default search action
Rachid Beghdad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c5]Faiza Benmenzer, Rachid Beghdad, Alaa Eddine Khalfoune:
Cutting-Edge Broad Learning with Flexible Privacy Mechanisms for Detecting Malicious Behaviour. PAIS 2024: 1-8 - 2022
- [j22]Faiza Benmenzer, Rachid Beghdad:
An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment. Comput. Commun. 196: 207-228 (2022) - [j21]Faiza Benmenzer, Rachid Beghdad:
Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments. Int. J. Inf. Secur. Priv. 16(1): 1-20 (2022) - 2021
- [j20]Redha Taguelmimt, Rachid Beghdad:
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors. Int. J. Inf. Secur. Priv. 15(2): 131-144 (2021) - 2020
- [j19]Mohamed Haddadi, Rachid Beghdad:
A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud. Int. J. Inf. Secur. Priv. 14(4): 42-56 (2020) - [j18]Mourad Chelik, Rachid Beghdad:
Proposed method: mean delays synchronization protocol (MDSP) for wireless sensor networks. Int. J. Pervasive Comput. Commun. 16(1): 74-100 (2020) - [j17]Abdelkader Khelil, Rachid Beghdad, Amar Khelloufi:
3HA: Hybrid Hole Healing Algorithm in a Wireless Sensor Networks. Wirel. Pers. Commun. 112(1): 587-605 (2020)
2010 – 2019
- 2018
- [j16]Abdelkader Khelil, Rachid Beghdad:
Correction to: SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks. Wirel. Pers. Commun. 100(3): 1261 (2018) - 2017
- [j15]Abdelkader Khelil, Rachid Beghdad:
SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks. Wirel. Pers. Commun. 96(2): 3159-3178 (2017) - 2016
- [j14]Rachid Beghdad, Amar Lamraoui:
Boundary and holes recognition in wireless sensor networks. J. Innov. Digit. Ecosyst. 3(1): 1-14 (2016) - [j13]Rachid Beghdad, Mohamed Abdenour Hocini, Narimane Cherchour, Mourad Chelik:
PEAS-LI: PEAS with Location Information for coverage in Wireless Sensor Networks. J. Innov. Digit. Ecosyst. 3(2): 163-171 (2016) - [c4]Tarek Azizi, Rachid Beghdad:
Increasing QoS Parameters in WSNs through Spiral-Based Clustered Architecture. ANT/SEIT 2016: 401-408 - [c3]Abdelkader Khelil, Rachid Beghdad:
ESA: An Efficient Self-deployment Algorithm for Coverage in Wireless Sensor Networks. EUSPN/ICTH 2016: 40-47 - 2015
- [j12]Rachid Beghdad, Faouzi Tinsalhi:
OTSP: an optimised time synchronisation protocol for wireless sensor networks. Int. J. Sens. Networks 19(3/4): 217-233 (2015) - [c2]Abdelkader Khelil, Rachid Beghdad:
Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks. CIIA 2015: 442-453 - 2012
- [j11]Sonia Mammeri, Rachid Beghdad:
On handling real-time communications in mac protocols. Int. Arab J. Inf. Technol. 9(5): 428-435 (2012) - [j10]Rachid Beghdad:
Efficient coverage protocol without location information. Int. J. Sens. Networks 11(4): 263-273 (2012) - 2011
- [j9]Rachid Beghdad, Mohamed Touati, Mohamed Seghir Berboucha:
A Data Analysis-Based Approach for Detecting Intruders. Inf. Secur. J. A Glob. Perspect. 20(4-5): 194-209 (2011) - 2010
- [j8]Rachid Beghdad:
Critical Study of Supervised Learning Techniques in Predicting Attacks. Inf. Secur. J. A Glob. Perspect. 19(1): 22-35 (2010)
2000 – 2009
- 2009
- [j7]Rachid Beghdad:
Efficient deterministic method for detecting new U2R attacks. Comput. Commun. 32(6): 1104-1110 (2009) - [j6]Rachid Beghdad:
Modelling intrusion detection as an allocation problem. Pattern Recognit. Lett. 30(8): 774-779 (2009) - 2008
- [j5]Rachid Beghdad:
Critical study of neural networks in detecting intrusions. Comput. Secur. 27(5-6): 168-175 (2008) - [j4]Rachid Beghdad:
Hierarchical Clustering Algorithm for Detecting Anomalous Profiles in Computer Systems. Int. J. Comput. 7(3): 72-78 (2008) - 2007
- [j3]Rachid Beghdad:
K-means for modelling and Detecting Anomalous Profiles. Int. J. Comput. 6(1): 59-66 (2007) - [j2]Rachid Beghdad:
Selecting KDD Features and using Random Classification Tree for Predicting Attacks. Int. J. Comput. 6(3): 115-123 (2007) - 2004
- [j1]Rachid Beghdad:
Modelling and solving the intrusion detection problem in computer networks. Comput. Secur. 23(8): 687-696 (2004) - 2001
- [c1]Yacine Bouzida, Rachid Beghdad:
Improving the Timed Token Protocol. ICN (1) 2001: 520-529
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint