Omar Cheikhrouhouhttps://orcid.org/0000-0002-9898-3898Eman Yasser DaraghmiSajida QadanYousef-Awwad DaraghmiRami YousufOmar CheikhrouhouMohammed BazFrom Text to Insight: An Integrated CNN-BiLSTM-GRU Model for Arabic Cyberbullying Detection.103504-103519202412IEEE Accesshttps://doi.org/10.1109/ACCESS.2024.3431939db/journals/access/access12.html#DaraghmiQDYCB24streams/journals/accessWassim JerbiOmar CheikhrouhouAbderrahmen GuermaziHafedh TrabelsiAn enhanced MSU-TSCH scheduling algorithms for industrial wireless sensor networks.202436Concurr. Comput. Pract. Exp.5https://doi.org/10.1002/cpe.7938db/journals/concurrency/concurrency36.html#JerbiCGT24Wassim JerbiOmar CheikhrouhouAbderrahmen GuermaziHafedh TrabelsiBlockchain-Based Data Storage for Internet of Things Networks.1-17202419Int. J. Bus. Data Commun. Netw.https://doi.org/10.4018/ijbdcn.341590db/journals/ijbdcn/ijbdcn19.html#JerbiCGT24Vagner Ereno QuincozesSilvio E. QuincozesJuliano F. KazienkoSimone GamaOmar CheikhrouhouAnis KoubaaA survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT).1975-20022024June23Int. J. Inf. Sec.3https://doi.org/10.1007/s10207-024-00828-wdb/journals/ijisec/ijisec23.html#QuincozesQKGCK24Muhammad Shafiq 0002Jin-Ghoo ChoiOmar CheikhrouhouHabib HamamAdvances in IoMT for Healthcare Systems.10202424Sensors1https://doi.org/10.3390/s24010010db/journals/sensors/sensors24.html#ShafiqCCH24Aymen AbidOmar CheikhrouhouGhada ZaïbiAbdennaceur KachouriMachine Learning based Outlier Detection in IoT Greenhouse.1-92024ISORChttps://doi.org/10.1109/ISORC61049.2024.10551361conf/isorc/2024db/conf/isorc/isorc2024.html#AbidCZK24Mohamed MazouziKhaleel Mershad 0001Omar CheikhrouhouMonia HamdiAgent-Based Reactive Geographic Routing Protocol for Internet of Vehicles.79954-79973202311IEEE Accesshttps://doi.org/10.1109/ACCESS.2023.3299230db/journals/access/access11.html#MazouziMCH23Omar CheikhrouhouKhaleel Mershad 0001Faisal JamilMd. Redowan MahmudAnis KoubaaSanaz Rahimi MoosaviA lightweight blockchain and fog-enabled secure remote patient monitoring system.1006912023July22Internet Thingshttps://doi.org/10.1016/j.iot.2023.100691db/journals/iot/iot22.html#CheikhrouhouMJMKM23Khaleel Mershad 0001Omar CheikhrouhouLightweight blockchain solutions: Taxonomy, research progress, and comprehensive review.1009842023December24Internet Thingshttps://doi.org/10.1016/j.iot.2023.100984db/journals/iot/iot24.html#MershadC23Mushtaq HussainMehmet Akif CifciTayyaba SeharSaid NabiOmar CheikhrouhouHasaan MaqsoodMuhammad IbrahimFida MohammadMachine learning based efficient prediction of positive cases of waterborne diseases.112023December23BMC Medical Informatics Decis. Mak.1https://doi.org/10.1186/s12911-022-02092-1db/journals/midm/midm23.html#HussainCSNCMIM23Nesrine AtitallahOmar CheikhrouhouKhaleel Mershad 0001Anis KoubaaFahima HajjejCERP: Cooperative and Efficient Routing Protocol for Wireless Sensor Networks.88342023October23Sensors21https://doi.org/10.3390/s23218834db/journals/sensors/sensors23.html#AtitallahCMKH23Wassim JerbiOmar CheikhrouhouAbderrahmen GuermaziHafedh TrabelsiMSU-TSCH: A Mobile Scheduling Updated Algorithm for TSCH in the Internet of Things.7978-79852023July19IEEE Trans. Ind. Informatics7https://doi.org/10.1109/TII.2022.3215990db/journals/tii/tii19.html#JerbiCGT23Abdelouahid DerhabOmar CheikhrouhouAzza AllouchAnis KoubaaBasit QureshiMohamed Amine FerragLeandros MaglarasFarrukh Aslam KhanInternet of drones security: Taxonomies, open issues, and future directions.1005522023February39Veh. Commun.https://doi.org/10.1016/j.vehcom.2022.100552https://www.wikidata.org/entity/Q118322464db/journals/vcomm/vcomm39.html#DerhabCAKQFMK23Mohamed MazouziKhaleel Mershad 0001Omar CheikhrouhouARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles.567-6042023November133Wirel. Pers. Commun.1https://doi.org/10.1007/s11277-023-10779-5db/journals/wpc/wpc133.html#MazouziMC23Estêvão F. C. SilvaNícolas NavesSilvio E. QuincozesVagner Ereno QuincozesJuliano F. KazienkoOmar CheikhrouhouGDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local Search.199-2102023AINA (2)https://doi.org/10.1007/978-3-031-28451-9_18conf/aina/2023-2db/conf/aina/aina2023-2.html#SilvaNQQKC23Ines JemalOmar CheikhrouhouMohamed Amine HaddarIoT DOS and DDOS Attacks Detection Using an Effective Convolutional Neural Network.373-3792023CWhttps://doi.org/10.1109/CW58918.2023.00065conf/cw/2023db/conf/cw/cw2023.html#JemalCH23Marwa Ben JabraOmar CheikhrouhouNesrine AtitallahAnouar BenamorHabib HamamMalware Detection Using Deep Learning and CNN Models.432-4392023CWhttps://doi.org/10.1109/CW58918.2023.00073conf/cw/2023db/conf/cw/cw2023.html#JabraCABH23Omar CheikhrouhouKhaleel Mershad 0001Faisal JamilMd. Redowan MahmudAnis KoubaaSanaz Rahimi MoosaviA Lightweight Blockchain and Fog-enabled Secure Remote Patient Monitoring System.2023abs/2301.03551CoRRhttps://doi.org/10.48550/arXiv.2301.03551db/journals/corr/corr2301.html#abs-2301-03551Chaoxia QingBing GuoYun Zhang 0022Omar CheikhrouhouYan Shen 0001Zhen Zhang 0036Hong SuA Segmented PageRank-Based Value Compensation Method for Personal Data in Alliance Blockchains.100326202230Big Data Res.https://doi.org/10.1016/j.bdr.2022.100326https://www.wikidata.org/entity/Q122278805db/journals/bdr/bdr30.html#QingGZCSZS22Alaeddine MihoubOuissem Ben FredjOmar CheikhrouhouAbdelouahid DerhabMoez KrichenDenial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques.107716202298Comput. Electr. Eng.https://doi.org/10.1016/j.compeleceng.2022.107716db/journals/cee/cee98.html#MihoubFCDK22Wassim JerbiOmar CheikhrouhouAbderrahmen GuermaziMohamed BazHafedh TrabelsiBSI: Blockchain to secure routing protocol in Internet of Things.202234Concurr. Comput. Pract. Exp.10https://doi.org/10.1002/cpe.6794db/journals/concurrency/concurrency34.html#JerbiCGBT22Rihab ChaariOmar CheikhrouhouAnis KoubâaHabib YoussefTuan Nguyen GiaDynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions.100488202245Comput. Sci. Rev.https://doi.org/10.1016/j.cosrev.2022.100488https://www.wikidata.org/entity/Q114749723db/journals/csr/csr45.html#ChaariCKYG22Abdullah Ayub KhanAftab Ahmed ShaikhOmar CheikhrouhouAsif Ali LaghariMamoon RashidMuhammad Shafiq 0003Habib HamamIMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network.2854-2862202216IET Image Process.11https://doi.org/10.1049/ipr2.12272db/journals/iet-ipr/iet-ipr16.html#KhanSCLRSH22Xiaowei WangShoulin YinMuhammad Shafiq 0003Asif Ali LaghariShahid KarimOmar CheikhrouhouWajdi AlhakamiHabib HamamA New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.4260804:1-4260804:1420222022Secur. Commun. Networkshttps://doi.org/10.1155/2022/4260804https://www.wikidata.org/entity/Q122231324db/journals/scn/scn2022.html#WangYSLKCAH22Hend LiouaneSana MessousOmar CheikhrouhouRegularized least square multi-hops localization algorithm based on DV-Hop for wireless sensor networks.349-358202280Telecommun. Syst.3https://doi.org/10.1007/s11235-022-00897-zdb/journals/telsys/telsys80.html#LiouaneMC22Wassim JerbiOmar CheikhrouhouHabib HamamHafedh TrabelsiAbderrahmen GuermaziIncorporate mobility management into industrial wireless sensor networks.475-4802022IWCMChttps://doi.org/10.1109/IWCMC55113.2022.9824892conf/iwcmc/2022db/conf/iwcmc/iwcmc2022.html#JerbiCHTG22Wassim JerbiOmar CheikhrouhouHabib HamamHafedh TrabelsiAbderrahmen GuermaziA blockchain-based storage intelligent.635-6402022IWCMChttps://doi.org/10.1109/IWCMC55113.2022.9824790conf/iwcmc/2022db/conf/iwcmc/iwcmc2022.html#JerbiCHTG22aOmar CheikhrouhouAtilla ElçiPreface.1-22022SINhttps://doi.org/10.1109/SIN56466.2022.9970500conf/sin/2022db/conf/sin/sin2022.html#CheikhrouhouE22Omar CheikhrouhouOuissem Ben FredjNesrine AtitallahSalem HellalIntrusion Detection in Industrial IoT.1-42022SINhttps://doi.org/10.1109/SIN56466.2022.9970535conf/sin/2022db/conf/sin/sin2022.html#CheikhrouhouFAH22Ines JemalMohamed Amine HaddarOmar CheikhrouhouAdel MahfoudhiSWAF: A Smart Web Application Firewall Based on Convolutional Neural Network.1-62022SINhttps://doi.org/10.1109/SIN56466.2022.9970545conf/sin/2022db/conf/sin/sin2022.html#JemalHCM22Bessem ZaabarOmar CheikhrouhouMohamed AbidIntrusion Detection System for IoMT through Blockchain-based Federated Learning.1-82022SINhttps://doi.org/10.1109/SIN56466.2022.9970536conf/sin/2022db/conf/sin/sin2022.html#ZaabarCA22Omar CheikhrouhouIchrak AmdouniKhaleel Mershad 0001Meryem AmmiTuan Nguyen GiaBlockchain for the Cybersecurity of Smart City Applications.2022abs/2206.02760CoRRhttps://doi.org/10.48550/arXiv.2206.02760db/journals/corr/corr2206.html#abs-2206-02760Omar CheikhrouhouMd. Redowan MahmudRamzi ZouariMuhammad IbrahimAtef ZaguiaTuan Nguyen GiaOne-Dimensional CNN Approach for ECG Arrhythmia Analysis in Fog-Cloud Environments.103513-10352320219IEEE Accesshttps://doi.org/10.1109/ACCESS.2021.3097751db/journals/access/access9.html#CheikhrouhouMZI21Hend LiouaneSana MessousOmar CheikhrouhouMohammed BazHabib HamamRegularized Least Square Multi-Hops Localization Algorithm for Wireless Sensor Networks.136406-13641820219IEEE Accesshttps://doi.org/10.1109/ACCESS.2021.3116767db/journals/access/access9.html#LiouaneMCBH21Vipul Kumar MishraMayank DixitTejalal ChoudharyAnurag GoswamiManjit KaurOmar CheikhrouhouHabib HamamA Heuristic-Driven and Cost Effective Majority/ Minority Logic Synthesis for Post-CMOS Emerging Technology.168689-16870220219IEEE Accesshttps://doi.org/10.1109/ACCESS.2021.3079310db/journals/access/access9.html#MishraDCGKCH21Bessem ZaabarOmar CheikhrouhouFaisal JamilMeryem AmmiMohamed AbidHealthBlock: A secure blockchain-based healthcare data management system.1085002021200Comput. Networkshttps://doi.org/10.1016/j.comnet.2021.108500db/journals/cn/cn200.html#ZaabarCJAA21Ines JemalMohamed Amine HaddarOmar CheikhrouhouAdel MahfoudhiPerformance evaluation of Convolutional Neural Network for web security.58-672021175Comput. Commun.https://doi.org/10.1016/j.comcom.2021.04.029https://www.wikidata.org/entity/Q115063218db/journals/comcom/comcom175.html#JemalHCM21Shamsa KanwalSaba InamOmar CheikhrouhouKinza MahnoorAtef ZaguiaHabib HamamAnalytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes.5499538:1-5499538:1920212021Complex.https://doi.org/10.1155/2021/5499538https://www.wikidata.org/entity/Q121189938db/journals/complexity/complexity2021.html#KanwalICMZH21Omar CheikhrouhouInes KhoufiA comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy.100369202140Comput. Sci. Rev.https://doi.org/10.1016/j.cosrev.2021.100369db/journals/csr/csr40.html#CheikhrouhouK21Wassim JerbiAbderrahmen GuermaziOmar CheikhrouhouHafedh TrabelsiCoopECC: A Collaborative Cryptographic Mechanism for the Internet of Things.8878513:1-8878513:820212021J. Sensorshttps://doi.org/10.1155/2021/8878513https://www.wikidata.org/entity/Q114846331db/journals/js/js2021.html#JerbiGCT21Rahma GantassiBechir Ben GouissemOmar CheikhrouhouSalim El KhediriSalem HasnaouiOptimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning.5531185:1-5531185:1220212021Secur. Commun. Networkshttps://doi.org/10.1155/2021/5531185https://www.wikidata.org/entity/Q114975172db/journals/scn/scn2021.html#GantassiGCKH21Tarek FrikhaFaten ChaabaneNadhir AouintiOmar CheikhrouhouNader Ben AmorAbdelfateh KerroucheImplementation of Blockchain Consensus Algorithm on Embedded Architecture.9918697:1-9918697:1120212021Secur. Commun. Networkshttps://doi.org/10.1155/2021/9918697https://www.wikidata.org/entity/Q114974686db/journals/scn/scn2021.html#FrikhaCACAK21Darpan AnandVineeta KhemchandaniMunish SabharwalOmar CheikhrouhouOuissem Ben FredjLightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems.9940183:1-9940183:1520212021Secur. Commun. Networkshttps://doi.org/10.1155/2021/9940183db/journals/scn/scn2021.html#AnandKSCF21Nitheesh Murugan KaliyamurthySwapnesh TaterhSuresh ShanmugasundaramAnkit SaxenaOmar CheikhrouhouHadda Ben ElhadjSoftware-Defined Networking: An Evolving Network Architecture - Programmability and Security Perspective.9971705:1-9971705:720212021Secur. Commun. Networkshttps://doi.org/10.1155/2021/9971705https://www.wikidata.org/entity/Q113433842db/journals/scn/scn2021.html#KaliyamurthyTSS21Azza AllouchOmar CheikhrouhouAnis KoubâaKhalifa ToumiMohamed KhalguiTuan Nguyen GiaUTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones.3049202121Sensors9https://doi.org/10.3390/s21093049db/journals/sensors/sensors21.html#AllouchCKTKG21Sana MessousHend LiouaneOmar CheikhrouhouHabib HamamImproved Recursive DV-Hop Localization Algorithm with RSSI Measurement for Wireless Sensor Networks.4152202121Sensors12https://doi.org/10.3390/s21124152db/journals/sensors/sensors21.html#MessousLCH21Abid Ali 0001Muhammad Munwar IqbalHarun JamilFaiza QayyumSohail JabbarOmar CheikhrouhouMohammed BazFaisal JamilAn Efficient Dynamic-Decision Based Task Scheduler for Task Offloading Optimization and Energy Management in Mobile Cloud Computing.4527202121Sensors13https://doi.org/10.3390/s21134527db/journals/sensors/sensors21.html#AliIJQJCBJ21Tehreem NasirSafdar RazaMuhammad AbrarHafiz Abd Ul MuqeetHarun JamilFaiza QayyumOmar CheikhrouhouFawaz AlasseryHabib HamamOptimal Scheduling of Campus Microgrid Considering the Electric Vehicle Integration in Smart Grid.7133202121Sensors21https://doi.org/10.3390/s21217133db/journals/sensors/sensors21.html#NasirRAMJQCAH21Sayeed Haider SalihMosab HamdanAbdelzahir AbdelmaboudAhmed AbdelazizSamah AbdelsalamMaha M. AlthobaitiOmar CheikhrouhouHabib HamamFaiz AlotaibiPrioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review.8391202121Sensors24https://doi.org/10.3390/s21248391db/journals/sensors/sensors21.html#SalihHAAAACHA21Mehedi MasudM. Shamim HossainHesham AlhumyaniSultan S. AlshamraniOmar CheikhrouhouSaleh IbrahimGhulam MuhammadAmr Ezz El-Din RashedB. B. Gupta 0001Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images.85:1-85:17202121ACM Trans. Internet Techn.4https://doi.org/10.1145/3418355db/journals/toit/toit21.html#MasudHAACIMRG21Khaleel Mershad 0001Omar CheikhrouhouLeila IsmailProof of accumulated trust: A new consensus protocol for the security of the IoV.100392202132Veh. Commun.https://doi.org/10.1016/j.vehcom.2021.100392db/journals/vcomm/vcomm32.html#MershadCI21Abdelouahid DerhabMohamed GuerroumiMohamed BelaouedOmar CheikhrouhouBMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks.9984666:1-9984666:1220212021Wirel. Commun. Mob. Comput.https://doi.org/10.1155/2021/9984666https://www.wikidata.org/entity/Q118322471db/journals/wicomm/wicomm2021.html#DerhabGBC21Wassim JerbiOmar CheikhrouhouAbderrahmen GuermaziAtef BoubakerHafedh TrabelsiA Novel Blockchain Secure to Routing Protocol in WSN.1-62021HPSRhttps://doi.org/10.1109/HPSR52026.2021.9481805conf/hpsr/2021db/conf/hpsr/hpsr2021.html#JerbiCGBT21Wassim JerbiOmar CheikhrouhouAbderrahmen GuermaziHabib HamamHafedh TrabelsiA Blockchain based Authentication Scheme for Mobile Data Collector in IoT.929-9342021IWCMChttps://doi.org/10.1109/IWCMC51323.2021.9498656conf/iwcmc/2021db/conf/iwcmc/iwcmc2021.html#JerbiCGHT21Bessem ZaabarOmar CheikhrouhouMeryem AmmiAli Ismail AwadMohamed AbidSecure and Privacy-aware Blockchain-based Remote Patient Monitoring System for Internet of Healthcare Things.200-2052021WiMobhttps://doi.org/10.1109/WiMob52687.2021.9606362conf/wimob/2021db/conf/wimob/wimob2021.html#ZaabarCAAA21Rihab ChaariOmar CheikhrouhouAnis KoubâaHabib YoussefHabib HamamMulti-objective Computation Offloading for Cloud Robotics using NSGA-II.206-2112021WiMobhttps://doi.org/10.1109/WiMob52687.2021.9606420conf/wimob/2021db/conf/wimob/wimob2021.html#ChaariCKYH21Omar CheikhrouhouInes KhoufiA Comprehensive Survey on the Multiple Travelling Salesman Problem: Applications, Approaches and Taxonomy.2021abs/2102.12772CoRRhttps://arxiv.org/abs/2102.12772db/journals/corr/corr2102.html#abs-2102-12772Saleh IbrahimHesham AlhumyaniMehedi MasudSultan S. AlshamraniOmar CheikhrouhouGhulam MuhammadM. Shamim HossainAlaa M. AbbasFramework for Efficient Medical Image Encryption Using Dynamic S-Boxes and Chaotic Maps.160433-16044920208IEEE Accesshttps://doi.org/10.1109/ACCESS.2020.3020746db/journals/access/access8.html#IbrahimAMACMHA20Mehedi MasudGhulam MuhammadHesham AlhumyaniSultan S. AlshamraniOmar CheikhrouhouSaleh IbrahimM. Shamim HossainDeep learning-based intelligent face recognition in IoT-cloud environment.215-2222020152Comput. Commun.https://doi.org/10.1016/j.comcom.2020.01.050db/journals/comcom/comcom152.html#MasudMAACIH20Omar CheikhrouhouAnis KoubaaAnis ZarradA Cloud Based Disaster Management System.620209J. Sens. Actuator Networks1https://doi.org/10.3390/jsan9010006db/journals/jsan/jsan9.html#CheikhrouhouKZ20Mehedi MasudGhulam MuhammadM. Shamim HossainHesham AlhumyaniSultan S. AlshamraniOmar CheikhrouhouSaleh IbrahimLight Deep Model for Pulmonary Nodule Detection from CT Scan Images for Mobile Devices.8893494:1-8893494:820202020Wirel. Commun. Mob. Comput.https://doi.org/10.1155/2020/8893494db/journals/wicomm/wicomm2020.html#MasudMHAACI20Mehedi MasudHesham AlhumyaniSultan S. AlshamraniOmar CheikhrouhouSaleh IbrahimGhulam MuhammadM. Shamim HossainMohammad ShorfuzzamanLeveraging Deep Learning Techniques for Malaria Parasite Detection Using Mobile Application.8895429:1-8895429:1520202020Wirel. Commun. Mob. Comput.https://doi.org/10.1155/2020/8895429db/journals/wicomm/wicomm2020.html#MasudAACIMHS20Ines JemalMohamed Amine HaddarOmar CheikhrouhouAdel MahfoudhiM-CNN: A New Hybrid Deep Learning Model for Web Security.1-72020AICCSAhttps://doi.org/10.1109/AICCSA50499.2020.9316508conf/aiccsa/2020db/conf/aiccsa/aiccsa2020.html#JemalHCM20Marwa Ben JabraAdel AmmarAnis KoubaaOmar CheikhrouhouHabib HamamAI-based Pilgrim Detection using Convolutional Neural Networks.1-62020ATSIPhttps://doi.org/10.1109/ATSIP49331.2020.9231549conf/atsip/2020db/conf/atsip/atsip2020.html#JabraAKCH20Ouissem Ben FredjOmar CheikhrouhouMoez KrichenHabib HamamAbdelouahid DerhabAn OWASP Top Ten Driven Survey on Web Application Protection Methods.235-2522020CRiSIShttps://doi.org/10.1007/978-3-030-68887-5_14conf/crisis/2020db/conf/crisis/crisis2020.html#FredjCKHD20Ines JemalMohamed Amine HaddarOmar CheikhrouhouAdel MahfoudhiMalicious Http Request Detection Using Code-Level Convolutional Neural Network.317-3242020CRiSIShttps://doi.org/10.1007/978-3-030-68887-5_19conf/crisis/2020db/conf/crisis/crisis2020.html#JemalHCM20Ines JemalMohamed Amine HaddarOmar CheikhrouhouAdel MahfoudhiASCII Embedding: An Efficient Deep Learning Method for Web Attacks Detection.286-2972020MedPRAIhttps://doi.org/10.1007/978-3-030-71804-6_21conf/medprai/2020db/conf/medprai/medprai2020.html#JemalHCM20Ouissem Ben FredjAlaeddine MihoubMoez KrichenOmar CheikhrouhouAbdelouahid DerhabCyberSecurity Attack Prediction: A Deep Learning Approach.5:1-5:62020SINhttps://doi.org/10.1145/3433174.3433614conf/sin/2020db/conf/sin/sin2020.html#FredjMKCD20Anis KoubâaBasit QureshiMohamed-Foued SritiAzza AllouchYasir JavedMaram AlajlanOmar CheikhrouhouMohamed KhalguiEduardo TovarDronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones.46-62201986Ad Hoc Networkshttps://doi.org/10.1016/j.adhoc.2018.09.013db/journals/adhoc/adhoc86.html#KoubaaQSAJACKT19Rihab ChaariOmar CheikhrouhouAnis KoubâaHabib YoussefHabib HmamTowards a Distributed Computation Offloading Architecture for Cloud Robotics.434-4412019IWCMChttps://doi.org/10.1109/IWCMC.2019.8766504conf/iwcmc/2019db/conf/iwcmc/iwcmc2019.html#ChaariCKYH19Azza AllouchOmar CheikhrouhouAnis KoubâaMohamed KhalguiTarek AbbesMAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems.621-6282019IWCMChttps://doi.org/10.1109/IWCMC.2019.8766667conf/iwcmc/2019db/conf/iwcmc/iwcmc2019.html#AllouchCKKA19Omar CheikhrouhouAnis KoubâaBlockLoc: Secure Localization in the Internet of Things using Blockchain.629-6342019IWCMChttps://doi.org/10.1109/IWCMC.2019.8766440conf/iwcmc/2019db/conf/iwcmc/iwcmc2019.html#CheikhrouhouK19Omar CheikhrouhouAnis KoubaaBlockLoc: Secure Localization in the Internet-of-Things using Blockchain.2019abs/1904.13138CoRRhttp://arxiv.org/abs/1904.13138db/journals/corr/corr1904.html#abs-1904-13138Azza AllouchOmar CheikhrouhouAnis KoubaaMohamed KhalguiTarek AbbesMAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems.2019abs/1905.00265CoRRhttp://arxiv.org/abs/1905.00265db/journals/corr/corr1905.html#abs-1905-00265Marwa Ben JabraAdel AmmarAnis KoubaaOmar CheikhrouhouHabib HamamAI-based Pilgrim Detection using Convolutional Neural Networks.2019abs/1911.07509CoRRhttp://arxiv.org/abs/1911.07509db/journals/corr/corr1911.html#abs-1911-07509Anis KoubaaHachemi BennaceurImen ChâariSahar TriguiAdel AmmarMohamed-Foued SritiMaram AlajlanOmar CheikhrouhouYasir JavedRobot Path Planning and Cooperation - Foundations, Algorithms and ExperimentationsSpringer20183-188Studies in Computational Intelligence772978-3-319-77040-6https://doi.org/10.1007/978-3-319-77042-0Sahar TriguiOmar CheikhrouhouAnis KoubaaAnis ZarradHabib YoussefAn analytical hierarchy process-based approach to solve the multi-objective multiple traveling salesman problem.355-369201811Intell. Serv. Robotics4https://doi.org/10.1007/s11370-018-0259-8db/journals/isrob/isrob11.html#TriguiCKZY18Omar CheikhrouhouGhulam M. BhattiRoobaea AlroobaeaA Hybrid DV-Hop Algorithm Using RSSI for Localization in Large-Scale Wireless Sensor Networks.1469201818Sensors5https://doi.org/10.3390/s18051469https://www.wikidata.org/entity/Q55313591db/journals/sensors/sensors18.html#CheikhrouhouBA18Anis KoubâaOmar CheikhrouhouHachemi BennaceurMohamed-Foued SritiYasir JavedAdel AmmarMove and Improve: a Market-Based Mechanism for the Multiple Depot Multiple Travelling Salesmen Problem.307-330201785J. Intell. Robotic Syst.2https://doi.org/10.1007/s10846-016-0400-xhttps://www.wikidata.org/entity/Q57740051db/journals/jirs/jirs85.html#KoubaaCBSJA17Sahar TriguiOmar CheikhrouhouAnis KoubaaUthman BaroudiHabib YoussefFL-MTSP: a fuzzy logic approach to solve the multi-objective multiple traveling salesman problem for multi-robot systems.7351-7362201721Soft Comput.24https://doi.org/10.1007/s00500-016-2279-7db/journals/soco/soco21.html#TriguiCKBY17Omar CheikhrouhouSecure Group Communication in Wireless Sensor Networks: A survey.115-132201661J. Netw. Comput. Appl.https://doi.org/10.1016/j.jnca.2015.10.011db/journals/jnca/jnca61.html#Cheikhrouhou16Anis ZarradAnis KoubaaOmar CheikhrouhouPoster: 3D Virtual Disaster Management Environment using Wireless Sensor Networks.267-2682016EWSNhttp://dl.acm.org/citation.cfm?id=2893766conf/ewsn/2016db/conf/ewsn/ewsn2016.html#ZarradKC16Omar CheikhrouhouAnis KoubâaAnis ZaardAnalytical Hierarchy Process based Multi-objective Multiple Traveling Salesman Problem.130-1362016ICARSChttps://doi.org/10.1109/ICARSC.2016.26conf/icarsc/2016db/conf/icarsc/icarsc2016.html#CheikhrouhouKZ16Sahar TriguiAnis KoubâaOmar CheikhrouhouBasit QureshiHabib YoussefA Clustering Market-Based Approach for Multi-robot Emergency Response Applications.137-1432016ICARSChttps://doi.org/10.1109/ICARSC.2016.14conf/icarsc/2016db/conf/icarsc/icarsc2016.html#TriguiKCQY16Hela MaddarWafa KammounOmar CheikhrouhouHabib YoussefLightweight Trust Model with High Longevity for Wireless Sensor Networks.548-5532016ICISSPhttps://doi.org/10.5220/0005811005480553conf/icissp/2016db/conf/icissp/icissp2016.html#MaddarKCY16Manel ElleuchiOmar CheikhrouhouAbdulfattah Mohammad ObeidMohamed AbidAn Efficient Secure scheme for Wireless Sensor Networks.129-1322016SINhttps://doi.org/10.1145/2947626.2947636conf/sin/2016db/conf/sin/sin2016.html#ElleuchiCOA16Sahar TriguiAnis KoubâaOmar CheikhrouhouHabib YoussefHachemi BennaceurMohamed-Foued SritiYasir JavedA Distributed Market-based Algorithm for the Multi-robot Assignment Problem.1108-11142014ANT/SEIThttps://doi.org/10.1016/j.procs.2014.05.540https://www.wikidata.org/entity/Q57740068conf/ant/2014db/conf/ant/ant2014.html#TriguiKCYBSJ14Omar CheikhrouhouAnis KoubaaHachemi BennaceurMove and improve: A distributed multi-robot coordination approach for multiple depots multiple travelling salesmen problem.28-352014ICARSChttps://doi.org/10.1109/ICARSC.2014.6849758conf/icarsc/2014db/conf/icarsc/icarsc2014.html#CheikhrouhouKB14Olfa GaddourAnis KoubaaRaghuraman RangarajanOmar CheikhrouhouEduardo TovarMohamed AbidCo-RPL: RPL routing for mobile low power wireless sensor networks using Corona mechanism.200-2092014SIEShttps://doi.org/10.1109/SIES.2014.6871205conf/sies/2014db/conf/sies/sies2014.html#GaddourKRCTA14Omar CheikhrouhouAnis KoubaaGianluca DiniHani AlzaidMohamed AbidLNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.1419-1444201210Ad Hoc Networks7https://doi.org/10.1016/j.adhoc.2012.03.019db/journals/adhoc/adhoc10.html#CheikhrouhouKDAA12Omar CheikhrouhouAnis KoubaaGianluca DiniMohamed AbidRiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks.783-797201115Pers. Ubiquitous Comput.8https://doi.org/10.1007/s00779-011-0365-5db/journals/puc/puc15.html#CheikhrouhouKDA11Omar CheikhrouhouAnis KoubaaGianluca DiniHani AlzaidMohamed AbidLNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.198-2072011conf/ant/2011ANT/MobiWIShttps://doi.org/10.1016/j.procs.2011.07.027db/journals/procedia/procedia5.html#CheikhrouhouKDAA11Omar CheikhrouhouMaryline LaurentAmin Ben AbdallahMaher Ben JemaaAn EAP-EHash authentication method adapted to resource constrained terminals.271-284201065Ann. des Télécommunications5-6https://doi.org/10.1007/s12243-009-0135-9db/journals/adt/adt65.html#CheikhrouhouLAJ10Omar CheikhrouhouAnis KoubaaManel BoujelbenMohamed AbidA lightweight user authentication scheme for Wireless Sensor Networks.1-72010AICCSAhttps://doi.org/10.1109/AICCSA.2010.5586995https://doi.ieeecomputersociety.org/10.1109/AICCSA.2010.5586995conf/aiccsa/2010db/conf/aiccsa/aiccsa2010.html#CheikhrouhouKBA10Olfa GaddourAnis KoubaaOmar CheikhrouhouMohamed AbidZ-Cast: A Multicast Routing Mechanism in ZigBee Cluster-Tree Wireless Sensor Networks.171-1792010ICDCS Workshopshttps://doi.org/10.1109/ICDCSW.2010.52https://doi.ieeecomputersociety.org/10.1109/ICDCSW.2010.52conf/icdcsw/2010db/conf/icdcsw/icdcsw2010.html#GaddourKCA10Omar CheikhrouhouAnis KoubaaOlfa GaddourGianluca DiniMohamed AbidRiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks.64-682010ICWUShttps://doi.org/10.1109/ICWUS.2010.5670431conf/icwus/2010db/conf/icwus/icwus2010.html#CheikhrouhouKGDA10Omar CheikhrouhouManel BoujelbenAnis KoubaaMohamed AbidAttacks and improvement of "security enhancement for a dynamic id-based remote user authentication scheme".517-5222009AICCSAhttps://doi.org/10.1109/AICCSA.2009.5069373https://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069373conf/aiccsa/2009db/conf/aiccsa/aiccsa2009.html#CheikhrouhouBKA09Alaa M. AbbasTarek AbbesAmin Ben AbdallahAhmed AbdelazizAbdelzahir AbdelmaboudSamah AbdelsalamAymen AbidMohamed AbidMuhammad AbrarMaram AlajlanFawaz AlasseryWajdi AlhakamiHesham AlhumyaniAbid Ali 0001Azza AllouchFaiz AlotaibiRoobaea AlroobaeaSultan S. AlshamraniMaha M. AlthobaitiHani AlzaidIchrak AmdouniAdel AmmarMeryem AmmiNader Ben AmorDarpan AnandNadhir AouintiNesrine AtitallahAli Ismail AwadUthman A. BaroudiUthman BaroudiMohamed BazMohammed BazMohamed BelaouedAnouar BenamorHachemi BennaceurGhulam M. BhattiAtef BoubakerManel BoujelbenFaten ChaabaneImen ChâariRihab ChaariJin-Ghoo ChoiTejalal ChoudharyMehmet Akif CifciEman Yasser DaraghmiYousef-Awwad DaraghmiAbdelouahid DerhabGianluca DiniMayank DixitAtilla ElçiHadda Ben ElhadjManel ElleuchiMohamed Amine FerragOuissem Ben FredjTarek FrikhaOlfa GaddourSimone GamaRahma GantassiMuhammad GhulamGhulam MuhammadTuan Nguyen GiaAnurag GoswamiBechir Ben GouissemAbderrahmen GuermaziMohamed GuerroumiBing GuoBrij B. GuptaB. B. Gupta 0001Med Amine HaddarMohamed Amine HaddarFahima HajjejHabib HamamHabib HmamMosab HamdanMonia HamdiSalem HasnaouiSalem HellalM. Shamim HossainMushtaq HussainMuhammad IbrahimSaleh IbrahimSaba InamMuhammad Munwar IqbalLeila IsmailSohail JabbarMarwa Ben JabraFaisal JamilHarun JamilYasir JavedMaher Ben JemaaInes JemalWassim JerbiAbdennaceur KachouriNitheesh Murugan KaliyamurthyWafa KammounShamsa KanwalShahid KarimManjit KaurJuliano F. KazienkoAbdelfateh KerroucheMohamed KhalguiAbdullah Ayub KhanFarrukh Aslam KhanSalim El KhediriVineeta KhemchandaniInes KhoufiAnis KoubaaAnis KoubâaMoez KrichenAsif Ali LaghariMaryline LaurentHend LiouaneHela MaddarLeandros MaglarasAdel MahfoudhiMd. Redowan MahmudKinza MahnoorHasaan MaqsoodMehedi MasudMohamed MazouziKhaleel Mershad 0001Sana MessousAlaeddine MihoubVipul Kumar MishraFida MohammadSanaz Rahimi MoosaviHafiz Abd Ul MuqeetSaid NabiTehreem NasirNícolas NavesAbdulfattah Mohammad ObeidSajida QadanFaiza QayyumChaoxia QingSilvio E. QuincozesVagner Ereno QuincozesBasit QureshiRaghuraman RangarajanAmr Ezz El-Din RashedMamoon RashidSafdar RazaMunish SabharwalSayeed Haider SalihAnkit SaxenaTayyaba SeharMuhammad Shafiq 0002Muhammad Shafiq 0003Aftab Ahmed ShaikhSuresh ShanmugasundaramYan Shen 0001Mohammad ShorfuzzamanEstêvão F. C. SilvaMohamed-Foued SritiHong SuSwapnesh TaterhKhalifa ToumiEduardo TovarHafedh TrabelsiSahar TriguiXiaowei WangShoulin YinHabib YoussefRami YousufBessem ZaabarAnis ZaardAtef ZaguiaGhada ZaibiGhada ZaïbiAnis ZarradYun Zhang 0022Zhen Zhang 0036Ramzi Zouari