Nassira Ghoualmi-Zine

Orcid: 0000-0001-5271-5970

Affiliations:
  • Badji Mokhtar University-Annaba, Networks and Systems Laboratory, Annaba, Algeria


According to our database1, Nassira Ghoualmi-Zine authored at least 37 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ESIKE: An Efficient and Secure Internet Key Exchange Protocol.
Wirel. Pers. Commun., 2023

Enhanced unstructured points cloud subdivision applied for parallel Delaunay triangulation.
Clust. Comput., 2023

Enhancement of a User Authentication Scheme for Big Data Collection in IoT-Based Intelligent Transportation System.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

2022
Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks.
Wirel. Pers. Commun., 2022

AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks.
J. Netw. Syst. Manag., 2022

Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV".
Int. J. Inf. Sec., 2022

A Routing Protocol With Quality Of Service In Body Area Network.
Proceedings of the 4th International Conference on Pattern Analysis and Intelligent Systems, 2022

Lightweight Authentication Protocols for Internet of Vehicles: Network Model, Taxonomy and Challenges.
Proceedings of the 4th International Conference on Pattern Analysis and Intelligent Systems, 2022

2021
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making.
Int. J. Inf. Secur. Priv., 2021

Detecting DDoS Attacks in IoT Environment.
Int. J. Inf. Secur. Priv., 2021

2020
Towards the Development of Realistic DoS Dataset for Intelligent Transportation Systems.
Wirel. Pers. Commun., 2020

On Using Multiple Disabilities Profiles to Adapt Multimedia Documents: A Novel Graph-Based Method.
Int. J. Inf. Technol. Web Eng., 2020

TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things.
Int. J. Embed. Real Time Commun. Syst., 2020

VANET: A novel service for predicting and disseminating vehicle traffic information.
Int. J. Commun. Syst., 2020

Hybrid adapted fast correlation FCBF-support vector machine recursive feature elimination for feature selection.
Intell. Decis. Technol., 2020

2019
Secure Network Entry Process in Wimax.
J. Commun., 2019

A Survey on Dynamic Multipoint Virtual Private Networks.
Proceedings of the 8th International Seminar on Computer Science Research at Feminine, 2019

2018
Parallel Access Control Model in Cross-Domain Grid Computing Environment.
Int. J. Embed. Real Time Commun. Syst., 2018

Hybrid Artificial Bees Colony and Particle Swarm on Feature Selection.
Proceedings of the Computational Intelligence and Its Applications, 2018

2017
HaMA: A Handicap-based Architecture for Multimedia Document Adaptation.
Int. J. Multim. Data Eng. Manag., 2017

Weighted grid authorization graph (WGAG).
Proceedings of the Sixth International Conference on Communications and Networking, 2017

2015
A new hierarchical intrusion detection system based on a binary tree of classifiers.
Inf. Comput. Secur., 2015

Formal analysis of efficiency and safety in IPSec based on internet key exchange protocol.
Int. J. Commun. Networks Distributed Syst., 2015

2014
A new adaptive intrusion detection system based on the intersection of two different classifiers.
Int. J. Secur. Networks, 2014

A New Method for Prolonging Network Lifetime and Maintaining the Connectivity in Wireless Sensor Network Through Controlling the Transmission Power.
Int. J. Embed. Real Time Commun. Syst., 2014

2012
An adaptation platform for multimedia applications CSC (Component, Service, Connector).
J. Syst. Inf. Technol., 2012

Forecasting Approach in VANET based on vehicle collision alert.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
An Intelligent System for Decision Making in Firewall Forensics.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

A New Approach for Adaptive Intrusion Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
UML-profile for multimedia software architectures.
Int. J. Multim. Intell. Secur., 2010

MMSA: Metamodel Multimedia Software Architecture.
Adv. Multim., 2010

An Adaptation Approach for Component-Based Software Architecture.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Vers une architecture d'adaptation automatique des applications reparties basées composants.
Proceedings of the 4e Conférence francophone sur les Architectures Logicielles, 2010

2009
An Adaptation System for P2P Multimedia Applications.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2006
Enterprise Information Integration.
Proceedings of the Research and Practical Issues of Enterprise Information Systems, 2006

2005
Towards a Communication Manager: a layer's Task for Enterprise.
Proceedings of The 2005 International Conference on E-Business, 2005

2003
The Vigenere Cipher of Degree in Net-Banking Application.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003


  Loading...