Azeddine Bilami

According to our database1, Azeddine Bilami authored at least 25 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs.
Future Generation Comp. Syst., 2019

2018
A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks.
Int. J. Intelligent Computing and Cybernetics, 2018

A Cross-Layer Fault Tolerant Protocol with Recovery Mechanism for Clustered Sensor Networks.
IJDST, 2018

Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks.
IEEE Access, 2018

2017
A dynamic self-organising heterogeneous routing protocol for clustered WSNs.
IJWMC, 2017

MONet: A framework for self-adaptive energy-aware middleware for dynamic wireless sensor network.
Int. J. Pervasive Computing and Communications, 2017

Integration of energy aware WSNs in cloud computing using NDN approach.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

2016
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs.
Telecommunication Systems, 2016

An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Sensors, 2016

Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

2015
A Cross-Layer Communication Protocol with Transmission Power Adjustment for Energy Saving in Multi-hop MhWSNs.
Wireless Personal Communications, 2015

Hybrid Energy Efficient Protocol with Service Differentiation for QoS Provisions in Multi-Hop WSNs.
IJERTCS, 2015

A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs.
IEEE Communications Letters, 2015

Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things.
Computer Networks, 2015

2013
Cooperative Strategy to Secure Mobile P2P Network.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

A New Hybrid Authentication Protocol to Secure Data Communications in Mobile Networks.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

2012
A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

RTIC: Reputation and Trust Evaluation Based on Fuzzy LogIC System for Secure Routing in Mobile Ad Hoc Networks.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

2011
HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering.
IJSNet, 2011

Contention Window Optimization for Distributed Coordination Function (DCF) to Improve Quality of Service at MAC Layer.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

2010
Evolutionary research of optimal strategies for exclusive positioned clustering in simulated environment of collective robotics.
Robotics and Autonomous Systems, 2010

Adaptive oriented clustering in difficult environment of collective robotics.
Int. J. Intelligent Computing and Cybernetics, 2010

2009
Modélisation et Gestion de la Confiance dans les Réseaux Mobiles Ad hoc.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

2008
A hybrid energy aware routing algorithm for wireless sensor networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2005
Design and Evaluation of an Input Buffered Packet Switch.
Int. Arab J. Inf. Technol., 2005


  Loading...