science & Business Media, 2007
162007
Mechanism design for decentralized vehicle routing problem
M Saleh, A Soeanu, S Ray, M Debbabi, J Berger, A Boukhtouta
Proceedings of the 27th annual acm symposium on applied computing, 749-754, 2012
132012
Security Analysis of Wireless Java.
M Debbabi, MM Saleh, C Talhi, S Zhioua
PST, 2005
102005
An Authentication Protocol for the Medical Internet of Things
N El-Meniawy, MRM Rizk, MA Ahmed, M Saleh
Symmetry 14 (7), 1483, 2022
92022
Assessing the use of IP network management protocols in smart grids
M Saleh, MA Abdou, M Aboulhassan
2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016
82016
Authentication in flat Wireless Sensor Networks with mobile nodes
M Saleh, N El-Meniawy, E Sourour
2015 IEEE 12th International Conference on Networking, Sensing and Control …, 2015
72015
Differentiable sensor layouts for end-to-end learning of task-specific camera parameters
H Sommerhoff, S Agnihotri, M Saleh, M Moeller, M Keuper, A Kolb
arXiv preprint arXiv:2304.14736, 2023
52023
A game-theoretic framework for specification and verification of cryptographic protocols
M Saleh, M Debbabi
Formal aspects of computing 22, 585-609, 2010
42010
Verifying security properties of cryptoprotocols: A novel approach
M Saleh, M Debbabi
Fifth IEEE International Conference on Software Engineering and Formal …, 2007
42007
Modeling security protocols as games
M Saleh, M Debbabi
Third International Symposium on Information Assurance and Security, 253-260, 2007
42007
Adaptive dynamic routing for ieee 802.15.6 wireless body area networks
A Miky, M Saleh, B Mokhtar, MRM Rizk
2018 35th National Radio Science Conference (NRSC), 2018
22018
Routing-guided authentication in wireless sensor networks
M Saleh, N El-Meniawy, E Sourour
2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor …, 2015
22015
Java ME CLDC Security Analysis
M Debbabi, M Saleh, C Talhi, S Zhioua
Embedded Java Security: Security for Mobile Devices, 115-152, 2007
22007
Vulnerability analysis of J2ME CLDC security
M Debbabi, M Saleh, C Talhi, S Zhioua
The US DoD information assurance newsletter 9 (2), 18-24, 2006
22006
Common criteria approach to j2me cldc security requirements
M Debbabi, M Saleh, C Talhi, S Zhioua
FRONTIERS IN ARTIFICIAL INTELLIGENCE AND APPLICATIONS 147, 177, 2006
12006
The system can't perform the operation now. Try again later.
Articles 1–20