Rachid BEGHDAD
Rachid BEGHDAD
Full Professor - Research Director
Verified email at univ-bejaia.dz - Homepage
Title
Cited by
Cited by
Year
Critical study of neural networks in detecting intrusions
R Beghdad
Computers & security 27 (5-6), 168-175, 2008
1142008
Boundary and holes recognition in wireless sensor networks
R Beghdad, A Lamraoui
Journal of Innovation in Digital Ecosystems 3 (1), 1-14, 2016
342016
Securing wireless sensor networks: A survey
S Ould Amara, R Beghdad, M Oussalah
EDPACS 47 (2), 6-29, 2013
272013
Defending AODV routing protocol against the black hole attack
F Ameza, N Assam, R Beghdad
international journal of computer science and information security 8 (2), 2010
252010
Modelling and solving the intrusion detection problem in computer networks
R Beghdad
Computers & Security 23 (8), 687-696, 2004
212004
Efficient deterministic method for detecting new U2R attacks
R Beghdad
Computer Communications 32 (6), 1104-1110, 2009
192009
Training all the KDD data set to classify and detect attacks
R Beghdad
Neural Network World 17 (2), 81, 2007
182007
Coverage and connectivity protocol for wireless sensor networks
A Khalil, R Beghdad
2012 24th International Conference on Microelectronics (ICM), 1-4, 2012
132012
Efficient coverage protocol without location information
R Beghdad
International Journal of Sensor Networks 11 (4), 263-273, 2012
122012
Dos-ddos: Taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
M Haddadi, R Beghdad
EDPACS 57 (5), 1-26, 2018
92018
Critical study of supervised learning techniques in predicting attacks
R Beghdad
Information Security Journal: A Global Perspective 19 (1), 22-35, 2010
92010
ESA: An efficient self-deployment algorithm for coverage in wireless sensor networks
A Khelil, R Beghdad
Procedia Computer Science 98, 40-47, 2016
82016
BCP: A Border Coverage Protocol for wireless sensor networks
A Dabba, R Beghdad
2014 Science and Information Conference, 632-640, 2014
82014
Maximizing bandwidth in wireless sensor networks using TDMA protocol
T Azizi, R Beghdad
2014 Science and Information Conference, 678-684, 2014
62014
On handling real-time communications in mac protocols.
S Mammeri, R Beghdad
Int. Arab J. Inf. Technol. 9 (5), 428-435, 2012
62012
APPLYING FISHER'S FILTER TO SELECT KDD CONNECTIONS'FEATURES AND USING NEURAL NETWORKS TO CLASSIFY AND DETECT ATTACKS
R Beghdad
Neural Network World 17 (1), 1, 2007
62007
PEAS-LI: PEAS with Location Information for coverage in Wireless Sensor Networks
R Beghdad, MA Hocini, N Cherchour, M Chelik
Journal of Innovation in Digital Ecosystems 3 (2), 163-171, 2016
52016
Bandwidth assignment in a cluster-based wireless sensor network
T Azizi, R Beghdad, M Oussalah
Proceedings of the World Congress on Engineering 2, 2013
52013
A flows-based QoS routing protocol for multicast communication networks
R Beghdad
International Journal of Computers and Applications 28 (1), 59-64, 2006
42006
CAC-UA: a communicating ant for clustering to detect unknown attacks
M Kemiche, R Beghdad
2014 Science and Information Conference, 515-522, 2014
32014
The system can't perform the operation now. Try again later.
Articles 1–20