Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mohamed
    Last name: Hamdi
    DBLP: 91/2937
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 62  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    An overview on coalitional game-theoretic approaches for resource allocation in cloud computing architectures.
    IJCC 2015, Volume 4 (0) 2015
    Conference paper
    Boutheina A. Fessi, Salah Benabdallah, Noureddine Boudriga, Mohamed Hamdi.
    A multi-attribute decision model for intrusion response system.
    Inf. Sci. 2014, Volume 270 (0) 2014
    Conference paper
    Mohamed Hamdi, Habtamu Abie.
    Game-based adaptive security in the Internet of Things for eHealth.
    IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014 2014 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A revocation game model for secure cloud storage.
    International Conference on High Performance Computing Simulation, HPCS 2014, Bologna, Italy, 21-25 July, 2014 2014 (0) 2014
    Journal article
    Mohamed Nidhal Mejri, Jalel Ben-Othman, Mohamed Hamdi.
    Survey on VANET security challenges and possible cryptographic solutions.
    Vehicular Communications 2014, Volume 1 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A Novel Approach for Fair and Secure Resource Allocation in Storage Cloud Architectures Based on DRF Mechanism.
    2014 IEEE International Conference on High Performance Computing and Communications, 6th IEEE International Symposium on Cyberspace Safety and Security, 11th IEEE International Conference on Embedded Software and Systems, HPCC/CSS/ICESS 2014, Paris, Franc 2014 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A Coalitional Game-Theoretic Approach for QoS-Based and Secure Data Storage in Cloud Environment.
    2014 IEEE International Conference on High Performance Computing and Communications, 6th IEEE International Symposium on Cyberspace Safety and Security, 11th IEEE International Conference on Embedded Software and Systems, HPCC/CSS/ICESS 2014, Paris, Franc 2014 (0) 2014
    Conference paper
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane.
    A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures.
    2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Hammamet, Tunisia, June 17-20, 2013 2013 (0) 2013
    Conference paper
    Stefan Poslad, Mohamed Hamdi, Habtamu Abie.
    Adaptive security and privacy management for the internet of things (ASPI 2013).
    The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013 - Adjunct Publication 2013 (0) 2013
    Conference paper
    Mohamed Hamdi.
    Security of cloud computing, storage, and networking.
    2012 International Conference on Collaboration Technologies and Systems, CTS 2012, Denver, CO, USA, May 21-25, 2012 2012 (0) 2012
    Show item 1 to 10 of 62  

    Your query returned 62 matches in the database.