Rachid Beghdad

Orcid: 0000-0001-8336-7788

According to our database1, Rachid Beghdad authored at least 27 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cutting-Edge Broad Learning with Flexible Privacy Mechanisms for Detecting Malicious Behaviour.
Proceedings of the 6th International Conference on Pattern Analysis and Intelligent Systems, 2024

2022
Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments.
Int. J. Inf. Secur. Priv., 2022

An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment.
Comput. Commun., 2022

2021
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors.
Int. J. Inf. Secur. Priv., 2021

2020
3HA: Hybrid Hole Healing Algorithm in a Wireless Sensor Networks.
Wirel. Pers. Commun., 2020

Proposed method: mean delays synchronization protocol (MDSP) for wireless sensor networks.
Int. J. Pervasive Comput. Commun., 2020

A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud.
Int. J. Inf. Secur. Priv., 2020

2018
Correction to: SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

2017
SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

2016
Boundary and holes recognition in wireless sensor networks.
J. Innov. Digit. Ecosyst., 2016

PEAS-LI: PEAS with Location Information for coverage in Wireless Sensor Networks.
J. Innov. Digit. Ecosyst., 2016

ESA: An Efficient Self-deployment Algorithm for Coverage in Wireless Sensor Networks.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

Increasing QoS Parameters in WSNs through Spiral-Based Clustered Architecture.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
OTSP: an optimised time synchronisation protocol for wireless sensor networks.
Int. J. Sens. Networks, 2015

Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks.
Proceedings of the Computer Science and Its Applications, 2015

2012
Efficient coverage protocol without location information.
Int. J. Sens. Networks, 2012

On handling real-time communications in mac protocols.
Int. Arab J. Inf. Technol., 2012

2011
A Data Analysis-Based Approach for Detecting Intruders.
Inf. Secur. J. A Glob. Perspect., 2011

2010
Critical Study of Supervised Learning Techniques in Predicting Attacks.
Inf. Secur. J. A Glob. Perspect., 2010

2009
Modelling intrusion detection as an allocation problem.
Pattern Recognit. Lett., 2009

Efficient deterministic method for detecting new U2R attacks.
Comput. Commun., 2009

2008
Hierarchical Clustering Algorithm for Detecting Anomalous Profiles in Computer Systems.
Int. J. Comput., 2008

Critical study of neural networks in detecting intrusions.
Comput. Secur., 2008

2007
Selecting KDD Features and using Random Classification Tree for Predicting Attacks.
Int. J. Comput., 2007

K-means for modelling and Detecting Anomalous Profiles.
Int. J. Comput., 2007

2004
Modelling and solving the intrusion detection problem in computer networks.
Comput. Secur., 2004

2001
Improving the Timed Token Protocol.
Proceedings of the Networking, 2001


  Loading...