Analyzing multiple logs for forensic evidence AR Arasteh, M Debbabi, A Sakha, M Saleh digital investigation 4, 82-91, 2007 | 96 | 2007 |
Security evaluation of J2ME CLDC embedded Java platform. M Debbabi, MM Saleh, C Talhi, S Zhioua J. Object Technol. 5 (2), 125-154, 2006 | 38 | 2006 |
Java for mobile devices: A security study M Debbabi, M Saleh, C Talhi, S Zhioua 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005 | 26 | 2005 |
Forensic analysis of logs: Modeling and verification M Saleh, AR Arasteh, A Sakha, M Debbabi Knowledge-Based Systems 20 (7), 671-682, 2007 | 18 | 2007 |
Security analysis of mobile Java M Debbabi, M Saleh, C Talhi, S Zhioua 16th International Workshop on Database and Expert Systems Applications …, 2005 | 18 | 2005 |
Embedded Java security: security for mobile devices M Debbabi, M Saleh, C Talhi, S Zhioua Springer Science & Business Media, 2007 | 16 | 2007 |
Mechanism design for decentralized vehicle routing problem M Saleh, A Soeanu, S Ray, M Debbabi, J Berger, A Boukhtouta Proceedings of the 27th annual acm symposium on applied computing, 749-754, 2012 | 13 | 2012 |
Security Analysis of Wireless Java. M Debbabi, MM Saleh, C Talhi, S Zhioua PST, 2005 | 10 | 2005 |
An Authentication Protocol for the Medical Internet of Things N El-Meniawy, MRM Rizk, MA Ahmed, M Saleh Symmetry 14 (7), 1483, 2022 | 9 | 2022 |
Assessing the use of IP network management protocols in smart grids M Saleh, MA Abdou, M Aboulhassan 2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016 | 8 | 2016 |
Authentication in flat Wireless Sensor Networks with mobile nodes M Saleh, N El-Meniawy, E Sourour 2015 IEEE 12th International Conference on Networking, Sensing and Control …, 2015 | 7 | 2015 |
Differentiable sensor layouts for end-to-end learning of task-specific camera parameters H Sommerhoff, S Agnihotri, M Saleh, M Moeller, M Keuper, A Kolb arXiv preprint arXiv:2304.14736, 2023 | 5 | 2023 |
A game-theoretic framework for specification and verification of cryptographic protocols M Saleh, M Debbabi Formal aspects of computing 22, 585-609, 2010 | 4 | 2010 |
Verifying security properties of cryptoprotocols: A novel approach M Saleh, M Debbabi Fifth IEEE International Conference on Software Engineering and Formal …, 2007 | 4 | 2007 |
Modeling security protocols as games M Saleh, M Debbabi Third International Symposium on Information Assurance and Security, 253-260, 2007 | 4 | 2007 |
Adaptive dynamic routing for ieee 802.15.6 wireless body area networks A Miky, M Saleh, B Mokhtar, MRM Rizk 2018 35th National Radio Science Conference (NRSC), 2018 | 2 | 2018 |
Routing-guided authentication in wireless sensor networks M Saleh, N El-Meniawy, E Sourour 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor …, 2015 | 2 | 2015 |
Java ME CLDC Security Analysis M Debbabi, M Saleh, C Talhi, S Zhioua Embedded Java Security: Security for Mobile Devices, 115-152, 2007 | 2 | 2007 |
Vulnerability analysis of J2ME CLDC security M Debbabi, M Saleh, C Talhi, S Zhioua The US DoD information assurance newsletter 9 (2), 18-24, 2006 | 2 | 2006 |
Common criteria approach to j2me cldc security requirements M Debbabi, M Saleh, C Talhi, S Zhioua FRONTIERS IN ARTIFICIAL INTELLIGENCE AND APPLICATIONS 147, 177, 2006 | 1 | 2006 |