Ahmed Meddahi

Orcid: 0000-0002-9255-2114

According to our database1, Ahmed Meddahi authored at least 39 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs.
Sensors, November, 2023

Review and Perspectives on the Audit of Vehicle-to-Everything Communications.
IEEE Access, 2023

Leveraging Blockchain for a Robust and Scalable Device Identification in LoRaWAN.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Adaptive ILP Formulation for Disaster-Resilient Service Function Chains in Beyond 5G Networks.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing.
Proceedings of the 19th International Conference on Network and Service Management, 2023

2022
Evaluating the cost of beyond AES-128 LoRaWAN security.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

2021
On Achieving Trustworthy Service Function Chaining.
IEEE Trans. Netw. Serv. Manag., 2021

Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Security and Privacy in Smart Cities.
Secur. Commun. Networks, 2021

SIP-GAN: Generative Adversarial Networks for SIP traffic generation.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2019
Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Pancake graphs for lookup acceleration and optimization in P2P networks.
Web Intell., 2018

NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures.
IEEE Commun. Surv. Tutorials, 2018

2017
A First Step Towards Security Extension for NFV Orchestrator.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
De Bruijn Graph Based Solution for Lookup Acceleration and Optimization in P2P Networks.
Wirel. Pers. Commun., 2015

A self-adaptive ALM architecture for P2P media streaming.
Proceedings of the International Conference on Protocol Engineering, 2015

A Priority Based Lookup Model for VoIP Applications in Unstructured P2P Networks.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015

2013
A Pragmatic and Scalable Solution for Free Riding Problem in Peer to Peer Networks.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

A Cross Layer Balanced Routing Protocol for Differentiated Traffics over Mobile Ad Hoc Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

An enhanced routing protocol for 802.11s-LTE communications.
Proceedings of the ISWCS 2013, 2013

An enhanced Quality Aware Multi path routing protocol over MA-NETs based on cross layer approach.
Proceedings of the ISWCS 2013, 2013

A weighted QoS aware multipath routing process in Mobile Ad hoc networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity.
J. Netw. Comput. Appl., 2012

GPM: A generic and scalable P2P model that optimizes tree depth for multicast communications.
Int. J. Commun. Syst., 2012

Peer to Peer Networks Management Survey
CoRR, 2012

Enhanced Backtracking Chord protocol for mobile Ad hoc networks.
Proceedings of the International Conference on Communications and Information Technology, 2012

2011
An enhanced chord-based P2P lookup protocol for mobile Ad hoc networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

Multi Group Key Agreement Mechanism for Mobile P2P Wireless Networks.
Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), 2011

2008
A Scalable Approach for Application Layer Multicast in P2P Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

A P2P Framework for Decentralized Xconferencing and Its JXTA Implementation.
Proceedings of the Second International Conference on Complex, 2008

A scalable P2P model for optimizing application layer multicast.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2006
"Packet-E-Model": E-Model for VoIP quality evaluation.
Comput. Networks, 2006

"MOSQoS": Subjective VoIP Quality for Feedback Control and Dynamic QoS Adaptation.
Proceedings of IEEE International Conference on Communications, 2006

"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
Toward Feasibility and Scalability of Session Initiation and Dynamic QoS Provisioning in Policy-Enabled Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

2004
Smart Profile: A New Method for Minimising SIP Messages.
Proceedings of the Telecommunications and Networking, 2004

2003
"Packet-e-model": e-model for wireless VoIP quality evaluation.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...