Ahmed Meddahi

According to our database1, Ahmed Meddahi authored at least 27 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV.
Proceedings of the Security and Privacy in Communication Networks, 2019

Pancake graphs for lookup acceleration and optimization in P2P networks.
Web Intell., 2018

NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures.
IEEE Commun. Surv. Tutorials, 2018

A First Step Towards Security Extension for NFV Orchestrator.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

De Bruijn Graph Based Solution for Lookup Acceleration and Optimization in P2P Networks.
Wirel. Pers. Commun., 2015

A self-adaptive ALM architecture for P2P media streaming.
Proceedings of the International Conference on Protocol Engineering, 2015

A Pragmatic and Scalable Solution for Free Riding Problem in Peer to Peer Networks.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

A Cross Layer Balanced Routing Protocol for Differentiated Traffics over Mobile Ad Hoc Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

An enhanced routing protocol for 802.11s-LTE communications.
Proceedings of the ISWCS 2013, 2013

An enhanced Quality Aware Multi path routing protocol over MA-NETs based on cross layer approach.
Proceedings of the ISWCS 2013, 2013

A weighted QoS aware multipath routing process in Mobile Ad hoc networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity.
J. Netw. Comput. Appl., 2012

GPM: A generic and scalable P2P model that optimizes tree depth for multicast communications.
Int. J. Commun. Syst., 2012

Peer to Peer Networks Management Survey
CoRR, 2012

An enhanced chord-based P2P lookup protocol for mobile Ad hoc networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

Multi Group Key Agreement Mechanism for Mobile P2P Wireless Networks.
Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), 2011

A Scalable Approach for Application Layer Multicast in P2P Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

A P2P Framework for Decentralized Xconferencing and Its JXTA Implementation.
Proceedings of the Second International Conference on Complex, 2008

A scalable P2P model for optimizing application layer multicast.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

"Packet-E-Model": E-Model for VoIP quality evaluation.
Comput. Networks, 2006

"MOSQoS": Subjective VoIP Quality for Feedback Control and Dynamic QoS Adaptation.
Proceedings of IEEE International Conference on Communications, 2006

"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization.
Proceedings of the Management of Convergence Networks and Services, 2006

Toward Feasibility and Scalability of Session Initiation and Dynamic QoS Provisioning in Policy-Enabled Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Smart Profile: A New Method for Minimising SIP Messages.
Proceedings of the Telecommunications and Networking, 2004

"Packet-e-model": e-model for wireless VoIP quality evaluation.
Proceedings of the IEEE 14th International Symposium on Personal, 2003