Nabil El-Kadhi
Orcid: 0000-0002-8139-320X
According to our database1,
Nabil El-Kadhi
authored at least 25 papers
between 2004 and 2012.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2012
J. Softw., 2012
2010
An Agile Approach for Mobile applications Security.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the MDM 2009, 2009
Ontology Driven Security for Mobile Applications.
Proceedings of the 2009 International Conference on Security & Management, 2009
Artificial Neural Network for IDS Solution.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
2008
Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Towards a Mobile Applications Security Approach.
Proceedings of the 2008 International Conference on Security & Management, 2008
Formal Automated Transformation of SDL Specifications to Estelle Specifications.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008
2007
Qualitative and Quantitative Criteria for the Concept Evaluation Task.
Proceedings of the World Congress on Engineering, 2007
Proceedings of the Distributed Computing and Internet Technology, 2007
Intelligent Mobile Agent for Intrusion Detection System.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
J. Comput. Methods Sci. Eng., 2006
J. Comput. Methods Sci. Eng., 2006
J. Comput. Methods Sci. Eng., 2006
A bidirectional Bluetooth authentication scheme based on game-theoretic framwork.
Proceedings of the 2006 International Conference on Wireless Networks, 2006
2005
KMRCRelat Algorithm for finding repeated words in sequences: Application on biological sequences.
J. Comput. Methods Sci. Eng., 2005
J. Comput. Methods Sci. Eng., 2005
Formal method for automated testing data flow aspects of communications protocols, software, and systems specified in Lotos.
J. Comput. Methods Sci. Eng., 2005
Formal Method for Automated Transformation of Lotos Specifications to Estelle Specifications.
Int. J. Softw. Eng. Knowl. Eng., 2005
2004
Using Correlation Detection for IMA-IDS Architecture.
Proceedings of the 2nd International Conference Computing, 2004