.
Search
LAUR Repository
Login
|
Help
LAUR Home
→
School of Arts and Sciences
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 10 out of a total of 36 results for community: School of Arts and Sciences.
(0.012 seconds)
Now showing items 1-10 of 36
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
A Dempster–Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol
Abdel Wahab, Omar
;
Otrok, Hadi
;
Mourad, Azzam
(
2015-11-24
)
A cooperative watchdog model based on Dempster–Shafer for detecting misbehaving vehicles
Abdel Wahab, Omar
;
Otrok, Hadi
;
Mourad, Azzam
(
2015-11-24
)
A Comparative Study of RSA-Based Cryptographic Algorithms
Haraty, Ramzi A.
;
El-Kassar, A. N.
;
Otrok, Hadi
(
2018-03-22
)
A Comparative Study of Elgamal Based Cryptographic Algorithms
Haraty, Ramzi A.
;
El-Kassar, A. N.
;
Otrok, Hadi
(
INSTICC
,
2017-06-29
)
A Comparative Study of RSA based Cryptographic Algorithms
Haraty, Ramzi A.
;
El-Kassar, A. N.
;
Otrok, Hadi
(
ISCA
,
2018-01-23
)
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
El-Kassar, A. N.
;
Haraty, Ramzi A.
;
Otrok, Hadi
(
IEEE
,
2017-04-05
)
A Comparative Study of Elgamal Based Cryptographic Algorithms
Haraty, Ramzi A.
;
El-Kassar, A. N.
;
Otrok, Hadi
(
2018-03-22
)
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol
Moati, Nadia
;
Otrok, Hadi
;
Mourad, Azzam
;
Robert, Jean-Marc
(
2016-05-13
)
New Approach Targeting Security Patterns Development and Deployment
Mourad, Azzam
;
Otrok, Hadi
;
Baajour, Lama
(
2016-05-19
)
An android-based trojan spyware to study the notificationlistener service vulnerability
Abualola, Huda
;
Alhawai, Hessa
;
Kadadha, Maha
;
Otrok, Hadi
;
Mourad, Azzam
(
2017-03-14
)
Now showing items 1-10 of 36
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of LAUR
Communities & Collections
By Issue Date
Authors
Titles
Subjects
This Community
By Issue Date
Authors
Titles
Subjects
My Account
Login
Discover
Author
Otrok, Hadi (36)
Mourad, Azzam (31)
Abdel Wahab, Omar (10)
Bentahar, Jamal (9)
Yahyaoui, Hamdi (6)
El-Kassar, A. N. (5)
Haraty, Ramzi A. (5)
Talhi, Chamseddine (5)
Tout, Hanine (5)
Ayoubi, Sara (4)
... View More
Subject
Application software -- Congresses (1)
Artificial intelligence -- Congresses (1)
Computer systems -- Congresses (1)
Expert systems (Computer science) -- Congresses (1)
Technology transfer -- Congresses (1)
Telecommunication systems -- Congresses (1)
... View More
Date Issued
2021 (3)
2020 (1)
2018 (7)
2017 (17)
2016 (2)
2015 (6)