Seguir
Rachid BEGHDAD
Rachid BEGHDAD
Full Professor and Director Of Research At Bejaia Univ. - Member of LAMIE Lab. at Batna Univ.A
Dirección de correo verificada de univ-bejaia.dz - Página principal
Título
Citado por
Citado por
Año
Critical study of neural networks in detecting intrusions
R Beghdad
Computers & security 27 (5-6), 168-175, 2008
1442008
Boundary and holes recognition in wireless sensor networks
R Beghdad, A Lamraoui
Journal of Innovation in Digital Ecosystems 3 (1), 1-14, 2016
522016
Securing wireless sensor networks: a survey
S Ould Amara, R Beghdad, M Oussalah
EDPACS 47 (2), 6-29, 2013
382013
Defending AODV routing protocol against the black hole attack
F Ameza, N Assam, R Beghdad
idea 8 (2), 2010
282010
DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
M Haddadi, R Beghdad
Edpacs 57 (5), 1-26, 2018
262018
Efficient deterministic method for detecting new U2R attacks
R Beghdad
Computer Communications 32 (6), 1104-1110, 2009
252009
Modelling and solving the intrusion detection problem in computer networks
R Beghdad
Computers & Security 23 (8), 687-696, 2004
222004
Training all the KDD data set to classify and detect attacks
R Beghdad
Neural Network World 17 (2), 81, 2007
212007
Esa: An efficient self-deployment algorithm for coverage in wireless sensor networks
A Khelil, R Beghdad
Procedia Computer Science 98, 40-47, 2016
182016
Coverage and connectivity protocol for wireless sensor networks
A Khalil, R Beghdad
2012 24th International Conference on Microelectronics (ICM), 1-4, 2012
132012
3HA: hybrid hole healing algorithm in a wireless sensor networks
A Khelil, R Beghdad, A Khelloufi
Wireless Personal Communications 112, 587-605, 2020
122020
Efficient coverage protocol without location information
R Beghdad
International Journal of Sensor Networks 11 (4), 263-273, 2012
122012
BCP: A Border Coverage Protocol for wireless sensor networks
A Dabba, R Beghdad
2014 Science and Information Conference, 632-640, 2014
92014
Critical study of supervised learning techniques in predicting attacks
R Beghdad
Information Security Journal: A Global Perspective 19 (1), 22-35, 2010
92010
PEAS-LI: PEAS with location information for coverage in wireless sensor networks
R Beghdad, MA Hocini, N Cherchour, M Chelik
Journal of Innovation in Digital Ecosystems 3 (2), 163-171, 2016
82016
Distributed algorithm for coverage and connectivity in wireless sensor networks
A Khelil, R Beghdad
Computer Science and Its Applications: 5th IFIP TC 5 International …, 2015
82015
Increasing QoS parameters in WSNs through Spiral-Based clustered architecture
T Azizi, R Beghdad
Procedia Computer Science 83, 401-408, 2016
72016
Maximizing bandwidth in wireless sensor networks using TDMA protocol
T Azizi, R Beghdad
2014 Science and Information Conference, 678-684, 2014
72014
Bandwidth assignment in a cluster-based wireless sensor network
T Azizi, R Beghdad, M Oussalah
Proceedings of the World Congress on Engineering 2, 2013
72013
DS-kNN: An intrusion detection system based on a distance sum-based K-nearest neighbors
R Taguelmimt, R Beghdad
International Journal of Information Security and Privacy (IJISP) 15 (2 …, 2021
62021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20