Noureddine Boudriga

According to our database1, Noureddine Boudriga authored at least 252 papers between 1990 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform.
J. Network and Computer Applications, 2018

A Novel Graph-Based Approach for the Management of Health Data on Cloud-Based WSANs.
J. Grid Comput., 2018

A tree-based data collection protocol for optical unmanned aerial vehicle networks.
Computers & Electrical Engineering, 2018

Trusting Sensors Measurements in a WSN: An Approach Based on True and Group Deviation Estimation.
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018

MIMO Beamforming Anti-jamming Scheme for Mobile Smallcell Networks.
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018

A Context-Based Model for Validating the Ability of Cyber Systems to Defend Against Attacks.
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018

Cell Selection Game in 5G Heterogeneous Networks.
Proceedings of the Ubiquitous Networking - 4th International Symposium, 2018

Secure Authentication Solution for Cloud-based Smart City Surveillance System.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Cloud-Based Global Monitoring System for Smart Cities.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Game-Based Data Muling as a Service in Infrastructureless Area.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2017
Digitizing radio-over-fiber transceiver based on optical tunable encoder and optical codewords.
Photonic Network Communications, 2017

Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios.
Digital Investigation, 2017

A WSN Deployment Scheme under Irregular Conditions for Surveillance Applications.
Ad Hoc & Sensor Wireless Networks, 2017

On the design of an embedded wireless sensor network for aircraft vibration monitoring using efficient game theoretic based MAC protocol.
Ad Hoc Networks, 2017

A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

An Agreement Graph-Based-Authentication Scheme for 5G Networks.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

Chaotic ZKP Based Authentication and Key Distribution Scheme in Environmental Monitoring CPS.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017

Observation-based detection of femtocell attacks in wireless mobile networks.
Proceedings of the Symposium on Applied Computing, 2017

Proactive Damage Assessment of Cyber Attacks Using Mobile Observer Agents.
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017

The design of a Game-theoretic Based Multiple Access scheme for 5G Millimeter Wave Communication Networks.
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017

WSN-based Border Surveillance Systems Using Estimated Known Crossing Paths.
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017

Ant colony based hole detection in wireless sensor networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Access control in 5G communication networks using simple PKI certificates.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Cooperative data muling from ground sensors to base stations using UAVs.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Wban-Assisted Navigation for Firefighters in Indoor Environments.
Ad Hoc & Sensor Wireless Networks, 2016

A Vehicular Cloud for Secure and QoS Aware Service Provision.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Internet of Things in Motion: A Cooperative Data Muling Model Under Revisit Constraints.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Internet-of-Things in Motion: A Cooperative Data Muling Model for Public Safety.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A sensor cloud architecture for healthcare applications.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

An Approach To A Graph-Based Active Cyber Defense Model.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

User Mobility under LTE based VPN: QoS and Handover Management.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

Service Provisioning for Lightweight Community Cloud Infrastructures.
Proceedings of the CONF-IRM 2016, 2016

A Dynamic Hybrid RBF/Elman Neural Networks for Credit Scoring Using Big Data.
Proceedings of the Business Information Systems - 19th International Conference, 2016

An optical wireless network for railways condition monitoring.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

Cooperative sensor-clouds for public safety services in infrastructure-less areas.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

Resilience of thick-line WSN based surveillance systems under irregular crossings.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

A location-aware authentication and key management scheme for wireless sensor networks.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

A secure QoS aware VANET.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

Design and analysis of protecting strategies against border crossing under irregular conditions.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

2015
Security filtering of optical data signals: an approach based on codewords.
Photonic Network Communications, 2015

BHP flooding vulnerability and countermeasure.
Photonic Network Communications, 2015

Autonomous pipeline monitoring and maintenance system: a RFID-based approach.
EURASIP J. Wireless Comm. and Networking, 2015

Unmanned aircraft vehicle assisted WSN-based border surveillance.
Proceedings of the 23rd International Conference on Software, 2015

Energy harvesting based protection of border surveillance systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Insurance versus Investigation Driven Approach for the Computation of Optimal Security Investment.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Design and analysis of a WBAN-based system for firefighters.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Communication as a service for cloud VANETs.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

A Mark Based-Temporal Conceptual Graphs for Enhancing Big Data Management and Attack Scenario Reconstruction.
Proceedings of the Business Information Systems - 18th International Conference, 2015

A Public Safety Wireless Sensor Network: A Visible Light Communication Based Approach.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

Healthcare Systems in Rural Areas: A Cloud-Sensor Based Approach for Epidemic Diseases Management.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

LTE-VPN: A platform for enhancing QoS and authentication.
Proceedings of the 10th International Conference on Information, 2015

2014
Security of implantable medical devices: limits, requirements, and proposals.
Security and Communication Networks, 2014

A multi-attribute decision model for intrusion response system.
Inf. Sci., 2014

On a Controlled Random Deployment WSN-Based Monitoring System Allowing Fault Detection and Replacement.
IJDSN, 2014

A new leader-based multicast scheme with a Raptor code in IEEE 802.11 multi-rate WLANs.
EURASIP J. Wireless Comm. and Networking, 2014

DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks.
EURASIP J. Wireless Comm. and Networking, 2014

Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices.
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014

A novel realistic irregular radio model to enhance coverage evaluation in wireless sensor networks.
Proceedings of the 22nd International Conference on Software, 2014

WSN-based flutter control application for aircraft wings structural health monitoring.
Proceedings of the Symposium on Applied Computing, 2014

TargMoveS: An optimized sensor scheduling scheme based on target mobility variations.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

A hole detection scheme based on polygonal cycles for the irregular radio range in WSN.
Proceedings of the MobiWac'14, 2014

An optimized spectrum allocation scheme for future aircraft Cognitive Radio Wireless Sensor Networks.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

A smart QoS- based traffic management for WBANs.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

A chaos-based authentication and key management scheme for M2M communication.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Adaptive QoS and Security for Video Transmission over Wireless Networks: A Cognitive-Based Approach.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

An Innovative Approach for Dynamic Evaluation of Telecommunications Interconnection Costs for Multimedia Real Time Services.
Proceedings of the Business Information Systems Workshops, 2014

Optimizing Big Data Management Using Conceptual Graphs: A Mark-Based Approach.
Proceedings of the Business Information Systems - 17th International Conference, 2014

Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems.
Proceedings of the Business Information Systems Workshops, 2014

Access and Resources Reservation in 4G-VANETs for Multimedia Applications.
Proceedings of the Ad-hoc Networks and Wireless, 2014

2013
Intrusion tolerant QoS provision in mobile multihop relay networks.
EURASIP J. Wireless Comm. and Networking, 2013

Stateless security filtering of optical data signals: An approach based on code words.
Proceedings of the 17th International Conference on Optical Networking Design and Modeling, 2013

A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Border surveillance: A dynamic deployment scheme for WSN-based solutions.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Optical stateful security filtering approach based on code words.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Border surveillance using sensor based thick-lines.
Proceedings of the International Conference on Information Networking 2013, 2013

Game theory for misbehaving detection in wireless sensor networks.
Proceedings of the International Conference on Information Networking 2013, 2013

Securing implantable cardiac medical devices: use of radio frequency energy harvesting.
Proceedings of the TrustED'13, 2013

2012
A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks.
IEEE Trans. Information Forensics and Security, 2012

Unifying identity management for fourth generation wireless networks.
IET Communications, 2012

A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks.
Computers & Security, 2012

A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Reservation Scheme for QoS Provision within Mobile Multihop Relay Networks.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

A wireless sensor network based water monitoring system.
Proceedings of the Q2SWinet'12, 2012

Smart Navigation for Firefighters in Hazardous Environments: A Ban-Based Approach.
Proceedings of the Pervasive Computing and the Networked World, 2012

Success Probability Evaluation of Quantum Circuits based on Probabilistic CNOT-Gates.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012

All-optical Multi-wavelength Virtual Memory Architecture - Design and Performances Analysis.
Proceedings of the DCNET, ICE-B and OPTICS 2012, 2012

A mark association-based investigation of attack scenarios in communication networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Coverage Assessment and Target Tracking in 3D Domains.
Sensors, 2011

Evolutionary strategies for non-uniform deployment in wireless sensor networks.
IJCNDS, 2011

Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks.
EURASIP J. Wireless Comm. and Networking, 2011

Logic-based approach for digital forensic investigation in communication Networks.
Computers & Security, 2011

Validation of Security Solutions for Communication Networks: A Policy-Based Approach.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Cooperative Security in Vehicular Communication Systems.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

A Clustering Data Fusion Method for Intrusion Detection System.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping.
Simulation, 2010

A New All-Optical Switching Node Including Virtual Memory and Synchronizer.
JNW, 2010

Predictive Dynamic Uplink /Downlink Resource Reservation for Vertical Handoff Optimization in 4G Networks.
IJBDCN, 2010

QoS Scheduling for IEEE 802.16e Mesh Mode using Genetic Algorithms.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010

Content-based network filtering of encrypted image data.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A new tracking-aware gossiping scheme for Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Formal Digital Investigation of Anti-forensic Attacks.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

A Novel Secure and Multipath Routing Algorithm in Wireless Sensor Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

A Novel Modular Black-box Architecture for Secure Vehicular Networks.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

Mobility and Security Models for Wireless Sensor Networks using Voronoi Tessellations.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

RAMP system for proactive pipeline monitoring.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

SPAMMS: A sensor-based pipeline autonomous monitoring and maintenance system.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

Predictive dynamic resource reservation for vertical handoff optimization in 4G mobile wireless networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

Optimizing area coverage in Wireless Sensor Networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Investigating Attack Scenarios in Multihop Wireless Systems.
JNW, 2009

Guest Editorial.
JNW, 2009

Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams.
JNW, 2009

Visibility: a novel concept for characterising provable network digital evidences.
IJSN, 2009

Forensic Investigation in Communication Networks Using Incomplete Digital Evidences.
IJCNS, 2009

Multilayer Statistical Intrusion Detection in Wireless Networks.
EURASIP J. Adv. Sig. Proc., 2009

Coverage control and irregular radio propagation in eireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Securing Roaming and Vertical Handover in Fourth Generation Networks.
Proceedings of the Third International Conference on Network and System Security, 2009

Digital Investigation of Wormhole Attacks in Wireless Sensor Networks.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

A new genetic algorithm approach for intrusion response system in computer networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

A public key algorithm for optical communication based on lattice cryptography.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Intrusion detection and tolerance for transaction based applications in wireless environments.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

A platform for secure multi-service vehicular communication.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2009

Efficient Resource Reservation for Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

ReAlSec: A Relational Language for Advanced Security Engineering.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Defending against rogue base station attacks using wavelet based fingerprinting.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking.
IEEE Systems Journal, 2008

Heterogeneous Security Policy Validation: From Formal to Executable Specifications.
JNW, 2008

WHOMoVeS: An optimized broadband sensor network for military vehicle tracking.
Int. J. Communication Systems, 2008

Intrusion detection and tolerance: A global scheme.
Int. J. Communication Systems, 2008

Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis.
Computer Communications, 2008

Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

DigForNet: Digital Forensic in Networking.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Cognitive-Maps Based Investigation of Digital Security Incidents.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems.
Proceedings of the NTMS 2008, 2008

Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS.
Proceedings of the NTMS 2008, 2008

Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks.
Proceedings of the NTMS 2008, 2008

Incident Response Probabilistic Cognitive Maps.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Four dimensional chaotic ciphers for secure image transmission.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

An elliptic threshold signature framework for k-security in wireless sensor networks.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

GRIDSAN: an available dynamic grid system for ad hoc networks.
Proceedings of the 3rd Workshop on the Use of P2P, 2008

Chaotic Progressive Access Control for JPEG2000 Images Repositories.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Using Object Metadata to Detect and Tolerate Attacks in Object Storage Devices.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Automated Intrusion Response System: Surveys and Analysis.
Proceedings of the 2008 International Conference on Security & Management, 2008

Dynamic Detection and Tolerance of Attacks in Storage Area Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks: A Scheme and Performance Evaluation.
Simulation, 2007

Provision of quality of service in wireless fourth generation networks.
Int. J. Communication Systems, 2007

A decisional framework system for computer network intrusion detection.
European Journal of Operational Research, 2007

Performance analysis of a dynamic QoS scheme in optical label-switched networks.
Computer Communications, 2007

A novel node architecture for optical networks: Modeling, analysis and performance evaluation.
Computer Communications, 2007

Detecting Denial-of-Service attacks using the wavelet transform.
Computer Communications, 2007

Security policy validation using temporal executable specifications.
Proceedings of the IEEE International Conference on Systems, 2007

Network security project management: a security policy-based approach.
Proceedings of the IEEE International Conference on Systems, 2007

Global intrusion detection and tolerance in networked systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

A global marking scheme for tracing cyber attacks.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Secure Grid-Based Multi-Party Micropayment System in 4G Networks.
Proceedings of the ICE-B 2007, 2007

Radio-based Cooperation Scheme for DDoS Detection.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

A QoS-Oriented Scheme for a Real Time Admission Control in OBS Networks.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

A Real-Time Admission Control and Planning of OLS Networks.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

A Dynamic QoS-Based Scheme for Admission Control in OBS Networks.
Proceedings of IEEE International Conference on Communications, 2007

A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks.
Proceedings of IEEE International Conference on Communications, 2007

Location Management in Wireless Fourth Generation Networks.
Proceedings of the Global Communications Conference, 2007

Radio-Based Cooperation for Wireless Intrusion Detection.
Proceedings of the Global Communications Conference, 2007

Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach.
Proceedings of the Proceedings 40th Annual Simulation Symposium (ANSS-40 2007), 2007

Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

A QoS-Oriented Protocol for Burst Admission Control in OBS Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Doppler Effect on Location-Based Tracking in Mobile Sensor Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Sensor Activity Scheduling for Efficient WSN-based Tracking.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis.
Simulation, 2006

Performance evaluation of a novel scheme for QoS provision in UTRA TDD.
Computer Communications, 2006

Mobility, sensing, and security management in wireless ad hoc sensor systems.
Computers & Electrical Engineering, 2006

SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks.
Proceedings of the E-Business and Telecommunication Networks, 2006

SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks.
Proceedings of the ICE-B 2006, 2006

Secured and Seamless Handoff in Wireless Fourth Generation Systems.
Proceedings of the 13th IEEE International Conference on Electronics, 2006

Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Designing a Wireless Sensor Network for Mobile Target Localization and Tracking.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Towards a Relational Calculus for Security Library Management.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

SPUR: A secured protocol for UMTS registration.
Proceedings of the e-Business and Telecommunication Networks, 2006

2005
Computer and network security risk management: theory, challenges, and countermeasures.
Int. J. Communication Systems, 2005

Fault and intrusion tolerance in wireless ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A formal logic-based language and an automated verification tool for computer forensic investigation.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Temporal Logic-Based Model for Forensic Investigation in Networked System Security.
Proceedings of the Computer Network Security, 2005

SDPPM: An IP traceback scheme for MANET.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Provision of quality of service in open wireless architectures.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Performance analysis and simulation of a novel OBS network architecture.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Optical Label Switching: Design issues, modeling and performance analysis.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Detecting distributed computer network attacks: A multi-dimensional wavelet approach.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Cooperative Intrusion Detection and Tolerance System.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

An advance dynamic resource reservation algorithm for OBS networks: Design and performance.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Scalable mobility management in wireless ad hoc sensor systems.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Intrusion tolerant GRID in ad-hoc networks.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Mobility and security issues in wireless ad-hoc sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Relational-based calculus for trust management in networked services.
Computer Communications, 2004

Collective computer incident response using cognitive maps.
Proceedings of the IEEE International Conference on Systems, 2004

An Abstract Reduction Model for Computer Security Risk.
Proceedings of the Security and Protection in Information Processing Systems, 2004

SPUR: A Secured Protocol for UMTS Registration.
Proceedings of the ICETE 2004, 2004

2003
DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle.
Computer Communications, 2003

Optical burst switching protocols for supporting QoS and adaptive routing.
Computer Communications, 2003

Resource Management Schemes in Optical Networks.
Proceedings of the 23rd International Conference of the Chilean Computer Science Society (SCCC 2003), 2003

Admission control and resource management of uncertain duration traffic in optical networks.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

Algebraic specification of network security risk management.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
Laying out the Foundation for a Digital Government Model Case Study - Tunisia.
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002

Adaptive QoS schemes in DWDM networks.
Proceedings of the IEEE International Conference on Communications, 2002

2001
On a congestion management scheme for high speed networks using aggregated large deviations principle.
Computer Communications, 2001

Supporting Adaptive QoS for Multiple Classes of Service in DWDM Networks.
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001

Synchronizing multimedia flows in active-high-speed networks.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
An adaptive approach to manage traffic in CDMA ATM networks.
Computer Communications, 2000

A methodology to optimize the design of telecommunication systems.
Computer Communications, 2000

QoS management in wireless ATM networks using large deviation principle.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

1999
Schemes for mobility management of wireless ATM networks.
Int. J. Communication Systems, 1999

A performance analysis scheme for intelligent wireless ATM networks.
Int. J. Communication Systems, 1999

Intelligent Services Integration in Mobile ATM Networks.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Managing mobility in a wireless ATM network.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Performance analysis of intelligent mobile ATM networks.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Managing traffic in CDMA ATM networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

1998
Bandwidth allocation and call admission control in ATM networks.
Int. J. Communication Systems, 1998

Optimum Design of Telecommunication Systems.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Reducing Network Latency and Server Load in Hypermedia Systems.
Inf. Sci., 1997

Multiple connections in data communication and advanced applications.
Computer Communications, 1997

Extended connection models for advanced applications.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

Formal Protocol Description: Model and validation.
Proceedings of the Participants Copies of Third International Seminar on the Use of Relational Methods in Computer Science, 1997

1995
A Parallel Logic Language for Transaction Specification in Multidatabase Systems.
Journal of Systems Integration, 1995

1993
A Relation Division Operator: The Conjugate Kernel.
Theor. Comput. Sci., 1993

Relation-based semantics for concurrency.
Inf. Sci., 1993

Corrigendum: Specification and execution of transactions for advanced database applications.
Inf. Syst., 1993

A Priority-Based PCG Algorithm for Global Deadlock Detection and Resilution in Multidatabase Systems.
Proceedings of the RIDE-IMS '93, 1993

1992
Semantic-Based Software Retrieval to Support Rapid Prototyping.
Structured Programming, 1992

Specification and execution of transactions for advanced database applications.
Inf. Syst., 1992

On the Lattice of Specifications: Applications to a Specification Methodology.
Formal Asp. Comput., 1992

A Relational Model for the Specification of Data Types.
Comput. Lang., 1992

Computers in the Classroom: A National Proposal.
Proceedings of the Education and Society, 1992

A Transition Net Formalism for Deductive Databases Efficiently Handling Quering and Integrity Constraints Aspects.
Proceedings of the International Conference on Database and Expert Systems Applications, 1992

1991
Regularity of Relations: A Measure of Uniformity.
Theor. Comput. Sci., 1991

1990
A Database of Software Components: An Algebraic Structure and Its Implementation.
Proceedings of the International Conference on Database and Expert Systems Applications, 1990


  Loading...