Lynda Mokdad

Orcid: 0000-0002-6182-4869

According to our database1, Lynda Mokdad authored at least 166 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments.
Internet Things, April, 2024

2023
Novel Denial-of-Service Attacks Against LoRaWAN on MAC Layer.
IEEE Commun. Lett., November, 2023

Affective Surveillance Management in Virtual Emotion Based Smart Complex Infrastructure.
IEEE Commun. Mag., October, 2023

Task-Oriented Surveillance Framework for Virtual Emotion Informatics in Polygon Spaces.
IEEE Wirel. Commun., June, 2023

Time Varied Self-Reliance Aerial Ground Traffic Monitoring System With Pre-Recognition Collision Avoidance.
IEEE Commun. Lett., May, 2023

Performance analysis to evaluate overtaking behavior on highways.
Simul. Model. Pract. Theory, April, 2023

Intelligent Terrestrial and Non-Terrestrial Vehicular Networks with Green AI and Red AI Perspectives.
Sensors, January, 2023

Dynamic Parameter Allocation With Reinforcement Learning for LoRaWAN.
IEEE Internet Things J., 2023

Analytical Study for Vehicle Mobility Modeling.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

MELoNS - A Modular and Extendable Simulator for LoRaWAN Network.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Enhancing Roundabout Performance Measures through a New Generic Simulink-Based Simulator.
Proceedings of the 13th International Conference on Information Communication and Management, 2023

Robustness and Resilience of LoRaWAN Facing Greedy Behaviors on the MAC Layer.
Proceedings of the IEEE International Conference on Communications, 2023

Probabilistic Model Checking for Unconfirmed Transmission in LoRaWAN on the MAC Layer.
Proceedings of the IEEE Global Communications Conference, 2023

Intelligent Urban Expressway Managing Architecture Using LoRaWAN and Edge Computing.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Virtual Emotion Detection Architecture With Two-Way Enabled Delay Bound toward Evolutional Emotion-Based IoT Services.
IEEE Trans. Mob. Comput., 2022

Service discovery and selection in IoT: A survey and a taxonomy.
J. Netw. Comput. Appl., 2022

A novel and efficient index based web service discovery approach.
Comput. Stand. Interfaces, 2022

Distributed architecture for resource description and discovery in the IoT.
CoRR, 2022

Dealing with complex routing requirements using an MCDM based approach.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

An MDP model-based initial strategy prediction method for LoRaWAN.
Proceedings of the IEEE International Conference on Communications, 2022

LoRaLOFT-A Local Outlier Factor-based Malicious Nodes detection Method on MAC Layer for LoRaWAN.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Performance evaluation of a solution for composite service selection problem with multiple consumers.
Simul. Model. Pract. Theory, 2021

MULANE - A Lightweight Extendable Agent-oriented LoRaWAN Simulator with GUI.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

ODM-RPL: Optimized Dual MOP RPL.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

STEPS - Score Table based Evaluation and Parameters Surfing approach of LoRaWAN.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A decision-making analysis in UAV-enabled wireless power transfer for IoT networks.
Simul. Model. Pract. Theory, 2020

VYPER: Vulnerability detection in binary code.
Secur. Priv., 2020

Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices.
IEEE Netw., 2020

CONTVERB: Continuous Virtual Emotion Recognition Using Replaceable Barriers for Intelligent Emotion-Based IoT Services and Applications.
IEEE Netw., 2020

Formal techniques for consistency checking of orchestrations of semantic Web services.
J. Comput. Sci., 2020

Dealing with value constraints in decision making using MCDM methods.
J. Comput. Sci., 2020

A taxonomy of service discovery approaches in IoT.
Proceedings of the 8th International Conference on Wireless Networks and Mobile Communications, 2020

Survey on the Cloud-IoT paradigms: Taxonomy and architectures.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2019
UDiPP: A Framework for Differential Privacy Preserving Movements of Unmanned Aerial Vehicles in Smart Cities.
IEEE Trans. Veh. Technol., 2019

A Framework for IoT-Enabled Virtual Emotion Detection in Advanced Smart Cities.
IEEE Netw., 2019

How to deal with QoS value constraints in MCDM based Web service selection.
Concurr. Comput. Pract. Exp., 2019

Formal specification and validation of refinement from WS-CDL to BPEL.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

A Seamless Virtual Emotion System with Replaceable Detection toward Proper Emotion-based IoT Services.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Formal Approach for Compatibility Checking of Orchestrations of Composite Semantic Web Services.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

ISOCOV: a new MCDM method to handle value constraints in Web service selection.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Performance Evaluation of the QoS Aware Web Service Composition with Communities of Consumers.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Delay-Bounded Virtual Emotion Recognition Using IoT Barriers in Advanced Smart Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Dealing with a non green behaviour in WSN.
Simul. Model. Pract. Theory, 2018

Detection of security vulnerabilities in C language applications.
Secur. Priv., 2018

Exploiting node mobility for fault management in RPL-based wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018

Designing UAV Surveillance Frameworks for Smart City and Extensive Ocean with Differential Perspectives.
IEEE Commun. Mag., 2018

Failure Detection in MANETs based on geographical repartition of nodes.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Modeling Accordion Method Using SAN.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On Virtual Emotion Barrier in Internet of Things.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A clustered trail-based data dissemination protocol for improving the lifetime of duty cycle enabled wireless sensor networks.
Wirel. Networks, 2017

Performance analysis and evaluation of REFIACC using queuing networks.
Simul. Model. Pract. Theory, 2017

Towards an efficient and a more accurate web service selection using MCDM methods.
J. Comput. Sci., 2017

Dynamic and adaptive detection method for flooding in wireless sensor networks.
Int. J. Commun. Syst., 2017

A novel hybrid protocol of checkpointing and rollback recovery for flat MANETs.
Int. J. Auton. Adapt. Commun. Syst., 2017

DoS detection in WSNs: Energy-efficient methods for selecting monitoring nodes.
Concurr. Comput. Pract. Exp., 2017

REFIACC Scheme Evaluation Using Analytical Modeling.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Admission Control Based on WRR in WiMAX Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

On collision-free reinforced barriers for multi domain IoT with heterogeneous UAVs.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Dealing with user constraints in MCDM based web service selection.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Queuing and service management for congestion control in wireless sensor networks using Markov Chains.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Modeling DoS attacks in WSNs with quantitative games.
Proceedings of the IEEE International Conference on Communications, 2017

On the applicability of SAN in modeling and analyzing a Priority Queue Management based congestion control for WMSNs.
Proceedings of the IEEE International Conference on Communications, 2017

On differential privacy-preserving movements of unmanned aerial vehicles.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Towards an efficient failure detection in MANETs.
Wirel. Commun. Mob. Comput., 2016

Distributed implementation of a stable storage for MANET checkpointing protocols.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

An efficient approach for Web service selection.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Stochastic models for IEEE 802.11p.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

EAFD, a failure detector for clustered WSN.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Call Admission Control in Small Cell Networks with Retrials and Guard Channels.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks.
Perform. Evaluation, 2015

Performance evaluation of composite Web services.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks.
Int. J. Commun. Syst., 2015

Formal Modeling of Greedy Nodes in 802.15.4 WSN.
ICT Express, 2015

AFDAN: Accurate failure detection protocol for MANETs.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Time Petri Nets for performance evaluation of composite web services architectures.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Formal modeling and analysis of greedy behaviors in IEEE 802.11 protocols.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Preventing Denial of Service attacks in Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An efficient transmitting strategy for image fusion in WMSN.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Performance Evaluation of Heterogeneous Servers Allocation Disciplines in Networks with Retrials.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Fair Election of Monitoring Nodes in WSNs.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Performance Study of Next Generation Cellular Networks with Base Stations Channels Vacations.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Improving Failure Detection in Mobile Ad Hoc Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Performance Analysis of WiMAX Networks AC.
Wirel. Pers. Commun., 2014

Timed automata based modeling and veri?cation of denial of service attacks in wireless sensor networks.
Stud. Inform. Univ., 2014

The impact of breakdowns disciplines and repeated attempts on performances of Small Cell Networks.
J. Comput. Sci., 2014

Formal modeling and verification of an enhanced variant of the IEEE 802.11 CSMA/CA protocol.
J. Commun. Networks, 2014

Performance evaluation tools for QoS MAC protocol for wireless sensor networks.
Ad Hoc Networks, 2014

Detection of Greedy Behavior in WSN Using IEEE 802.15 Protocol.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Formal modeling and checking of an enhanced variant of the IEEE 802.11 CSMA/CA protocol.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Stochastic automata networks for performance evaluation of composite Web services.
Proceedings of the 14th International Conference on Innovations for Community Services, 2014

Energy-balancing method to detect denial of service attacks in wireless sensor networks.
Proceedings of the IEEE International Conference on Communications, 2014

SAN-based modeling of fault tolerant protocols for MANETs.
Proceedings of the IEEE International Conference on Communications, 2014

Modeling and verification tools for jamming attacks in VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

Time Petri net based performance evaluation of traffic scheduling in WIMAX networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Modeling tools for detecting DoS attacks in WSNs.
Secur. Commun. Networks, 2013

Bounding models families for performance evaluation in composite Web services.
J. Comput. Sci., 2013

Performance evaluation of lifetime-driven admission control for infrastructure-less clustered wireless networks.
Concurr. Comput. Pract. Exp., 2013

Detecting DoS attacks in WSN based on clustering technique.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Solution of detecting jamming attacks in vehicle ad hoc networks.
Proceedings of the 16th ACM International Conference on Modeling, 2013

2PACA: Two phases algorithm of checkpointing for Ad hoc mobile networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Data protection in multipath WSNs.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Performance and reliability analysis of Small Cell Networks with retrials and different breakdowns disciplines: A computational approach.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Clustering wireless sensors networks with FFUCA.
Proceedings of IEEE International Conference on Communications, 2013

2012
An algorithm approach to bounding aggregations of multidimensional Markov chains.
Theor. Comput. Sci., 2012

Quantitative Verification of WiMAX Traffic Shaping Solutions.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Stochastic bounds for composite Web services response times.
Clust. Comput., 2012

A clustering method for wireless sensors networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Dynamic solution for detecting Denial of Service attacks in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

Performance evaluation of security routing strategies to avoid DoS attacks in WSN.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Call Admission Control Performance Analysis in Mobile Networks Using Stochastic Well-Formed Petri Nets.
IEEE Trans. Parallel Distributed Syst., 2011

Admission control mechanism and performance analysis based on stochastic automata networks formalism.
J. Parallel Distributed Comput., 2011

Performance analysis of a selective encryption algorithm for wireless ad hoc networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Evaluation of lifetime in wireless sensor networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Quantitative verification for response times in composite Web service model.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

E-TRAIL: Energy-Efficient Trail-Based Data Dissemination Protocol for Wireless Sensor Networks with Mobile Sinks.
Proceedings of IEEE International Conference on Communications, 2011

An Energy Efficient Priority-Based QoS MAC Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

A New Architecture of Wireless Mesh Networks Based IEEE 802.11s Directional Antennas.
Proceedings of IEEE International Conference on Communications, 2011

Sectorial Coverage in a Deployment of a WMN Backbone Based on Directional Antennas.
Proceedings of the Global Communications Conference, 2011

Performance Comparison between IBC-HWMP and Hash-HWMP.
Proceedings of the Global Communications Conference, 2011

2010
Enhancing data security in ad hoc networks based on multipath routing.
J. Parallel Distributed Comput., 2010

Special Issue: Performance Evaluation of Communications in Distributed Systems and Web-Based Service Architectures.
Concurr. Comput. Pract. Exp., 2010

Stochastic bounds for performance evaluation of Web services.
Concurr. Comput. Pract. Exp., 2010

Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness.
Proceedings of the Q2SWinet'10, 2010

Performance evaluation of a hybrid MAC protocol for wireless sensor networks.
Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2010

A novel framework of secure network management for wireless and mobile networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

On improving the performance of IEEE 802.11s based wireless mesh networks using directional antenna.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Stochastic bounds for end-to-end delay.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Response time of BPEL4WS constructors.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Q-HWMP: Improving End-to-End QoS for 802.11s Based Mesh Networks.
Proceedings of the Global Communications Conference, 2010

Selection of the Best composite Web Service Based on Quality of Service.
Proceedings of the INFORMATIK 2010 - Business Process and Service Science - Proceedings of ISSS and BPSC, September 27, 2010

Improving QoS for BE traffics in WIMAX networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Stochastic Automata Networks for Modelling Scheduling Scheme in WiMAX Networks.
J. Interconnect. Networks, 2009

Amclm: Adaptive Multi-Services Cross-Layer MAC Protocol for IEEE 802.11 Networks.
J. Interconnect. Networks, 2009

Load balancing in distributed communication systems: performance evaluation with SWN models.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Topology control for enhanced QoS on infrastructure-less heterogeneous radio networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

The 5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet 2009).
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Performance analysis of Web services architecture.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Lifetime aware admission control for infrastructure-less wireless networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Performance analysis of composite web services using Stochastic Automata Networks over IP network.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Adaptive Hybrid Call Admission Control Policy for UMTS with Underlying Tunnel-WLANs Heterogeneous Networks.
Proceedings of IEEE International Conference on Communications, 2009

Detection of Radio Interference Attacks in VANET.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Performance Evaluation of Mobile Networks Based on Stochastic Ordering Markov Chains.
Stud. Inform. Univ., 2008

A multi-service MAC protocol in a multi-channel CSMA/CA for IEEE 802.11 networks.
J. Commun. Networks, 2008

Stochastic comparisons: A methodology for the performance evaluation of fixed and mobile networks.
Comput. Commun., 2008

Performance analysis of an admission control enhancement in WIMAX networks using SAN.
Proceedings of the LCN 2008, 2008

Performance Analysis of UGS, rtPS, nrtPS Admission Control in WiMAX Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Performance evaluation of TCP handoffs over mobile IP connections.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Aggregated bounding Markov processes applied to the analysis of tandem queues.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007

Stochastic Bounds Applied to the End to End QoS in Communication Systems.
Proceedings of the 15th International Symposium on Modeling, 2007

Execution Time Analysis of Aspectized Web Services.
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007

Stochastic Bounds for Loss Rates.
Proceedings of the Third Advanced International Conference on Telecommunications (AICT 2007), 2007

Loss rates bounds in IP buffers by Markov chains aggregations.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
VIP (VHE in Mobile IP Networks) Architecture.
J. Commun., 2006

Performance measures of a call admission control in mobile networks using SWN.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006

A New Approach to the Evaluation of Non Markovian Stochastic Petri Nets.
Proceedings of the Petri Nets and Other Models of Concurrency, 2006

Performance evaluation for mobile access to compositeWeb services.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

Loss rates bounds for IP switches in MPLS networks.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

ATHOMIC: Architecture managing Tcp Handoff Over Mobile Ip Connections.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
Performance measure bounds in mobile networks by state space reduction.
Proceedings of the 13th International Symposium on Modeling, 2005

Multi-services MAC protocol for wireless networks.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2001
Quality of Service of A Rerouting Algorithm Using Stochastic Automata Networks.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

1998
A Perturbation and Reduction Based Algorithm.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1998

1997
Méthodes et outils pour l'évaluation des performances des réseaux informatiques. (Methods and tools for performance evaluation of computer networks).
PhD thesis, 1997

Bounding the Loss Rates in a Multistage ATM Switch.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1997


  Loading...