Jalel Ben-Othman

According to our database1, Jalel Ben-Othman authored at least 246 papers between 1998 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Virtual Emotion Detection Architecture With Two-Way Enabled Delay Bound toward Evolutional Emotion-Based IoT Services.
IEEE Trans. Mob. Comput., 2022

Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach.
Softw. Pract. Exp., 2022

Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.
Sensors, 2022

Intelligent Aerial-Ground Surveillance and Epidemic Prevention with Discriminative Public and Private Services.
IEEE Netw., 2022

Markov Chain Mobility Model for Multi-lane Highways.
Mob. Networks Appl., 2022

A stochastic mobility model for traffic forecasting in urban environments.
J. Parallel Distributed Comput., 2022

Service discovery and selection in IoT: A survey and a taxonomy.
J. Netw. Comput. Appl., 2022

A Successive Epidemic Prevention Infrastructure Using Mobile Robots and Smart Devices in Intelligent Public Area.
IEEE Commun. Lett., 2022

Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks.
Comput. Networks, 2022

Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles.
Clust. Comput., 2022

Dealing with complex routing requirements using an MCDM based approach.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Network intrusion detection using Machine Learning approach.
Proceedings of the ICICM 2022: The 12th International Conference on Information Communication and Management, London, United Kingdom, July 13, 2022

An MDP model-based initial strategy prediction method for LoRaWAN.
Proceedings of the IEEE International Conference on Communications, 2022

Optimization of the Deployment of Wireless Sensor Networks Dedicated to Fire Detection in Smart Car Parks using Chaos Whale Optimization Algorithm.
Proceedings of the IEEE International Conference on Communications, 2022

Machine Learning Methods for Enhanced Cyber Security Intrusion Detection System.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

2021
Dispatch of UAVs for Urban Vehicular Networks: A Deep Reinforcement Learning Approach.
IEEE Trans. Veh. Technol., 2021

FAMU: Fault-Tolerant Mutual Assisted Virtual Emotion Barrier System Using Intelligent Smart UAVs.
IEEE Trans. Veh. Technol., 2021

An Efficient WSN Based Solution for Border Surveillance.
IEEE Trans. Sustain. Comput., 2021

Performance evaluation of a solution for composite service selection problem with multiple consumers.
Simul. Model. Pract. Theory, 2021

Guest Editorial: AI-Empowered Mobile Edge Computing in the Internet of Vehicles.
IEEE Netw., 2021

Guest Editorial: Ubiquitous IoT with Integrated Space, Air, Ground, and Ocean Networks.
IEEE Netw., 2021

Energy-efficient user association with load-balancing for cooperative IIoT network within B5G era.
J. Netw. Comput. Appl., 2021

Energy-spectral efficiency trade-off optimization for downlink multi-user non orthogonal multiple access systems.
Int. J. Commun. Syst., 2021

A Virtual Emotion Detection System With Maximum Cumulative Accuracy in Two-Way Enabled Multi Domain IoT Environment.
IEEE Commun. Lett., 2021

A Secure Authentication and Data Sharing Scheme for Wireless Sensor Networks based on Blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

TA- TDMA: A traffic aware TDMA MAC protocol for safety applications in VANET.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

MULANE - A Lightweight Extendable Agent-oriented LoRaWAN Simulator with GUI.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Queuing theory based simulation model for vehicular mobility.
Proceedings of the ICC 2021, 2021

The use of Grid- sizes Clustering and K-means Algorithms to enhance the QoS in LEACH protocol.
Proceedings of the ICC 2021, 2021

Combination of MDC and K-Means to improve LEACH.
Proceedings of the ICC 2021, 2021

STEPS - Score Table based Evaluation and Parameters Surfing approach of LoRaWAN.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Matching Game With No-Regret Learning for IoT Energy-Efficient Associations With UAV.
IEEE Trans. Green Commun. Netw., 2020

Blockchain for Managing Heterogeneous Internet of Things: A Perspective Architecture.
IEEE Netw., 2020

Emerging Intelligent Systems and Smart Computational Technologies for Future IoT.
IEEE Netw., 2020

Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices.
IEEE Netw., 2020

CONTVERB: Continuous Virtual Emotion Recognition Using Replaceable Barriers for Intelligent Emotion-Based IoT Services and Applications.
IEEE Netw., 2020

Toward Integrated Virtual Emotion System with AI Applicability for Secure CPS-Enabled Smart Cities: AI-Based Research Challenges and Security Issues.
IEEE Netw., 2020

Editorial: Intelligent and Holistic Solutions for Next Generation Wireless Networks.
Mob. Networks Appl., 2020

Joint pairing and resource allocation for backhaul of small cells using NOMA.
J. Comput. Sci., 2020

Two-sided matching framework for optimal user association in 5G multi-RAT UDNs.
Int. J. Commun. Syst., 2020

A multi-stage resource-constrained spectrum access mechanism for cognitive radio IoT networks: Time-spectrum block utilization.
Future Gener. Comput. Syst., 2020

UAV for Wireless Power Transfer in IoT Networks: A GMDP approach.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

New Network Slicing Scheme for UE Association Solution in 5G Ultra Dense HetNets.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Application of Graph Theory in IoT for Optimization of Connected Healthcare System.
Proceedings of the IEEE Global Communications Conference, 2020

Wireless energy supply scheduling strategy in a combined border surveillance architecture.
Proceedings of the IEEE Global Communications Conference, 2020

Continuous Time Markov Chain Traffic Model for Urban Environments.
Proceedings of the IEEE Global Communications Conference, 2020

Routing Protocol LEACH-K Using K-Means Algorithm in Wireless Sensor Network.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

A Stochastic Traffic Model for Congestion Detection in Multi-lane Highways.
Proceedings of the Ad Hoc Networks - 12th EAI International Conference, 2020

2019
UDiPP: A Framework for Differential Privacy Preserving Movements of Unmanned Aerial Vehicles in Smart Cities.
IEEE Trans. Veh. Technol., 2019

A Framework for IoT-Enabled Virtual Emotion Detection in Advanced Smart Cities.
IEEE Netw., 2019

Signaling game approach to improve the MAC protocol in the underwater wireless sensor networks.
Int. J. Commun. Syst., 2019

Sniff-Phish: A novel framework for resource intensive computation in cloud to detect email scam.
Trans. Emerg. Telecommun. Technol., 2019

Mobile delay-tolerant networks with energy-harvesting and wireless energy transfer cooperation.
Concurr. Comput. Pract. Exp., 2019

QoS enhancement with deep learning-based interference prediction in mobile IoT.
Comput. Commun., 2019

Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things.
IEEE Access, 2019

Resource Allocation in Moving Small Cell Network using Deep Learning based Interference Determination.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

Backhaul Pairing of Small Cells Using Non-Orthogonal Multiple Access.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

A Seamless Virtual Emotion System with Replaceable Detection toward Proper Emotion-based IoT Services.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Energy-Efficient Associations for IoT networks with UAV: A Regret Matching Based Approach.
Proceedings of the 9th International Conference on Information Communication and Management, 2019

Security for Connected Vehicles in Cyberspace.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

UAV for Energy-Efficient IoT Communications: Matching Game Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Adaptive Activation Scheduling Strategy for a Border Surveillance Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Delay-Bounded Virtual Emotion Recognition Using IoT Barriers in Advanced Smart Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Dealing with a non green behaviour in WSN.
Simul. Model. Pract. Theory, 2018

Covert Communication Networks in Hostile Environments.
Secur. Commun. Networks, 2018

A New Energy Efficiency/Spectrum Efficiency Model for Cooperative Cognitive Radio Network.
Mob. Networks Appl., 2018

CGAM: A community and geography aware mobility model.
Int. J. Commun. Syst., 2018

A Collision-Free Surveillance System Using Smart UAVs in Multi Domain IoT.
IEEE Commun. Lett., 2018

Multi-Channel Cognitive Radio Ad Hoc Networks.
IEEE Commun. Mag., 2018

Designing UAV Surveillance Frameworks for Smart City and Extensive Ocean with Differential Perspectives.
IEEE Commun. Mag., 2018

Emerging Technologies for Connected and Smart Vehicles.
IEEE Commun. Mag., 2018

Channel Assignment for D2D communication : A Regret Matching Based Approach.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

An Investigation on Wannacry Ransomware and its Detection.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Failure Detection in MANETs based on geographical repartition of nodes.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Caching as a Service for 5G Networks: A Matching Game Approach for CaaS Resource Allocation.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

A Decentralized Control of Autonomous Delay Tolerant Networks: Multi Agents Markov Decision Processes Framework.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Modeling Accordion Method Using SAN.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On Virtual Emotion Barrier in Internet of Things.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

New User Association Scheme Based on Multi-Objective Optimization for 5G Ultra-Dense Multi-RAT HetNets.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Game Model for Dynamic Cell Association of Macro-User in Two-Tier Cellular Networks.
Proceedings of the IEEE Global Communications Conference, 2018

A New Profile-QoS Aware User Association Scheme for 5G Ultra-Dense mmW-µW HetNets.
Proceedings of the IEEE Global Communications Conference, 2018

Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios.
Proceedings of the IEEE Global Communications Conference, 2018

MAC Protocol-Based Depth Adjustment and Splitting Mechanism for UnderWater Sensor Network (UWSN).
Proceedings of the IEEE Global Communications Conference, 2018

2017
GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs.
IEEE Trans. Mob. Comput., 2017

Performance analysis and evaluation of REFIACC using queuing networks.
Simul. Model. Pract. Theory, 2017

Collision-free reinforced barriers in UAV networks.
J. Comput. Sci., 2017

Constructing event-driven partial barriers with resilience in wireless mobile sensor networks.
J. Netw. Comput. Appl., 2017

Dynamic and adaptive detection method for flooding in wireless sensor networks.
Int. J. Commun. Syst., 2017

A novel hybrid protocol of checkpointing and rollback recovery for flat MANETs.
Int. J. Auton. Adapt. Commun. Syst., 2017

HeteRBar: Construction of Heterogeneous Reinforced Barrier in Wireless Sensor Networks.
IEEE Commun. Lett., 2017

A Survey on Reliability Protocols in Wireless Sensor Networks.
ACM Comput. Surv., 2017

DoS detection in WSNs: Energy-efficient methods for selecting monitoring nodes.
Concurr. Comput. Pract. Exp., 2017

Maximizing the lifetime of reinforced barriers in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

REFIACC: Reliable, efficient, fair and interference-aware congestion control protocol for wireless sensor networks.
Comput. Commun., 2017

Model driven flexible design of a wireless body sensor network for health monitoring.
Comput. Networks, 2017

Toward Eco-Friendly Smart Mobile Devices for Smart Cities.
IEEE Commun. Mag., 2017

A New Model for Cooperative Cognitive Radio Network Using Coalitional Game.
Proceedings of the Wireless Internet - 10th International Conference, 2017

REFIACC Scheme Evaluation Using Analytical Modeling.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Admission Control Based on WRR in WiMAX Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

On collision-free reinforced barriers for multi domain IoT with heterogeneous UAVs.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

A game-theoretic approach for non-overlapping communities detection.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Random walk based co-occurrence prediction in location-based social networks.
Proceedings of the IEEE International Conference on Communications, 2017

On the applicability of SAN in modeling and analyzing a Priority Queue Management based congestion control for WMSNs.
Proceedings of the IEEE International Conference on Communications, 2017

On differential privacy-preserving movements of unmanned aerial vehicles.
Proceedings of the IEEE International Conference on Communications, 2017

Graph-Based MDP to Mobile Source with Energy Harvesting in Delay Tolerant Networks System.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Towards an efficient failure detection in MANETs.
Wirel. Commun. Mob. Comput., 2016

Coalitional game-based behavior analysis for spectrum access in cognitive radios.
Wirel. Commun. Mob. Comput., 2016

Meeting Always-Best-Connected paradigm in heterogeneous vehicular networks: A graph theory and a signaling game analysis.
Veh. Commun., 2016

Achieving QoS in Virtual MIMO systems: a satisfaction equilibrium analysis.
EURASIP J. Wirel. Commun. Netw., 2016

Distributed implementation of a stable storage for MANET checkpointing protocols.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Stochastic models for IEEE 802.11p.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

A college admissions game for content caching in heterogeneous delay tolerant networks.
Proceedings of the 23rd International Conference on Telecommunications, 2016

On resilient event-driven partial barriers in mobile sensor networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A game theoretic approach for an hybrid overlay-underlay spectrum access mode.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EAFD, a failure detector for clustered WSN.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Towards Improving Energy Efficiency of Mobiles in Hyper Dense LTE Small-Cells Deployments.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Markov Chain Model for Integrating Context in Recommender Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

On Construction of Collision-Free UAV Reinforced Barrier.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Call Admission Control in Small Cell Networks with Retrials and Guard Channels.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Novel Reaction Scheme against the MAC Layer Misbehavior in Mobile Ad Hoc Networks.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

Multivariate Control Chart for the Detection of MAC Layer Misbehavior in Mobile ad Hoc Networks.
Proceedings of the 7th International Conference on Ambient Systems, 2016

Detection of Jamming Attacks in Mobile Ad Hoc Networks Using Statistical Process Control.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
A ferry-assisted solution for forwarding function in Wireless Sensor Networks.
Pervasive Mob. Comput., 2015

DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks.
Perform. Evaluation, 2015

CCS_WHMS: A Congestion Control Scheme for Wearable Health Management System.
J. Medical Syst., 2015

Performance evaluation of composite Web services.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation.
Int. J. Commun. Syst., 2015

Formal Modeling of Greedy Nodes in 802.15.4 WSN.
ICT Express, 2015

A coalitional-game-based incentive mechanism for content caching in heterogeneous Delay Tolerant Networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

AFDAN: Accurate failure detection protocol for MANETs.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Formal modeling and analysis of greedy behaviors in IEEE 802.11 protocols.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Preventing Denial of Service attacks in Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An efficient transmitting strategy for image fusion in WMSN.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Fair Election of Monitoring Nodes in WSNs.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Signaling Game-Based Mechanism to Meet Always Best Connected Service in VANETs.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Performance Study of Next Generation Cellular Networks with Base Stations Channels Vacations.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Improving Failure Detection in Mobile Ad Hoc Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Performance Analysis of WiMAX Networks AC.
Wirel. Pers. Commun., 2014

Survey on VANET security challenges and possible cryptographic solutions.
Veh. Commun., 2014

Timed automata based modeling and veri?cation of denial of service attacks in wireless sensor networks.
Stud. Inform. Univ., 2014

The impact of breakdowns disciplines and repeated attempts on performances of Small Cell Networks.
J. Comput. Sci., 2014

Formal modeling and verification of an enhanced variant of the IEEE 802.11 CSMA/CA protocol.
J. Commun. Networks, 2014

Special issue on last advances on QoS and security in wireless networks.
J. Commun. Networks, 2014

Congestion Control Protocols in Wireless Sensor Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2014

The greening of spectrum sensing: a minority game-based mechanism design.
IEEE Commun. Mag., 2014

An energy aware algorithm for OLSR clustering.
Ann. des Télécommunications, 2014

Performance evaluation tools for QoS MAC protocol for wireless sensor networks.
Ad Hoc Networks, 2014

AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks.
Proceedings of the 17th ACM International Conference on Modeling, 2014

A semi-persistent scheduling scheme for videotelephony traffics in the uplink of LTE networks.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Detection of Greedy Behavior in WSN Using IEEE 802.15 Protocol.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

A tax-inspired mechanism design to achieve QoS in VMIMO systems: Give to receive!
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Formal modeling and checking of an enhanced variant of the IEEE 802.11 CSMA/CA protocol.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Stochastic automata networks for performance evaluation of composite Web services.
Proceedings of the 14th International Conference on Innovations for Community Services, 2014

Energy-balancing method to detect denial of service attacks in wireless sensor networks.
Proceedings of the IEEE International Conference on Communications, 2014

Green opportunistic access for cognitive radio networks: A minority game approach.
Proceedings of the IEEE International Conference on Communications, 2014

POMDP game framework for service providers inciting mobile users.
Proceedings of the IEEE International Conference on Communications, 2014

Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks.
Proceedings of the IEEE International Conference on Communications, 2014

An enhanced two level scheduler to increase multimedia services performance in LTE networks.
Proceedings of the IEEE International Conference on Communications, 2014

Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks.
Proceedings of the IEEE Global Communications Conference, 2014

Modeling and verification tools for jamming attacks in VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

Interference-aware Congestion Control Protocol for Wireless Sensor Networks.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

Congestion Detection Strategies in Wireless Sensor Networks: A Comparative Study with Testbed Experiments.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

2013
Performance comparison between IBE-HWMP and ECDSA-HWMP.
Secur. Commun. Networks, 2013

Self-stabilizing algorithm for efficient topology control in Wireless Sensor Networks.
J. Comput. Sci., 2013

IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s.
Concurr. Comput. Pract. Exp., 2013

Detecting DoS attacks in WSN based on clustering technique.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Solution of detecting jamming attacks in vehicle ad hoc networks.
Proceedings of the 16th ACM International Conference on Modeling, 2013

Data protection in multipath WSNs.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Performance and reliability analysis of Small Cell Networks with retrials and different breakdowns disciplines: A computational approach.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Packet dropping for real-time applications in wireless networks.
Proceedings of IEEE International Conference on Communications, 2013

Clustering wireless sensors networks with FFUCA.
Proceedings of IEEE International Conference on Communications, 2013

When Dynamic VM Migration Falls under the Control of VM Users.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Quantitative Verification of WiMAX Traffic Shaping Solutions.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Dynamic power control for energy harvesting wireless multimedia sensor networks.
EURASIP J. Wirel. Commun. Netw., 2012

Traffic management based on token bucket mechanism for WiMAX networks.
Clust. Comput., 2012

Channel allocation strategies in opportunistic-based cognitive networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Dynamic power control with energy constraint for Multimedia Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2012

A novel mechanism to secure internal attacks in HWMP routing protocol.
Proceedings of IEEE International Conference on Communications, 2012

Performance evaluation of security routing strategies to avoid DoS attacks in WSN.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Optimal distributed relay selection for duty-cycling Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A new method to secure RA-OLSR using IBE.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Admission control mechanism and performance analysis based on stochastic automata networks formalism.
J. Parallel Distributed Comput., 2011

A light weight security scheme for HWMP protocol using Elliptic Curve technique.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Self-stabilizing algorithm for energy saving in Wireless Sensor Networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

An Energy Efficient Priority-Based QoS MAC Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

A New Architecture of Wireless Mesh Networks Based IEEE 802.11s Directional Antennas.
Proceedings of IEEE International Conference on Communications, 2011

On Securing HWMP Using IBC.
Proceedings of IEEE International Conference on Communications, 2011

Sectorial Coverage in a Deployment of a WMN Backbone Based on Directional Antennas.
Proceedings of the Global Communications Conference, 2011

Performance Comparison between IBC-HWMP and Hash-HWMP.
Proceedings of the Global Communications Conference, 2011

2010
Energy efficient and QoS based routing protocol for wireless sensor networks.
J. Parallel Distributed Comput., 2010

Enhancing data security in ad hoc networks based on multipath routing.
J. Parallel Distributed Comput., 2010

Energy efficient and QoS aware medium access control for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2010

Performance evaluation of a hybrid MAC protocol for wireless sensor networks.
Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2010

A peer-to-peer based naming system for Mobile Ad Hoc Networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

On improving the performance of IEEE 802.11s based wireless mesh networks using directional antenna.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

RELAX: An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Traffic Policing Based on Token Bucket Mechanism for WiMAX Networks.
Proceedings of IEEE International Conference on Communications, 2010

Q-HWMP: Improving End-to-End QoS for 802.11s Based Mesh Networks.
Proceedings of the Global Communications Conference, 2010

Improving QoS for BE traffics in WIMAX networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Towards a classification of energy aware MAC protocols for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2009

Stochastic Automata Networks for Modelling Scheduling Scheme in WiMAX Networks.
J. Interconnect. Networks, 2009

Amclm: Adaptive Multi-Services Cross-Layer MAC Protocol for IEEE 802.11 Networks.
J. Interconnect. Networks, 2009

An energy efficient and QoS aware multipath routing protocol for wireless sensor networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

The 9th IEEE international workshop on Wireless Local Networks (WLN 2009).
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Defending method against jamming attack in wireless ad hoc networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

An adaptive mobility aware and energy efficient MAC protocol for wireless sensor networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Performance analysis of composite web services using Stochastic Automata Networks over IP network.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution.
Proceedings of IEEE International Conference on Communications, 2009

REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Detection of Radio Interference Attacks in VANET.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Performance Evaluation of Mobile Networks Based on Stochastic Ordering Markov Chains.
Stud. Inform. Univ., 2008

A multi-service MAC protocol in a multi-channel CSMA/CA for IEEE 802.11 networks.
J. Commun. Networks, 2008

A scalable and energy-efficient hybrid-based MAC protocol for wireless sensor networks.
Proceedings of the 3rd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2008

Achieving host mobility using DNS dynamic updating protocol.
Proceedings of the LCN 2008, 2008

Performance analysis of an admission control enhancement in WIMAX networks using SAN.
Proceedings of the LCN 2008, 2008

Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Performance Analysis of UGS, rtPS, nrtPS Admission Control in WiMAX Networks.
Proceedings of IEEE International Conference on Communications, 2008

An Energy Efficient Hybrid Medium Access Control Scheme for Wireless Sensor Networks with Quality of Service Guarantees.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Estimation of the Useful Channel Occupation in 802.11g Ad-Hoc Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Performance evaluation of TCP handoffs over mobile IP connections.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Improving the Bandwidth Sharing in IEEE 802.11.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

802.11 Qos Cross-Layer Protocol Based Propagation Conditions Adaptation.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Logical Wormhole Prevention in Optimized Link State Routing Protocol.
Proceedings of the Global Communications Conference, 2007

2006
VIP (VHE in Mobile IP Networks) Architecture.
J. Commun., 2006

Facing 802.11 Anomaly and Improving 802.11 WLANs QoS Using a Crosslayer Design Based Unselfish Behavior.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

VIP (VHE in mobile IP networks) architecture.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

ATHOMIC: Architecture managing Tcp Handoff Over Mobile Ip Connections.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
A Solution to Improve the TCP Performance in the Presence of Handoffs in Wireless IP Networks.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

A new approach to manage roaming in IPv6.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

Multi-services MAC protocol for wireless networks.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Mobile Databases: a Selection of Open Issues and Research Directions.
SIGMOD Rec., 2004

A Trust-Based Routing Protocol for Ad Hoc Networks.
Proceedings of the Mobile and Wireless Communication Networks, 2004

Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

2003
Data security in ad hoc networks using multipath routing.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

SERAN: A new protocol to hide an equipment in ad hoc networks.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
Security equipment in ad hoc networks.
Proceedings of the 55th IEEE Vehicular Technology Conference, 2002

Mobility and security in IP network.
Proceedings of the 13th IEEE International Symposium on Personal, 2002

2001
Quality of Service of A Rerouting Algorithm Using Stochastic Automata Networks.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

2000
Providing quality of service in mobile environments with MIR (Mobile IP Reservation Protocol).
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

1999
Multiservice Allocation in Hierarchical Cellular Networks (MAHCN).
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

1998
MRAP: A multiservices resource allocation policy for wireless ATM network.
Comput. Networks ISDN Syst., 1998


  Loading...