Mohamed Mosbah

According to our database1, Mohamed Mosbah authored at least 151 papers between 1993 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Implementation and Assessment of IEEE 802.11BD for Improved Road Safety.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
Joint Diversity and Redundancy for Resilient Service Chain Provisioning.
IEEE J. Sel. Areas Commun., 2020

Vehicle Platooning Systems: Review, Classification and Validation Strategies.
Int. J. Networked Distributed Comput., 2020

Modeling and Proving Distributed Algorithms for Dynamic Graphs.
Future Gener. Comput. Syst., 2020

Efficient monitoring for intrusion detection in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2020

Cross-layer adaptive multipath routing for multimedia Wireless Sensor Networks under duty cycle mode.
Ad Hoc Networks, 2020

Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020

On the Application of Machine Learning for Cut-in Maneuver Recognition in Platooning Scenarios.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning.
Proceedings of the NOMS 2020, 2020

Analysis and Comparison of IEEE 802.11p and IEEE 802.11bd.
Proceedings of the Communication Technologies for Vehicles, 2020

A Unified Smart Mobility System Integrating Terrestrial, Aerial and Marine Intelligent Vehicles.
Proceedings of the Communication Technologies for Vehicles, 2020

Leveraging GPS Data for Vehicle Maneuver Detection.
Proceedings of the Communication Technologies for Vehicles, 2020

Formal specification and verification of a broadcasting protocol: a refinement-based approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Towards an Efficient Clustering-Based Algorithm for Emergency Messages Broadcasting.
Proceedings of the Computational Collective Intelligence - 12th International Conference, 2020

A New SDN Architecture Based on Trust Management and Access Control for IoT.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Formal Modeling and Verification of a Distributed Algorithm for Constructing Maximal Cliques in Static Networks.
Computación y Sistemas, 2019

Network Intrusion Detection for IoT Security Based on Learning Techniques.
IEEE Commun. Surv. Tutorials, 2019

ETGuard: Detecting D2D attacks using wireless Evil Twins.
Comput. Secur., 2019

Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A Comprehensive Survey on Broadcasting Emergency Messages.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

An Evaluative Review of the Formal Verification for VANET Protocols.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Energy Efficient Handshake Algorithm for Wireless Sensor Networks.
Proceedings of the Distributed Computing for Emerging Smart Networks, 2019

VANETs Routing Protocols Survey: Classifications, Optimization Methods and New Trends.
Proceedings of the Distributed Computing for Emerging Smart Networks, 2019

A Comparative Study of Vehicle Detection Methods in a Video Sequence.
Proceedings of the Distributed Computing for Emerging Smart Networks, 2019

MTM-MAC: Medical Traffic Management MAC Protocol for Handling Healthcare Applications in WBANs.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

2018
Context-aware medium access control protocols in wireless sensor networks.
Internet Technol. Lett., 2018

Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks.
Comput. Commun., 2018

Proving Distributed Algorithms for Wireless Sensor Networks by Combining Refinement and Local Computations.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Formal Approach for Distributed Computing of Maximal Cliques in Dynamic Networks.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Formal Verification Approaches for Distributed Algorithms: A Systematic Literature Review.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

WBAN Path Loss Based Approach For Human Activity Recognition With Machine Learning Techniques.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Data Gathering for Internet of Vehicles Safety.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Distributed Computations in Wireless Sensor Networks by Local Interactions.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2017
Maintenance of a Spanning Tree For Dynamic Graphs by Mobile Agents and Local Computations.
RAIRO Theor. Informatics Appl., 2017

Context-Aware Broadcast in Duty-Cycled Wireless Sensor Networks.
Int. J. Semantic Web Inf. Syst., 2017

Leader election and computation of a spanning tree in dynamic distributed networks using local computations and mobile agents.
Int. J. Space Based Situated Comput., 2017

A secure electric energy management in smart home.
Int. J. Commun. Syst., 2017

Proving Distributed Coloring of Forests in Dynamic Networks.
Computación y Sistemas, 2017

Android inter-app communication threats and detection techniques.
Comput. Secur., 2017

Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

SniffDroid: Detection of Inter-App Privacy Leaks in Android.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques.
Proceedings of the SCSS 2017, 2017

Algorithms for Finding Maximal and Maximum Cliques: A Survey.
Proceedings of the Intelligent Systems Design and Applications, 2017

Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017

Delay-aware VNF placement and chaining based on a flexible resource allocation approach.
Proceedings of the 13th International Conference on Network and Service Management, 2017

An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

Electing a Leader in Dynamic Networks using Mobile Agents and Local Computations.
Proceedings of the 8th International Conference on Ambient Systems, 2017

Correlation-Free MultiPath Routing for Multimedia Traffic in Wireless Sensor Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2017

A correct-by-construction approach for proving distributed algorithms in spanning trees.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
From Event-B specifications to programs for distributed algorithms.
Int. J. Auton. Adapt. Commun. Syst., 2016

The impact of malicious nodes positioning on vehicular alert messaging system.
Ad Hoc Networks, 2016

A Refinement-Based Approach for Proving Distributed Algorithms on Evolving Graphs.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Fast synchronisation protocol with collision handling for wireless ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Study of context-awareness efficiency applied to duty cycled wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Towards a General Framework for Ensuring and Reusing Proofs of Termination Detection in Distributed Computing.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

NDRECT: Node-disjoint routes establishment for critical traffic in WSNs.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Detection of SQLite Database Vulnerabilities in Android Apps.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Formal Proofs of Termination Detection for Local Computations by Refinement-Based Compositions.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2016

Distributed Computation and Maintenance of a Spanning Tree in Dynamic Networks by Mobile Agents.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

A Fault-Tolerant Handshake Algorithm for Local Computations.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

A broadcast authentication scheme in IoT environments.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
HLPSP: A Hybrid Live P2P Streaming Protocol.
KSII Trans. Internet Inf. Syst., 2015

Lightweight secure group communications for resource constrained devices.
Int. J. Space Based Situated Comput., 2015

Functional dependencies are helpful for partial materialization of data cubes.
Ann. Math. Artif. Intell., 2015

Towards a Formal Model for Dynamic Networks Through Refinement and Evolving Graphs.
Proceedings of the Software Engineering, 2015

Enhanced LEAP authentication delay for higher immunity against DoS attack.
Proceedings of the International Conference on Protocol Engineering, 2015

ECAB: An Efficient Context-Aware multi-hop Broadcasting protocol for wireless sensor networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A Totally Distributed Fair Scheduler for Population Protocols by Randomized Handshakes.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2015, 2015

Impact of security threats in vehicular alert messaging systems.
Proceedings of the IEEE International Conference on Communication, 2015

A secure authentication mechanism for resource constrained devices.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

A formal pattern for dynamic networks through evolving graphs.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication.
IEEE Trans. Intell. Transp. Syst., 2014

Preface.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2014

A secure alert messaging system for safe driving.
Comput. Commun., 2014

Enhancing Proofs of Local Computations through Formal Event-B Modularization.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

ViSiDiA: A Java Framework for Designing, Simulating, and Visualizing Distributed Algorithms.
Proceedings of the 18th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2014

Hybrid Live P2P Streaming Protocol.
Proceedings of the 5th International Conference on Ambient Systems, 2014

Greedy Flooding in Redoubtable Sensor Networks.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Graph Computation Models 2012.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2013

Randomized broadcasting in wireless mobile sensor networks.
Concurr. Comput. Pract. Exp., 2013

Towards Proved Distributed Algorithms through Refinement, Composition and Local Computations.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

Performance evaluation of key disclosure delay-based schemes in wireless sensor networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Secure Verification of Location Claims on a Vehicular Safety Application.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Les dépendances fonctionnelles pour la sélection de vues dans les cubes de données.
J. Decis. Syst., 2012

A Multipath Layered Cluster Based Routing for Ad Hoc Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Debugging the Execution of Distributed Algorithms over Anonymous Networks.
Proceedings of the 16th International Conference on Information Visualisation, 2012

Uncertainty Interval Temporal Sequences Extraction.
Proceedings of the Information Systems, Technology and Management, 2012

Fully-distributed Debugging and Visualization of Distributed Systems in Anonymous Networks.
Proceedings of the GRAPP & IVAPP 2012: Proceedings of the International Conference on Computer Graphics Theory and Applications and International Conference on Information Visualization Theory and Applications, 2012

Using Functional Dependencies for Reducing the Size of a Data Cube.
Proceedings of the Foundations of Information and Knowledge Systems, 2012

Relaxing Time Granularity for Mining Frequent Sequences.
Proceedings of the Advances in Knowledge Discovery and Management, 2012

Extraction de séquences fréquentes avec intervalles d'incertitude.
Proceedings of the Extraction et gestion des connaissances (EGC'2012), Actes, janvier 31, 2012

2011
Graph Computation Models.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

Refinement-Based Verification of Local Synchronization Algorithms.
Proceedings of the FM 2011: Formal Methods, 2011

Dépendances fonctionnelles et matérialisation partielle des cubes de données.
Proceedings of the Actes des 7èmes journées francophones sur les Entrepôts de Données et l'Analyse en ligne, 2011

2010
Sublinear Fully Distributed Partition with Applications.
Theory Comput. Syst., 2010

Proving Distributed Algorithms by Combining Refinement and Local Computations.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

Broadcast in wireless mobile sensor networks with population protocols and extension with the rendezvous model.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

Time Constraints Extension on Frequent Sequential Patterns.
Proceedings of the KDIR 2010, 2010

Simplification de données de vol pour un stockage optimal et une visualisation accélérée.
Proceedings of the Extraction et gestion des connaissances (EGC'2010), 2010

A layered cluster based routing for an ad hoc environment.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Dynamic security framework for mobile agent systems: specification, verification and enforcement.
Int. J. Inf. Comput. Secur., 2009

A DSL Framework for Policy-Based Security of Distributed Systems.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Exploiting a clustering mechanism for power saving in ad hoc networks: Performance evaluation.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
A Synchronous Tiered Based Clustering Algorithm for large-scale Ad hoc Networks.
Proceedings of the Wireless and Mobile Networking, IFIP Joint Conference on Mobile and Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30, 2008

Evaluating the Efficiency of Clustering on Routing and Network Performance.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Proving Distributed Algorithms for Mobile Agents: Examples of Spanning Tree Computation in Anonymous Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Workshop on Graph Computation Models.
Proceedings of the Graph Transformations, 4th International Conference, 2008

Mobile Agents Implementing Local Computations in Graphs.
Proceedings of the Graph Transformations, 4th International Conference, 2008

A formal security framework for mobile agent systems: Specification and verification.
Proceedings of the CRiSIS '08, 2008

Electing a leader in the local computation model using mobile agents.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Convex Drawings of 3-Connected Plane Graphs.
Algorithmica, 2007

A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems.
Proceedings of the First International Conference on Emerging Security Information, 2007

A Distributed Computational Model for Mobile Agents.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

A Generic Distributed Algorithm for Computing by Random Mobile Agents.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

A Self-stabilizing Distributed Algorithm for Resolving Conflicts.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Merging Time of Random Mobile Agents.
Proceedings of the Dynamics in Logistics, First International Conference, 2007

Distributed Local 2-Connectivity Test of Graphs and Applications.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

A Domain Specific Language for Securing Distributed Systems.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
A Local Enumeration Protocol in Spite of Corrupted Data.
J. Comput., 2006

Distributed Graph Traversals by Relabelling Systems with Applications.
Electron. Notes Theor. Comput. Sci., 2006

Fast distributed graph partition and application.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Workshop on Graph Computation Models.
Proceedings of the Graph Transformations, Third International Conference, 2006

A Local Self-stabilizing Enumeration Algorithm.
Proceedings of the Distributed Applications and Interoperable Systems, 2006

2005
An Automatic Approach to Self-Stabilization.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

A Formal Model for Fault-Tolerance in Distributed Systems.
Proceedings of the Computer Safety, 2005

An Implementation of a Failure Detector for Local Computations in Graphs.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Visualization of Self-Stabilizing Distributed Algorithms.
Proceedings of the 9th International Conference on Information Visualisation, 2005

2004
Synchronizers for Local Computations.
Proceedings of the Graph Transformations, Second International Conference, 2004

Checking Global Properties for Local Computations in Graphs with Applications to Invariant Testing.
Proceedings of the 5th Mexican International Conference on Computer Science (ENC 2004), 2004

A Programming Language for Local Computations in Graphs: Computational Completeness.
Proceedings of the 5th Mexican International Conference on Computer Science (ENC 2004), 2004

2003
Watermelon uniform random generation with applications.
Theor. Comput. Sci., 2003

A Unified Framework for Designing, Implementing and Visualizing Distributed Algorithms.
Electron. Notes Theor. Comput. Sci., 2003

Distributing the Execution of a Distributed Algorithm over a Network.
Proceedings of the Seventh International Conference on Information Visualization, 2003

2002
Optimal Area Algorithm for Planar Polyline Drawings.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2002

Wagner's Theorem on Realizers.
Proceedings of the Automata, Languages and Programming, 29th International Colloquium, 2002

Termination Detection of Distributed Algorithms by Graph Relabelling Systems.
Proceedings of the Graph Transformation, First International Conference, 2002

2001
Graph Relabelling Systems: a Tool for Encoding, Proving, Studying and Visualizing - Distributed Algorithms.
Electron. Notes Theor. Comput. Sci., 2001

Visualization of Distributed Algorithms Based on Graph Relabelling Systems.
Electron. Notes Theor. Comput. Sci., 2001

A Distributed Algorithm for Computing a Spanning Tree in Anonymous Tprime Graph.
Proceedings of the Procedings of the 5th International Conference on Principles of Distributed Systems. OPODIS 2001, 2001

2000
Orthogonal Drawings Based On The Stratification Of Planar Graphs.
Electron. Notes Discret. Math., 2000

Formal rational fractions and random walks on cycles.
Discret. Math., 2000

1999
Non-Uniform Random Spanning Trees on Weighted Graphs.
Theor. Comput. Sci., 1999

1997
A Syntactic Approach to Random Walks on Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 1997

1996
Probabilistic Hyperedge Replacement Grammars.
Theor. Comput. Sci., 1996

Probabilistic Graph Grammars.
Fundam. Informaticae, 1996

1993
Monadic Second-Order Evaluations on Tree-Decomposable Graphs.
Theor. Comput. Sci., 1993


  Loading...