Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications C Pham, A Makhoul, R Saadi Journal of Network and Computer Applications 34 (2), 783-795, 2011 | 51 | 2011 |
Extending security-by-contract with quantitative trust on mobile devices G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci 2010 International Conference on Complex, Intelligent and Software Intensive …, 2010 | 42 | 2010 |
Risk management in intrusion detection applications with wireless video sensor networks A Makhoul, R Saadi, C Pham IEEE WCNC 182, 2010 | 26 | 2010 |
Adaptive scheduling of wireless video sensor nodes for surveillance applications A Makhoul, R Saadi, C Pham Proceedings of the 4th ACM workshop on Performance monitoring and …, 2009 | 17 | 2009 |
Composing trust models towards interoperable trust management R Saadi, MA Rahaman, V Issarny, A Toninelli IFIP International Conference on Trust Management, 51-66, 2011 | 16 | 2011 |
T2D: A Peer to Peer trust management system based on Disposition to Trust R Saadi, JM Pierson, L Brunie Proceedings of the 2010 ACM Symposium on Applied Computing, 1472-1478, 2010 | 16 | 2010 |
Establishing trust beliefs based on a uniform disposition to trust R Saadi, O Hasan, JM Pierson, L Brunie 2007 Third International IEEE Conference on Signal-Image Technologies and …, 2007 | 16 | 2007 |
Authentication and access control using trust collaboration in pervasive grid environments R Saadi, JM Pierson, L Brunie International Conference on Grid and Pervasive Computing, 348-361, 2007 | 14 | 2007 |
Method for calculating the activity of a user R Saadi, N Buard, C Hutchings US Patent App. 14/717,801, 2015 | 12 | 2015 |
The CONNECT architecture P Grace, N Georgantas, A Bennaceur, GS Blair, F Chauvel, V Issarny, ... International School on Formal Methods for the Design of Computer …, 2011 | 12 | 2011 |
Proximity-based trust inference for mobile social networking A Seyedi, R Saadi, V Issarny IFIP International Conference on Trust Management, 253-264, 2011 | 10 | 2011 |
Inferring affordances using learning techniques A Bennaceur, R Johansson, A Moschitti, R Spalazzese, D Sykes, R Saadi, ... International Workshop on Eternal Systems, 79-87, 2011 | 10 | 2011 |
(Dis) trust certification model for large access in a pervasive environment R Saadi, JM Pierson, L Brunie International Journal of Pervasive Computing and Communications, 2005 | 10 | 2005 |
Intermediate CONNECT architecture A Bennaceur, GS Blair, F Chauvel, N Georgantas, P Grace, V Issarny, ... | 8 | 2011 |
Surveillance vidéo sur réseaux de capteurs sans-fils: ordonnancement adaptatif avec prise en compte de la criticité. A Makhoul, R Abdallah, CD Pham | 8 | 2009 |
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks A Makhoul, R Saadi, CD Pham 2009 International Conference on Ultra Modern Telecommunications & Workshops …, 2009 | 7 | 2009 |
The Chameleon: A Pervasive Grid Security Architecture R Saadi, JM Pierson, L Brunie International Conference on Networking and Services (ICNS'07), 48-48, 2007 | 7 | 2007 |
APC: access pass certificate distrust certification model for large access in pervasive environment R Saadi, JM Pierson, L Brunie ICPS'05. Proceedings. International Conference on Pervasive Services, 2005 …, 2005 | 7 | 2005 |
Security and trust G Costa, V Issarny, F Martinelli, I Matteucci, R Saadi International School on Formal Methods for the Design of Computer …, 2011 | 5 | 2011 |
Security in distributed collaborative environments: limitations and solutions R Saadi, JM Pierson, L Brunie Emergent Web Intelligence: Advanced Information Retrieval, 415-454, 2010 | 4 | 2010 |