Author of the publication

Security modeling and analysis of a self-cleansing intrusion tolerance technique.

, , and . IAS, page 111-117. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Haqiq, Abdelkrim
add a person with the name Haqiq, Abdelkrim
 

Other publications of authors with the same name

A Stochastic Game Analysis of the Binary Exponential Backoff Algorithm with Multi-Power Diversity and Transmission Cost., , , , and . J. Math. Model. Algorithms in OR, 12 (3): 291-309 (2013)A team study of the IEEE 802.16 collision resolution protocol., , and . Wireless Days, page 1-6. IEEE, (2010)An Improved UGS Scheduling with QoE Metrics in WiMAX Network., and . CoRR, (2014)Effect of the Feedback Function on the QoS in a Time Space Priority with Active Queue Management, , , and . CoRR, (2013)Performance Analysis of Connection Admission Control Scheme in IEEE 802.16 OFDMA Networks., , and . CoRR, (2013)Security modeling and analysis of a self-cleansing intrusion tolerance technique., , and . IAS, page 111-117. IEEE, (2015)Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless Mesh Networks., , , and . CoRR, (2013)Performance Analysis of VoIP Traffic in WiMAX using various Service Classes., and . CoRR, (2013)Performances Evaluation of Enhanced Basic Time Space Priority combined with an AQM, , , and . CoRR, (2013)Analysis of Performance Parameters in Wireless Networks by using Game Theory for the non Cooperative Slotted Aloha Enhanced by ZigZag Decoding Mechanism., and . CoRR, (2015)