Publications

On-the-fly algorithm for the service composition problem

Published in In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "On-the-fly algorithm for the service composition problem." In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015.

Modal Specifications for Composition of Agent Behaviors

Published in In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "Modal Specifications for Composition of Agent Behaviors." In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014.

Fast Algorithm for Deep Packet Inspection

Published in In the proceedings of International Conference on Networked Digital Technologies, 2012

Use Google Scholar for full citation

Recommended citation: Salam Barbary, Hikmat Farhat, Khalil Challita, "Fast Algorithm for Deep Packet Inspection." In the proceedings of International Conference on Networked Digital Technologies, 2012.

A symbolic method for the web service composition problem

Published in In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "A symbolic method for the web service composition problem." In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012.

Static parsing steganography

Published in In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Khalil Challita, Joseph Zalaket, "Static parsing steganography." In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011.

Combining steganography and cryptography: new directions

Published in International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, "Combining steganography and cryptography: new directions." International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011.

Authentication and Authorization in Web Services

Published in In the proceedings of International Conference on Networked Digital Technologies, 2011

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, Joseph Zalaket, "Authentication and Authorization in Web Services." In the proceedings of International Conference on Networked Digital Technologies, 2011.

Integrating Mobile Agents into Network Access Control

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Integrating Mobile Agents into Network Access Control." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

Biometric Authentication for Intrusion Detection Systems

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Biometric Authentication for Intrusion Detection Systems." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

On the use of path identification to block attack packets

Published in In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "On the use of path identification to block attack packets." In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009.

Optimizing the performance of multi-homed networks

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "Optimizing the performance of multi-homed networks." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

A scalable method to protect from IP spoofing

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "A scalable method to protect from IP spoofing." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

A Memory Efficient Anti-Spoofing Method

Published in Journal of Information Assurance and Security, 2008

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "A Memory Efficient Anti-Spoofing Method." Journal of Information Assurance and Security, 2008.

ITS: A DDoS Mitigating Architecture

Published in In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "ITS: A DDoS Mitigating Architecture." In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007.

An Effective Defense Against Spoofed IP Traffic

Published in In the proceedings of New Technologies, Mobility and Security, 2007

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "An Effective Defense Against Spoofed IP Traffic." In the proceedings of New Technologies, Mobility and Security, 2007.

Protecting TCP services from denial of service attacks

Published in In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "Protecting TCP services from denial of service attacks." In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006.