Critical study of neural networks in detecting intrusions R Beghdad Computers & security 27 (5-6), 168-175, 2008 | 144 | 2008 |
Boundary and holes recognition in wireless sensor networks R Beghdad, A Lamraoui Journal of Innovation in Digital Ecosystems 3 (1), 1-14, 2016 | 52 | 2016 |
Securing wireless sensor networks: a survey S Ould Amara, R Beghdad, M Oussalah EDPACS 47 (2), 6-29, 2013 | 38 | 2013 |
Defending AODV routing protocol against the black hole attack F Ameza, N Assam, R Beghdad idea 8 (2), 2010 | 28 | 2010 |
DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment M Haddadi, R Beghdad Edpacs 57 (5), 1-26, 2018 | 26 | 2018 |
Efficient deterministic method for detecting new U2R attacks R Beghdad Computer Communications 32 (6), 1104-1110, 2009 | 25 | 2009 |
Modelling and solving the intrusion detection problem in computer networks R Beghdad Computers & Security 23 (8), 687-696, 2004 | 22 | 2004 |
Training all the KDD data set to classify and detect attacks R Beghdad Neural Network World 17 (2), 81, 2007 | 21 | 2007 |
Esa: An efficient self-deployment algorithm for coverage in wireless sensor networks A Khelil, R Beghdad Procedia Computer Science 98, 40-47, 2016 | 18 | 2016 |
Coverage and connectivity protocol for wireless sensor networks A Khalil, R Beghdad 2012 24th International Conference on Microelectronics (ICM), 1-4, 2012 | 13 | 2012 |
3HA: hybrid hole healing algorithm in a wireless sensor networks A Khelil, R Beghdad, A Khelloufi Wireless Personal Communications 112, 587-605, 2020 | 12 | 2020 |
Efficient coverage protocol without location information R Beghdad International Journal of Sensor Networks 11 (4), 263-273, 2012 | 12 | 2012 |
BCP: A Border Coverage Protocol for wireless sensor networks A Dabba, R Beghdad 2014 Science and Information Conference, 632-640, 2014 | 9 | 2014 |
Critical study of supervised learning techniques in predicting attacks R Beghdad Information Security Journal: A Global Perspective 19 (1), 22-35, 2010 | 9 | 2010 |
PEAS-LI: PEAS with location information for coverage in wireless sensor networks R Beghdad, MA Hocini, N Cherchour, M Chelik Journal of Innovation in Digital Ecosystems 3 (2), 163-171, 2016 | 8 | 2016 |
Distributed algorithm for coverage and connectivity in wireless sensor networks A Khelil, R Beghdad Computer Science and Its Applications: 5th IFIP TC 5 International …, 2015 | 8 | 2015 |
Increasing QoS parameters in WSNs through Spiral-Based clustered architecture T Azizi, R Beghdad Procedia Computer Science 83, 401-408, 2016 | 7 | 2016 |
Maximizing bandwidth in wireless sensor networks using TDMA protocol T Azizi, R Beghdad 2014 Science and Information Conference, 678-684, 2014 | 7 | 2014 |
Bandwidth assignment in a cluster-based wireless sensor network T Azizi, R Beghdad, M Oussalah Proceedings of the World Congress on Engineering 2, 2013 | 7 | 2013 |
DS-kNN: An intrusion detection system based on a distance sum-based K-nearest neighbors R Taguelmimt, R Beghdad International Journal of Information Security and Privacy (IJISP) 15 (2 …, 2021 | 6 | 2021 |