default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2024
- Ziad Ismaili Alaoui, Detlef Plump:
Linear-Time Graph Programs for Unbounded-Degree Graphs. ICGT 2024: 3-20 - 2023
- Mua'ad Abu-Faraj, Abeer Y. Al-Hyari, Charlie Obimbo, Khaled Aldebei, Ismail Al-Taharwa, Ziad A. Alqadi, Orabe Almanaseer:
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps. Cryptogr. 7(2): 20 (2023) - 2022
- Mua'ad Abu-Faraj, Abeer Y. Al-Hyari, Ismail Al-Taharwa, Bilal Al-Ahmad, Ziad A. Alqadi:
CASDC: A Cryptographically Secure Data System Based on Two Private Key Images. IEEE Access 10: 126304-126314 (2022) - Ismail Mohammadi, Jafar Sobhi, Abdolhamid Moallemi Khiavi, Ziaddin Daei Koozehkanani:
A low power MASH digital delta-sigma modulator with accurate output average value. Microelectron. J. 121: 105381 (2022) - Luqman Ali, Fady Alnajjar, Medha Mohan Ambali Parambil, Mohammad Issam Younes, Ziad Ismail Abdelhalim, Hamad Aljassmi:
Development of YOLOv5-Based Real-Time Smart Monitoring System for Increasing Lab Safety Awareness in Educational Institutions. Sensors 22(22): 8820 (2022) - Ziad El-Khatib, Adel Ben Mnaouer, Sherif Moussa, Mohd Azman Bin Abas, Nor Azman Ismail, Fuad Abdulgaleel, Ibrahim Elmasri, Loay Ashraf:
LoRa-enabled GPU-based CubeSat Yolo Object Detection with Hyperparameter Optimization. ISNCC 2022: 1-4 - 2021
- Mohamad Arnaout, Hassan Ismail, Hassan Jaber, Ali Koubayssi, Rabih Rammal, Ziad Noun:
Study and Review on the Renewable Energy Potential in Lebanon. ICM 2021: 199-202 - 2019
- Christophe Kiennert, Ziad Ismail, Hervé Debar, Jean Leneutre:
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization. ACM Comput. Surv. 51(5): 90:1-90:31 (2019) - 2018
- Mahmoud Ismail, Mina Attari, Saeid R. Habibi, Samir Ziada:
Estimation theory and Neural Networks revisited: REKF and RSVSF as optimization techniques for Deep-Learning. Neural Networks 108: 509-526 (2018) - Ziad Ismail, Jean Leneutre, Alia Fourati:
Optimal Deployment of Security Policies: Application to Industrial Control Systems. EDCC 2018: 120-127 - 2017
- Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen:
A Game Theoretical Model for Optimal Distribution of Network Security Resources. GameSec 2017: 234-255 - 2016
- Ziad Ismail:
Optimal defense strategies to improve the security and resilience of Smart Grids. (Stratégies de défense optimales pour améliorer la sécurité et la résilience des Smart Grids). Télécom Paris, France, 2016 - Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen:
Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis. IEEE Trans. Inf. Forensics Secur. 11(8): 1685-1699 (2016) - Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. GameSec 2016: 159-171 - 2015
- Ismail Mohammadi, Ali Sahafi, Jafar Sobhi, Ziaddin Daei Koozehkanani:
A linear, low power, 2.5-dB NF LNA for UWB application in a 0.18 μm CMOS. Microelectron. J. 46(12): 1398-1408 (2015) - Ziad Ismail, Jean Leneutre, Alia Fourati:
An Attack Execution Model for Industrial Control Systems Security Assessment. CyberICS/WOS-CPS@ESORICS 2015: 157-167 - Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures. HASE 2015: 101-109 - Ziad Ismail, Danai Symeonidou, Fabian M. Suchanek:
DIVINA: Discovering Vulnerabilities of Internet Accounts. WWW (Companion Volume) 2015: 203-206 - 2014
- Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI. IEEE J. Sel. Areas Commun. 32(7): 1486-1499 (2014) - 2011
- Anis Ismail, Aziz Barbar, Ziad Ismail:
P2P Queries Routing Using Distributed Knowledge. DEIS 2011: 144-157 - Anis Ismail, Abd El Salam Al Hajjar, Ziad Ismail:
A New System Architecture for Pervasive Computing. CoRR abs/1108.2389 (2011) - Anis Ismail, Aziz Barbar, Ziad Ismail:
P2P Simulator for Queries Routing using Data Mining. CoRR abs/1109.1134 (2011) - 2006
- Ismail Ben Ayed, Amar Mitiche, Ziad Belhadj:
Polarimetric Image Segmentation via Maximum-Likelihood Approximation and Efficient Multiphase Level-Sets. IEEE Trans. Pattern Anal. Mach. Intell. 28(9): 1493-1500 (2006) - Ismail Ben Ayed, Amar Mitiche, Ziad Belhadj:
Variational Unsupervised Segmentation of Multi-Look Complex Polarimetric Images using a Wishart Observation Model. ICIP 2006: 3233-3236 - 2005
- Ismail Ben Ayed, Amar Mitiche, Ziad Belhadj:
Multiregion Level-Set Partitioning of Synthetic Aperture Radar Images. IEEE Trans. Pattern Anal. Mach. Intell. 27(5): 793-800 (2005) - Ismail Ben Ayed, Amar Mitiche, Ziad Belhadj:
Level set curve evolution partitioning of polarimetric images. ICIP (1) 2005: 281-284 - 2004
- Ismail Ben Ayed, Carlos Vázquez, Amar Mitiche, Ziad Belhadj:
Sar image segmentation with active contours and level sets. ICIP 2004: 2717-2720
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-08 18:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint