Follow
Rachid BEGHDAD
Rachid BEGHDAD
Full Professor and Director Of Research At Bejaia Univ. - Member of LAMIE Lab. at Batna Univ.A
Verified email at univ-bejaia.dz - Homepage
Title
Cited by
Cited by
Year
Critical study of neural networks in detecting intrusions
R Beghdad
Computers & security 27 (5-6), 168-175, 2008
1442008
Boundary and holes recognition in wireless sensor networks
R Beghdad, A Lamraoui
Journal of Innovation in Digital Ecosystems 3 (1), 1-14, 2016
522016
Securing wireless sensor networks: a survey
S Ould Amara, R Beghdad, M Oussalah
EDPACS 47 (2), 6-29, 2013
382013
Defending AODV routing protocol against the black hole attack
F Ameza, N Assam, R Beghdad
idea 8 (2), 2010
282010
DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
M Haddadi, R Beghdad
Edpacs 57 (5), 1-26, 2018
262018
Efficient deterministic method for detecting new U2R attacks
R Beghdad
Computer Communications 32 (6), 1104-1110, 2009
252009
Modelling and solving the intrusion detection problem in computer networks
R Beghdad
Computers & Security 23 (8), 687-696, 2004
222004
Training all the KDD data set to classify and detect attacks
R Beghdad
Neural Network World 17 (2), 81, 2007
212007
Esa: An efficient self-deployment algorithm for coverage in wireless sensor networks
A Khelil, R Beghdad
Procedia Computer Science 98, 40-47, 2016
182016
Coverage and connectivity protocol for wireless sensor networks
A Khalil, R Beghdad
2012 24th International Conference on Microelectronics (ICM), 1-4, 2012
132012
3HA: hybrid hole healing algorithm in a wireless sensor networks
A Khelil, R Beghdad, A Khelloufi
Wireless Personal Communications 112, 587-605, 2020
122020
Efficient coverage protocol without location information
R Beghdad
International Journal of Sensor Networks 11 (4), 263-273, 2012
122012
BCP: A Border Coverage Protocol for wireless sensor networks
A Dabba, R Beghdad
2014 Science and Information Conference, 632-640, 2014
92014
Critical study of supervised learning techniques in predicting attacks
R Beghdad
Information Security Journal: A Global Perspective 19 (1), 22-35, 2010
92010
PEAS-LI: PEAS with location information for coverage in wireless sensor networks
R Beghdad, MA Hocini, N Cherchour, M Chelik
Journal of Innovation in Digital Ecosystems 3 (2), 163-171, 2016
82016
Distributed algorithm for coverage and connectivity in wireless sensor networks
A Khelil, R Beghdad
Computer Science and Its Applications: 5th IFIP TC 5 International …, 2015
82015
Increasing QoS parameters in WSNs through Spiral-Based clustered architecture
T Azizi, R Beghdad
Procedia Computer Science 83, 401-408, 2016
72016
Maximizing bandwidth in wireless sensor networks using TDMA protocol
T Azizi, R Beghdad
2014 Science and Information Conference, 678-684, 2014
72014
Bandwidth assignment in a cluster-based wireless sensor network
T Azizi, R Beghdad, M Oussalah
Proceedings of the World Congress on Engineering 2, 2013
72013
DS-kNN: An intrusion detection system based on a distance sum-based K-nearest neighbors
R Taguelmimt, R Beghdad
International Journal of Information Security and Privacy (IJISP) 15 (2 …, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20