iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.uni-trier.de/pid/05/720.rss
dblp: Farid Naït-Abdesselam https://dblp.org/pid/05/720.html dblp person page RSS feed Fri, 13 Dec 2024 20:05:52 +0100 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Farid Naït-Abdesselamhttps://dblp.org/pid/05/720.html14451 A Convolutional Neural Network-based Approach For Image Analysis and Injection Detection.https://doi.org/10.1109/AVSS61716.2024.10672581, :
A Convolutional Neural Network-based Approach For Image Analysis and Injection Detection. AVSS : 1-6]]>
https://dblp.org/rec/conf/avss/TitounaN24Mon, 01 Jan 2024 00:00:00 +0100
Multi-Agent Reinforcement Learning-Based Extended Boid Modeling for Drone Swarms.https://doi.org/10.1109/ICC51166.2024.10622479, :
Multi-Agent Reinforcement Learning-Based Extended Boid Modeling for Drone Swarms. ICC : 1551-1556]]>
https://dblp.org/rec/conf/icc/ZengN24Mon, 01 Jan 2024 00:00:00 +0100
Leveraging Human-In-The-Loop Machine Learning and GAN-Synthesized Data for Intrusion Detection in Unmanned Aerial Vehicle Networks.https://doi.org/10.1109/ICC51166.2024.10622433, :
Leveraging Human-In-The-Loop Machine Learning and GAN-Synthesized Data for Intrusion Detection in Unmanned Aerial Vehicle Networks. ICC : 1557-1562]]>
https://dblp.org/rec/conf/icc/ZengN24aMon, 01 Jan 2024 00:00:00 +0100
Bluetooth Low Energy (BLE) RF Dataset for Machine Learning in WBANs.https://doi.org/10.1109/WCNC57260.2024.10571027, , , , :
Bluetooth Low Energy (BLE) RF Dataset for Machine Learning in WBANs. WCNC : 1-6]]>
https://dblp.org/rec/conf/wcnc/KashaniSKKN24Mon, 01 Jan 2024 00:00:00 +0100
Enhancing Privacy Protection for Federated Learning with Distributed Differential Privacy.https://doi.org/10.1109/WiMob61911.2024.10770430, , :
Enhancing Privacy Protection for Federated Learning with Distributed Differential Privacy. WiMob : 408-413]]>
https://dblp.org/rec/conf/wimob/WeiJN24Mon, 01 Jan 2024 00:00:00 +0100
BLE-WBAN: RF real-world dataset of BLE devices in human-centric healthcare environments.https://doi.org/10.21227/mtg7-eb43, , , , :
BLE-WBAN: RF real-world dataset of BLE devices in human-centric healthcare environments.  note: work in progress]]>
https://dblp.org/rec/data/10/KashaniSKKN24Mon, 01 Jul 2024 01:00:00 +0200
Addressing Trust Challenges in Blockchain Oracles Using Asymmetric Byzantine Quorums.https://doi.org/10.48550/arXiv.2401.00175, , :
Addressing Trust Challenges in Blockchain Oracles Using Asymmetric Byzantine Quorums. CoRR abs/2401.00175 ()]]>
https://dblp.org/rec/journals/corr/abs-2401-00175Mon, 01 Jan 2024 00:00:00 +0100
Lightweight anonymous and mutual authentication scheme for wireless body area networks.https://doi.org/10.1016/j.comnet.2023.109625, , :
Lightweight anonymous and mutual authentication scheme for wireless body area networks. Comput. Networks 224: 109625 ()]]>
https://dblp.org/rec/journals/cn/AttirNF23Sat, 01 Apr 2023 01:00:00 +0200
Scalable Blockchain System for Load Balancing DNS Servers Using Heuristic Sharding.https://doi.org/10.1109/BCCA58897.2023.10338848, , :
Scalable Blockchain System for Load Balancing DNS Servers Using Heuristic Sharding. BCCA : 420-425]]>
https://dblp.org/rec/conf/bcca/RahmanTN23Sun, 01 Jan 2023 00:00:00 +0100
Parallel Committees: High-Performance, Scalable, Secure and Fault-Tolerant Data Replication Using a Novel Sharding Technique.https://doi.org/10.1109/BCCA58897.2023.10338937, :
Parallel Committees: High-Performance, Scalable, Secure and Fault-Tolerant Data Replication Using a Novel Sharding Technique. BCCA : 546-553]]>
https://dblp.org/rec/conf/bcca/SolatN23Sun, 01 Jan 2023 00:00:00 +0100
Scaling a Blockchain System from Eventual to Full Atomicity Using Confederation Approach.https://doi.org/10.1109/BRAINS59668.2023.10316885, , :
Scaling a Blockchain System from Eventual to Full Atomicity Using Confederation Approach. BRAINS : 1-2]]>
https://dblp.org/rec/conf/brains/RahmanTN23Sun, 01 Jan 2023 00:00:00 +0100
Prioritised Sharding: A Novel Approach to Enhance Blockchain Scalability.https://doi.org/10.1109/BRAINS59668.2023.10317052, , :
Prioritised Sharding: A Novel Approach to Enhance Blockchain Scalability. BRAINS : 1-2]]>
https://dblp.org/rec/conf/brains/RahmanTN23aSun, 01 Jan 2023 00:00:00 +0100
Scaling A Blockchain System With Layered Architecture.https://doi.org/10.1109/CommNet60167.2023.10365275, , , :
Scaling A Blockchain System With Layered Architecture. CommNet : 1-6]]>
https://dblp.org/rec/conf/commnet/RahmanTNS23Sun, 01 Jan 2023 00:00:00 +0100
Scalable Blockchain Through Prioritised Sharding.https://doi.org/10.1109/CommNet60167.2023.10365307, , , :
Scalable Blockchain Through Prioritised Sharding. CommNet : 1-6]]>
https://dblp.org/rec/conf/commnet/RahmanTNS23aSun, 01 Jan 2023 00:00:00 +0100
Study of Spiking Neural Network-Based Regressor on Applications in Digital Predistortion for Power Amplifiers.https://doi.org/10.1109/CommNet60167.2023.10365305, , , :
Study of Spiking Neural Network-Based Regressor on Applications in Digital Predistortion for Power Amplifiers. CommNet : 1-7]]>
https://dblp.org/rec/conf/commnet/WeiWNB23Sun, 01 Jan 2023 00:00:00 +0100
A HITL-Integrated Machine Learning Approach to Secure Drone Networks for IIoT Applications.https://doi.org/10.1109/GCWkshps58843.2023.10465098, , :
A HITL-Integrated Machine Learning Approach to Secure Drone Networks for IIoT Applications. GLOBECOM (Workshops) : 614-619]]>
https://dblp.org/rec/conf/globecom/ZengNC23Sun, 01 Jan 2023 00:00:00 +0100
Detecting CAM Flooding Attacks in Vehicular Networks Using Online K-means Algorithm.https://doi.org/10.1109/GLOBECOM54140.2023.10436840, , :
Detecting CAM Flooding Attacks in Vehicular Networks Using Online K-means Algorithm. GLOBECOM : 2985-2990]]>
https://dblp.org/rec/conf/globecom/RazzaziNH23Sun, 01 Jan 2023 00:00:00 +0100
FoMS: Fog-Enabled Mobile Sensor Virtualization Architecture for IoT Applications.https://doi.org/10.1109/GLOBECOM54140.2023.10437642, , , :
FoMS: Fog-Enabled Mobile Sensor Virtualization Architecture for IoT Applications. GLOBECOM : 3536-3541]]>
https://dblp.org/rec/conf/globecom/RoyKKN23Sun, 01 Jan 2023 00:00:00 +0100
Lightweight TLS 1.3 Handshake for C-ITS Systems.https://doi.org/10.1109/ICC45041.2023.10279295, , , , , :
Lightweight TLS 1.3 Handshake for C-ITS Systems. ICC : 1432-1437]]>
https://dblp.org/rec/conf/icc/GoncharskyiKGSKN23Sun, 01 Jan 2023 00:00:00 +0100
Defensive Randomization Against Adversarial Attacks in Image-Based Android Malware Detection.https://doi.org/10.1109/ICC45041.2023.10279592, , , :
Defensive Randomization Against Adversarial Attacks in Image-Based Android Malware Detection. ICC : 5072-5077]]>
https://dblp.org/rec/conf/icc/LanDNG23Sun, 01 Jan 2023 00:00:00 +0100
Realtime Intrusion Detection In Unmanned Aerial Vehicles Using Active Learning and Generative Adversarial Networks.https://doi.org/10.1109/ICPADS60453.2023.00386, , , :
Realtime Intrusion Detection In Unmanned Aerial Vehicles Using Active Learning and Generative Adversarial Networks. ICPADS : 2802-2803]]>
https://dblp.org/rec/conf/icpads/ZengBRN23Sun, 01 Jan 2023 00:00:00 +0100
An LSTM-Based Outlier Detection Approach for IoT Sensor Data in Hierarchical Edge Computing.https://doi.org/10.23919/SoftCOM58365.2023.10271607, , , :
An LSTM-Based Outlier Detection Approach for IoT Sensor Data in Hierarchical Edge Computing. SoftCOM : 1-6]]>
https://dblp.org/rec/conf/softcom/BibiTTN23Sun, 01 Jan 2023 00:00:00 +0100
Asymmetric Byzantine Quorum Approach to Resolve Trust Issues in Decentralized Blockchain Oracles.https://doi.org/10.23919/SoftCOM58365.2023.10271588, , :
Asymmetric Byzantine Quorum Approach to Resolve Trust Issues in Decentralized Blockchain Oracles. SoftCOM : 1-6]]>
https://dblp.org/rec/conf/softcom/RahmanTN23Sun, 01 Jan 2023 00:00:00 +0100
Range-Price Trade-Off in Sensor-Cloud for Provisioning Sensors-as-a-Service.https://doi.org/10.1109/TCC.2020.3030851, , :
Range-Price Trade-Off in Sensor-Cloud for Provisioning Sensors-as-a-Service. IEEE Trans. Cloud Comput. 10(4): 2897-2908 ()]]>
https://dblp.org/rec/journals/tcc/RoyMN22Sat, 01 Jan 2022 00:00:00 +0100
Diff-Price: Differential Pricing Scheme for Provisioning Safety-as-a-Service in Vehicular IoT Applications.https://doi.org/10.1109/TVT.2022.3175521, , , :
Diff-Price: Differential Pricing Scheme for Provisioning Safety-as-a-Service in Vehicular IoT Applications. IEEE Trans. Veh. Technol. 71(8): 8189-8198 ()]]>
https://dblp.org/rec/journals/tvt/RoyMMN22Sat, 01 Jan 2022 00:00:00 +0100
Malware Forensics: Legacy Solutions, Recent Advances, and Future Challenges.https://doi.org/10.1007/978-3-030-87049-2_25, , :
Malware Forensics: Legacy Solutions, Recent Advances, and Future Challenges. Honoring Professor Mohammad S. Obaidat : 685-710]]>
https://dblp.org/rec/conf/birthday/Nait-Abdesselam22Sat, 01 Jan 2022 00:00:00 +0100
Detecting False Data Injections in Images Collected by Drones: A Deep Learning Approach.https://doi.org/10.1109/GLOBECOM48099.2022.10001078, , :
Detecting False Data Injections in Images Collected by Drones: A Deep Learning Approach. GLOBECOM : 263-268]]>
https://dblp.org/rec/conf/globecom/Nait-Abdesselam22Sat, 01 Jan 2022 00:00:00 +0100
A Channel-based Authentication Using Machine Learning for Body Sensor Networks.https://doi.org/10.1109/GLOBECOM48099.2022.10001496, , :
A Channel-based Authentication Using Machine Learning for Body Sensor Networks. GLOBECOM : 1103-1108]]>
https://dblp.org/rec/conf/globecom/KashaniNK22Sat, 01 Jan 2022 00:00:00 +0100
TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things.https://doi.org/10.1109/GLOBECOM48099.2022.10001106, , , , , , :
TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things. GLOBECOM : 3539-3544]]>
https://dblp.org/rec/conf/globecom/KimGGSKNG22Sat, 01 Jan 2022 00:00:00 +0100
A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems.https://doi.org/10.1109/ISCC55528.2022.9912761, :
A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems. ISCC : 1-6]]>
https://dblp.org/rec/conf/iscc/TitounaN22Sat, 01 Jan 2022 00:00:00 +0100
X-haul Outage Compensation in 5G/6G Using Reconfigurable Intelligent Surfaces.https://doi.org/10.48550/arXiv.2207.03582, , :
X-haul Outage Compensation in 5G/6G Using Reconfigurable Intelligent Surfaces. CoRR abs/2207.03582 ()]]>
https://dblp.org/rec/journals/corr/abs-2207-03582Sat, 01 Jan 2022 00:00:00 +0100
A WAVE Based and Collaboration Driven Framework for Reduced Traffic Congestion in Smart Cities.https://doi.org/10.1109/MITS.2019.2953487, , , :
A WAVE Based and Collaboration Driven Framework for Reduced Traffic Congestion in Smart Cities. IEEE Intell. Transp. Syst. Mag. 13(4): 251-261 ()]]>
https://dblp.org/rec/journals/itsm/DjahelJNW21Fri, 01 Jan 2021 00:00:00 +0100
Towards enabling unmanned aerial vehicles as a service for heterogeneous applications.https://doi.org/10.23919/JCN.2021.000015, , , , :
Towards enabling unmanned aerial vehicles as a service for heterogeneous applications. J. Commun. Networks 23(3): 212-221 ()]]>
https://dblp.org/rec/journals/jcn/Nait-Abdesselam21Fri, 01 Jan 2021 00:00:00 +0100
Permissioned vs. Permissionless Blockchain: How and Why There Is Only One Right Choice.https://doi.org/10.17706/jsw.16.3.95-106, , :
Permissioned vs. Permissionless Blockchain: How and Why There Is Only One Right Choice. J. Softw. 16(3): 95-106 ()]]>
https://dblp.org/rec/journals/jsw/SolatCN21Fri, 01 Jan 2021 00:00:00 +0100
Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding.https://doi.org/10.1109/GLOBECOM46510.2021.9685234, , , , , :
Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/GuZHNSK21Fri, 01 Jan 2021 00:00:00 +0100
A Bayesian Game Model for Dynamic Channel Sensing Intervals in Internet of Things.https://doi.org/10.1109/GLOBECOM46510.2021.9685789, , , :
A Bayesian Game Model for Dynamic Channel Sensing Intervals in Internet of Things. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/SiddiquiKND21Fri, 01 Jan 2021 00:00:00 +0100
Enabling Real-Time Dashboards for Anxiety Risk Classification Using the Internet of Things.https://doi.org/10.1109/GLOBECOM46510.2021.9685683, , , :
Enabling Real-Time Dashboards for Anxiety Risk Classification Using the Internet of Things. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/SiddiquiNKD21Fri, 01 Jan 2021 00:00:00 +0100
Robustness of Image-based Android Malware Detection Under Adversarial Attacks.https://doi.org/10.1109/ICC42927.2021.9500425, , , :
Robustness of Image-based Android Malware Detection Under Adversarial Attacks. ICC : 1-6]]>
https://dblp.org/rec/conf/icc/DarwaishNTS21Fri, 01 Jan 2021 00:00:00 +0100
Anxiety and Depression Management For Elderly Using Internet of Things and Symphonic Melodies.https://doi.org/10.1109/ICC42927.2021.9500419, , , :
Anxiety and Depression Management For Elderly Using Internet of Things and Symphonic Melodies. ICC : 1-6]]>
https://dblp.org/rec/conf/icc/SiddiquiKND21Fri, 01 Jan 2021 00:00:00 +0100
Comparing ANN and SVM Algorithms for Predicting Exercise Routines of Diabetic Patients.https://doi.org/10.1109/IWCMC51323.2021.9498950, , , , :
Comparing ANN and SVM Algorithms for Predicting Exercise Routines of Diabetic Patients. IWCMC : 703-708]]>
https://dblp.org/rec/conf/iwcmc/KhanSSND21Fri, 01 Jan 2021 00:00:00 +0100
A Lightweight Security Technique For Unmanned Aerial Vehicles Against GPS Spoofing Attack.https://doi.org/10.1109/IWCMC51323.2021.9498734, :
A Lightweight Security Technique For Unmanned Aerial Vehicles Against GPS Spoofing Attack. IWCMC : 819-824]]>
https://dblp.org/rec/conf/iwcmc/TitounaN21Fri, 01 Jan 2021 00:00:00 +0100
Securing Unmanned Aerial Systems Using Mobile Agents and Artificial Neural Networks.https://doi.org/10.1109/IWCMC51323.2021.9498879, :
Securing Unmanned Aerial Systems Using Mobile Agents and Artificial Neural Networks. IWCMC : 825-830]]>
https://dblp.org/rec/conf/iwcmc/TitounaN21aFri, 01 Jan 2021 00:00:00 +0100
Data Quality Improvements for Internet of Things Using Artificial Neural Networks.https://doi.org/10.1109/ANTS50601.2020.9342762, :
Data Quality Improvements for Internet of Things Using Artificial Neural Networks. IEEE ANTS : 1-6]]>
https://dblp.org/rec/conf/IEEEants/Nait-Abdesselam20Wed, 01 Jan 2020 00:00:00 +0100
An Efficient Probabilistic Model for Anomaly Prediction in Aerial Ad Hoc Networks.https://doi.org/10.1109/ANTS50601.2020.9342769, :
An Efficient Probabilistic Model for Anomaly Prediction in Aerial Ad Hoc Networks. IEEE ANTS : 1-6]]>
https://dblp.org/rec/conf/IEEEants/TitounaN20Wed, 01 Jan 2020 00:00:00 +0100
RGB-based Android Malware Detection and Classification Using Convolutional Neural Network.https://doi.org/10.1109/GLOBECOM42002.2020.9348206, :
RGB-based Android Malware Detection and Classification Using Convolutional Neural Network. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/DarwaishN20Wed, 01 Jan 2020 00:00:00 +0100
An Online Anomaly Detection Approach For Unmanned Aerial Vehicles.https://doi.org/10.1109/IWCMC48107.2020.9148073, , :
An Online Anomaly Detection Approach For Unmanned Aerial Vehicles. IWCMC : 469-474]]>
https://dblp.org/rec/conf/iwcmc/TitounaNM20Wed, 01 Jan 2020 00:00:00 +0100
An Intelligent Malware Detection and Classification System Using Apps-to-Images Transformations and Convolutional Neural Networks.https://doi.org/10.1109/WiMob50308.2020.9253386, , :
An Intelligent Malware Detection and Classification System Using Apps-to-Images Transformations and Convolutional Neural Networks. WiMob : 1-6]]>
https://dblp.org/rec/conf/wimob/Nait-Abdesselam20Wed, 01 Jan 2020 00:00:00 +0100
A Data Cleansing Approach In Smart Home Environments Using Artificial Neural Networks.https://doi.org/10.1109/WiMob50308.2020.9253418, , :
A Data Cleansing Approach In Smart Home Environments Using Artificial Neural Networks. WiMob : 1-6]]>
https://dblp.org/rec/conf/wimob/TitounaND20Wed, 01 Jan 2020 00:00:00 +0100
D3S: A Framework for Enabling Unmanned AerialVehicles as a Service.http://arxiv.org/abs/2001.00103, , , , :
D3S: A Framework for Enabling Unmanned AerialVehicles as a Service. CoRR abs/2001.00103 ()]]>
https://dblp.org/rec/journals/corr/abs-2001-00103Wed, 01 Jan 2020 00:00:00 +0100
DODS: A Distributed Outlier Detection Scheme for Wireless Sensor Networks.https://doi.org/10.1016/j.comnet.2019.06.014, , :
DODS: A Distributed Outlier Detection Scheme for Wireless Sensor Networks. Comput. Networks 161: 93-101 ()]]>
https://dblp.org/rec/journals/cn/TitounaNK19Tue, 01 Jan 2019 00:00:00 +0100
A blockchain-based framework to secure vehicular social networks.https://doi.org/10.1002/ett.3650, , , , :
A blockchain-based framework to secure vehicular social networks. Trans. Emerg. Telecommun. Technol. 30(8) ()]]>
https://dblp.org/rec/journals/ett/YahiateneRRMN19Tue, 01 Jan 2019 00:00:00 +0100
JCN October special issue on IoT security and privacy.https://doi.org/10.1109/JCN.2019.100026, , , :
JCN October special issue on IoT security and privacy. J. Commun. Networks 21(5): 441-443 ()]]>
https://dblp.org/rec/journals/jcn/QiaoNGQ19Tue, 01 Jan 2019 00:00:00 +0100
A Multivariate Outlier Detection Algorithm for Wireless Sensor Networks.https://doi.org/10.1109/ICC.2019.8761353, , :
A Multivariate Outlier Detection Algorithm for Wireless Sensor Networks. ICC : 1-6]]>
https://dblp.org/rec/conf/icc/TitounaNK19Tue, 01 Jan 2019 00:00:00 +0100
Towards a Smart Parking Management System for Smart Cities.https://doi.org/10.1109/ISC246665.2019.9071740, , :
Towards a Smart Parking Management System for Smart Cities. ISC2 : 542-546]]>
https://dblp.org/rec/conf/isc2/MelnykDN19Tue, 01 Jan 2019 00:00:00 +0100
Predicting Cardiac Anomalies Using Probabilistic Models on Historical Electrocardiogram Data.https://doi.org/10.1109/SmartNets48225.2019.9069758, , , :
Predicting Cardiac Anomalies Using Probabilistic Models on Historical Electrocardiogram Data. SmartNets : 1-6]]>
https://dblp.org/rec/conf/smartnets/DarwaishHNK19Tue, 01 Jan 2019 00:00:00 +0100
A Novel Data Cleansing Approach for Sensitive Applications of Wireless Sensor Networks.https://doi.org/10.1109/SmartNets48225.2019.9069779, , :
A Novel Data Cleansing Approach for Sensitive Applications of Wireless Sensor Networks. SmartNets : 1-6]]>
https://dblp.org/rec/conf/smartnets/TitounaNK19Tue, 01 Jan 2019 00:00:00 +0100
Detection and Prediction of Cardiac Anomalies Using Wireless Body Sensors and Bayesian Belief Networks.http://arxiv.org/abs/1904.07976, , :
Detection and Prediction of Cardiac Anomalies Using Wireless Body Sensors and Bayesian Belief Networks. CoRR abs/1904.07976 ()]]>
https://dblp.org/rec/journals/corr/abs-1904-07976Tue, 01 Jan 2019 00:00:00 +0100
Secure transmission of multimedia contents over low-power mobile devices.https://doi.org/10.1016/j.jisa.2018.04.004, , , :
Secure transmission of multimedia contents over low-power mobile devices. J. Inf. Secur. Appl. 40: 183-192 ()]]>
https://dblp.org/rec/journals/istr/AlmasalhaNTK18Mon, 01 Jan 2018 00:00:00 +0100
A comprehensive 3-dimensional security analysis of a controller in software-defined networking.https://doi.org/10.1002/spy2.21, , :
A comprehensive 3-dimensional security analysis of a controller in software-defined networking. Secur. Priv. 1(2) ()]]>
https://dblp.org/rec/journals/sap/TsengNK18Mon, 01 Jan 2018 00:00:00 +0100
An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks.https://doi.org/10.1109/GLOCOM.2018.8647898, , , , , :
An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/KhelifiLNSMN18Mon, 01 Jan 2018 00:00:00 +0100
SENAD: Securing Network Application Deployment in Software Defined Networks.https://doi.org/10.1109/ICC.2018.8422405, , :
SENAD: Securing Network Application Deployment in Software Defined Networks. ICC : 1-6]]>
https://dblp.org/rec/conf/icc/TsengNK18Mon, 01 Jan 2018 00:00:00 +0100
Hybrid alternative receiver-sender approach with a coloured DR/BDR mechanism for the broadcast of safety messages in VANETs.https://doi.org/10.1504/IJAHUC.2015.10001748, , :
Hybrid alternative receiver-sender approach with a coloured DR/BDR mechanism for the broadcast of safety messages in VANETs. Int. J. Ad Hoc Ubiquitous Comput. 26(2): 129-136 ()]]>
https://dblp.org/rec/journals/ijahuc/BenaidjaMN17Sun, 01 Jan 2017 00:00:00 +0100
Controller DAC: Securing SDN controller with dynamic access control.https://doi.org/10.1109/ICC.2017.7997249, , , , :
Controller DAC: Securing SDN controller with dynamic access control. ICC : 1-6]]>
https://dblp.org/rec/conf/icc/TsengPHZN17Sun, 01 Jan 2017 00:00:00 +0100
ST-segment and T-wave anomalies prediction in an ECG data using RUSBoost.https://doi.org/10.1109/HealthCom.2016.7749493, , :
ST-segment and T-wave anomalies prediction in an ECG data using RUSBoost. HealthCom : 1-6]]>
https://dblp.org/rec/conf/healthcom/HadjemNK16Fri, 01 Jan 2016 00:00:00 +0100
SRV: Switch-based rules verification in software defined networking.https://doi.org/10.1109/NETSOFT.2016.7502488, , :
SRV: Switch-based rules verification in software defined networking. NetSoft : 477-482]]>
https://dblp.org/rec/conf/netsoft/TsengZN16Fri, 01 Jan 2016 00:00:00 +0100
ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications.https://doi.org/10.1109/PDCAT.2016.064, , :
ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications. PDCAT : 268-273]]>
https://dblp.org/rec/conf/pdcat/TsengZN16Fri, 01 Jan 2016 00:00:00 +0100
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems.https://doi.org/10.1002/sec.976, , :
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. Secur. Commun. Networks 8(2): 232-244 ()]]>
https://dblp.org/rec/journals/scn/WangZN15Thu, 01 Jan 2015 00:00:00 +0100
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP).https://doi.org/10.1002/sec.1328, , , :
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP). Secur. Commun. Networks 8(18): 4436-4451 ()]]>
https://dblp.org/rec/journals/scn/HussainDZN15Thu, 01 Jan 2015 00:00:00 +0100
An ECG T-wave anomalies detection using a lightweight classification model for wireless body sensors.https://doi.org/10.1109/ICCW.2015.7247191, :
An ECG T-wave anomalies detection using a lightweight classification model for wireless body sensors. ICC Workshops : 278-283]]>
https://dblp.org/rec/conf/icc/HadjemN15Thu, 01 Jan 2015 00:00:00 +0100
Optimal caching of encoded data for content distribution in vehicular networks.https://doi.org/10.1109/ICCW.2015.7247549, , :
Optimal caching of encoded data for content distribution in vehicular networks. ICC Workshops : 2483-2488]]>
https://dblp.org/rec/conf/icc/IdirPN15Thu, 01 Jan 2015 00:00:00 +0100
A comparative study of supervised learning techniques for ECG T-wave anomalies detection in a WBS context.https://doi.org/10.1109/NOTERE.2015.7293505, :
A comparative study of supervised learning techniques for ECG T-wave anomalies detection in a WBS context. CFIP/NOTERE : 1-6]]>
https://dblp.org/rec/conf/notere/HadjemN15Thu, 01 Jan 2015 00:00:00 +0100
Optimal data placement to improve data dissemination in vehicular networks.https://doi.org/10.1109/NOTERE.2015.7293501, , :
Optimal data placement to improve data dissemination in vehicular networks. CFIP/NOTERE : 1-6]]>
https://dblp.org/rec/conf/notere/IdirPN15Thu, 01 Jan 2015 00:00:00 +0100
An overview of localization algorithms in mobile wireless sensor networks.https://doi.org/10.1109/NOTERE.2015.7293510, , , :
An overview of localization algorithms in mobile wireless sensor networks. CFIP/NOTERE : 1-6]]>
https://dblp.org/rec/conf/notere/KhelifiBMN15Thu, 01 Jan 2015 00:00:00 +0100
Padovan sequence based Backoff Algorithm for improved wireless medium access in MANETs.https://doi.org/10.1109/GIIS.2014.6934267, , :
Padovan sequence based Backoff Algorithm for improved wireless medium access in MANETs. GIIS : 1-6]]>
https://dblp.org/rec/conf/giis/MoadDN14Wed, 01 Jan 2014 00:00:00 +0100
An ECG monitoring system for prediction of cardiac anomalies using WBAN.https://doi.org/10.1109/HealthCom.2014.7001883, , :
An ECG monitoring system for prediction of cardiac anomalies using WBAN. Healthcom : 441-446]]>
https://dblp.org/rec/conf/healthcom/HadjemSN14Wed, 01 Jan 2014 00:00:00 +0100
An Efficient Admission Control Algorithm for Virtual Sensor Networks.https://doi.org/10.1109/HPCC.2014.113, , , :
An Efficient Admission Control Algorithm for Virtual Sensor Networks. HPCC/CSS/ICESS : 735-742]]>
https://dblp.org/rec/conf/hpcc/AjmalPZN14Wed, 01 Jan 2014 00:00:00 +0100
Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems.https://doi.org/10.1109/ICCChina.2014.7008269, , , :
Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems. ICCC : 187-192]]>
https://dblp.org/rec/conf/iccchina/SawandDZN14Wed, 01 Jan 2014 00:00:00 +0100
An asynchronous low-power medium access control protocol for wireless sensor networks.https://doi.org/10.1002/wcm.1124, , , :
An asynchronous low-power medium access control protocol for wireless sensor networks. Wirel. Commun. Mob. Comput. 13(6): 604-618 ()]]>
https://dblp.org/rec/journals/wicomm/WangZNK13Tue, 01 Jan 2013 00:00:00 +0100
Early detection of Myocardial Infarction using WBAN.https://doi.org/10.1109/HealthCom.2013.6720654, , , :
Early detection of Myocardial Infarction using WBAN. Healthcom : 135-139]]>
https://dblp.org/rec/conf/healthcom/HadjemSNM13Tue, 01 Jan 2013 00:00:00 +0100
A lightweight countermeasure to cope with flooding attacks against session initiation protocol.https://doi.org/10.1109/WMNC.2013.6549057, , , :
A lightweight countermeasure to cope with flooding attacks against session initiation protocol. WMNC : 1-5]]>
https://dblp.org/rec/conf/mwcn/HussainDGN13Tue, 01 Jan 2013 00:00:00 +0100
Privacy-Preserving Wireless Medical Sensor Network.https://doi.org/10.1109/TrustCom.2013.19, , :
Privacy-Preserving Wireless Medical Sensor Network. TrustCom/ISPA/IUCC : 118-125]]>
https://dblp.org/rec/conf/trustcom/YiWN13Tue, 01 Jan 2013 00:00:00 +0100
Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs.https://doi.org/10.1109/WCL.2012.080112.120367, , , :
Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs. IEEE Wirel. Commun. Lett. 1(5): 540-543 ()]]>
https://dblp.org/rec/journals/wcl/DjahelZNM12Sun, 01 Jan 2012 00:00:00 +0100
Anomaly detection in network traffic using Jensen-Shannon divergence.https://doi.org/10.1109/ICC.2012.6364602, , :
Anomaly detection in network traffic using Jensen-Shannon divergence. ICC : 5200-5204]]>
https://dblp.org/rec/conf/icc/SalemNM12Sun, 01 Jan 2012 00:00:00 +0100
Improving the quality of service routing in OLSR protocol.https://doi.org/10.1109/ICCITechnol.2012.6285815, , :
Improving the quality of service routing in OLSR protocol. ICCIT : 314-319]]>
https://dblp.org/rec/conf/iccit/MoadDN12Sun, 01 Jan 2012 00:00:00 +0100
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks.https://doi.org/10.1016/j.cose.2011.06.002, , , :
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. Comput. Secur. 30(6-7): 525-537 ()]]>
https://dblp.org/rec/journals/compsec/ZhangNHK11Sat, 01 Jan 2011 00:00:00 +0100
Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges.https://doi.org/10.1109/SURV.2011.072210.00026, , :
Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges. IEEE Commun. Surv. Tutorials 13(4): 658-672 ()]]>
https://dblp.org/rec/journals/comsur/DjahelNZ11Sat, 01 Jan 2011 00:00:00 +0100
Characterizing the greedy behavior in wireless ad hoc networks.https://doi.org/10.1002/sec.210, , :
Characterizing the greedy behavior in wireless ad hoc networks. Secur. Commun. Networks 4(3): 284-298 ()]]>
https://dblp.org/rec/journals/scn/DjahelNT11Sat, 01 Jan 2011 00:00:00 +0100
Architectures and protocols for wireless mesh, ad hoc, and sensor networks.https://doi.org/10.1002/wcm.1126, , , :
Architectures and protocols for wireless mesh, ad hoc, and sensor networks. Wirel. Commun. Mob. Comput. 11(3): 303-305 ()]]>
https://dblp.org/rec/journals/wicomm/Nait-AbdesselamCEF11Sat, 01 Jan 2011 00:00:00 +0100
Strategy based proxy to secure user agent from flooding attack in SIP.https://doi.org/10.1109/IWCMC.2011.5982572, :
Strategy based proxy to secure user agent from flooding attack in SIP. IWCMC : 430-435]]>
https://dblp.org/rec/conf/iwcmc/HussainN11Sat, 01 Jan 2011 00:00:00 +0100
A vehicle gateway to manage IP multimedia subsystem autonomous mobility.https://doi.org/10.1504/IJAACS.2010.031089, , , :
A vehicle gateway to manage IP multimedia subsystem autonomous mobility. Int. J. Auton. Adapt. Commun. Syst. 3(2): 159-177 ()]]>
https://dblp.org/rec/journals/ijaacs/RadierSGN10Fri, 01 Jan 2010 00:00:00 +0100
Cross-Layer Optimized MAC to Support Multihop QoS Routing for Wireless Sensor Networks.https://doi.org/10.1109/TVT.2010.2042185, , , :
Cross-Layer Optimized MAC to Support Multihop QoS Routing for Wireless Sensor Networks. IEEE Trans. Veh. Technol. 59(5): 2556-2563 ()]]>
https://dblp.org/rec/journals/tvt/WangZNK10Fri, 01 Jan 2010 00:00:00 +0100
RADAR: A reputation-driven anomaly detection system for wireless mesh networks.https://doi.org/10.1007/s11276-010-0255-1, , :
RADAR: A reputation-driven anomaly detection system for wireless mesh networks. Wirel. Networks 16(8): 2221-2236 ()]]>
https://dblp.org/rec/journals/winet/ZhangHN10Fri, 01 Jan 2010 00:00:00 +0100
Overlapping Clusters Algorithm in Ad Hoc Networks.https://doi.org/10.1109/GLOCOM.2010.5683454, , , :
Overlapping Clusters Algorithm in Ad Hoc Networks. GLOBECOM : 1-5]]>
https://dblp.org/rec/conf/globecom/AydinNPT10Fri, 01 Jan 2010 00:00:00 +0100
A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh Networks.https://doi.org/10.1109/GLOCOM.2010.5683525, , :
A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh Networks. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/DjahelBN10Fri, 01 Jan 2010 00:00:00 +0100
Thwarting back-off rules violation in tactical wireless ad hoc networks.https://doi.org/10.1109/ISCC.2010.5546502, :
Thwarting back-off rules violation in tactical wireless ad hoc networks. ISCC : 417-422]]>
https://dblp.org/rec/conf/iscc/DjahelN10Fri, 01 Jan 2010 00:00:00 +0100
FLSAC: A new scheme to defend against greedy behavior in wireless mesh networks.https://doi.org/10.1002/dac.1027, :
FLSAC: A new scheme to defend against greedy behavior in wireless mesh networks. Int. J. Commun. Syst. 22(10): 1245-1266 ()]]>
https://dblp.org/rec/journals/ijcomsys/DjahelN09Thu, 01 Jan 2009 00:00:00 +0100
Distortion Analysis for Real-Time Data Collection of Spatially Temporally Correlated Data Fields in Wireless Sensor Networks.https://doi.org/10.1109/TVT.2008.928906, , , :
Distortion Analysis for Real-Time Data Collection of Spatially Temporally Correlated Data Fields in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 58(3): 1583-1594 ()]]>
https://dblp.org/rec/journals/tvt/ZhangWNK09Thu, 01 Jan 2009 00:00:00 +0100
Optimizing distortion for real-time data gathering in randomly deployed sensor networks.https://doi.org/10.1002/wcm.722, , , :
Optimizing distortion for real-time data gathering in randomly deployed sensor networks. Wirel. Commun. Mob. Comput. 9(10): 1360-1368 ()]]>
https://dblp.org/rec/journals/wicomm/ZhangWNK09Thu, 01 Jan 2009 00:00:00 +0100
Highlighting the effects of joint MAC layer misbehavior and virtual link attack in wireless ad hoc networks.https://doi.org/10.1109/AICCSA.2009.5069412, , :
Highlighting the effects of joint MAC layer misbehavior and virtual link attack in wireless ad hoc networks. AICCSA : 756-763]]>
https://dblp.org/rec/conf/aiccsa/DjahelNA09Thu, 01 Jan 2009 00:00:00 +0100
An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks.https://doi.org/10.1109/GLOCOM.2009.5425412, , :
An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks. GLOBECOM : 1-6]]>
https://dblp.org/rec/conf/globecom/DjahelNT09Thu, 01 Jan 2009 00:00:00 +0100
A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN.https://doi.org/10.1109/ICC.2009.5198606, :
A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN. ICC : 1-5]]>
https://dblp.org/rec/conf/icc/DjahelN09Thu, 01 Jan 2009 00:00:00 +0100
Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks.https://doi.org/10.1109/ICC.2009.5198908, , , :
Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks. ICC : 1-6]]>
https://dblp.org/rec/conf/icc/HamiehBGN09Thu, 01 Jan 2009 00:00:00 +0100
On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks.https://doi.org/10.1109/ICC.2009.5199233, , :
On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks. ICC : 1-5]]>
https://dblp.org/rec/conf/icc/ZhangHN09Thu, 01 Jan 2009 00:00:00 +0100
A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless networks.https://doi.org/10.1109/LCN.2009.5355066, , :
A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless networks. LCN : 730-737]]>
https://dblp.org/rec/conf/lcn/DjahelNK09Thu, 01 Jan 2009 00:00:00 +0100
The 2nd IEEE Workshop on Wireless and Internet Services (WISe 2009).https://doi.org/10.1109/LCN.2009.5355133, :
The 2nd IEEE Workshop on Wireless and Internet Services (WISe 2009). LCN : 953]]>
https://dblp.org/rec/conf/lcn/Nait-AbdesselamS09Thu, 01 Jan 2009 00:00:00 +0100
Neighbor based channel hopping coordination: Practical against jammer?https://doi.org/10.1109/LCN.2009.5355021, , , :
Neighbor based channel hopping coordination: Practical against jammer? LCN : 993-998]]>
https://dblp.org/rec/conf/lcn/AhsanDNM09Thu, 01 Jan 2009 00:00:00 +0100
Predictive channel estimation for optimized resources allocation in DVB-S2 networks.https://doi.org/10.1109/PIMRC.2009.5450135, , :
Predictive channel estimation for optimized resources allocation in DVB-S2 networks. PIMRC : 2608-2612]]>
https://dblp.org/rec/conf/pimrc/MoadAN09Thu, 01 Jan 2009 00:00:00 +0100
Detecting and avoiding wormhole attacks in wireless ad hoc networks.https://doi.org/10.1109/MCOM.2008.4481351, , :
Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Commun. Mag. 46(4): 127-133 ()]]>
https://dblp.org/rec/journals/cm/Nait-Abdesselam08Tue, 01 Jan 2008 00:00:00 +0100
Rate-lifetime tradeoff for reliable communication in wireless sensor networks.https://doi.org/10.1016/j.comnet.2007.09.011, , , :
Rate-lifetime tradeoff for reliable communication in wireless sensor networks. Comput. Networks 52(1): 25-43 ()]]>
https://dblp.org/rec/journals/cn/ZhuHBN08Tue, 01 Jan 2008 00:00:00 +0100
Defending against packet dropping attack in vehicular ad hoc networks.https://doi.org/10.1002/sec.25, , , :
Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Networks 1(3): 245-258 ()]]>
https://dblp.org/rec/journals/scn/DjahelNZK08Tue, 01 Jan 2008 00:00:00 +0100
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender.https://doi.org/10.1109/ARES.2008.75, , :
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. ARES : 352-359]]>
https://dblp.org/rec/conf/IEEEares/ZhangNH08Tue, 01 Jan 2008 00:00:00 +0100
Avoiding virtual link attacks in wireless ad hoc networks.https://doi.org/10.1109/AICCSA.2008.4493557, :
Avoiding virtual link attacks in wireless ad hoc networks. AICCSA : 355-360]]>
https://dblp.org/rec/conf/aiccsa/DjahelN08Tue, 01 Jan 2008 00:00:00 +0100
Performance evaluation of TCP handoffs over mobile IP connections.https://doi.org/10.1109/AICCSA.2008.4493559, , , :
Performance evaluation of TCP handoffs over mobile IP connections. AICCSA : 366-372]]>
https://dblp.org/rec/conf/aiccsa/Ben-OthmanNMR08Tue, 01 Jan 2008 00:00:00 +0100
On Physical-Aware Directional MAC Protocol for Indoor Wireless Networks.https://doi.org/10.1109/GLOCOM.2008.ECP.133, :
On Physical-Aware Directional MAC Protocol for Indoor Wireless Networks. GLOBECOM : 661-665]]>
https://dblp.org/rec/conf/globecom/AoulN08Tue, 01 Jan 2008 00:00:00 +0100
An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol.https://doi.org/10.1109/ICC.2008.524, , :
An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol. ICC : 2780-2785]]>
https://dblp.org/rec/conf/icc/DjahelNK08Tue, 01 Jan 2008 00:00:00 +0100
F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks.https://doi.org/10.1109/ISCC.2008.4625682, , , :
F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks. ISCC : 157-162]]>
https://dblp.org/rec/conf/iscc/ChenZBN08Tue, 01 Jan 2008 00:00:00 +0100
Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks.https://doi.org/10.1109/ISCC.2008.4625606, , , :
Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks. ISCC : 1023-1028]]>
https://dblp.org/rec/conf/iscc/GhazalAON08Tue, 01 Jan 2008 00:00:00 +0100
Performance Analysis of an Energy Efficient MAC Protocol for Sensor Networks.https://doi.org/10.1109/I-SPAN.2008.1, , :
Performance Analysis of an Energy Efficient MAC Protocol for Sensor Networks. ISPAN : 254-259]]>
https://dblp.org/rec/conf/ispan/ZhangNB08Tue, 01 Jan 2008 00:00:00 +0100
A collaborative peer-to-peer architecture to defend against DDoS attacks.https://doi.org/10.1109/LCN.2008.4664200, , :
A collaborative peer-to-peer architecture to defend against DDoS attacks. LCN : 427-434]]>
https://dblp.org/rec/conf/lcn/SaadNS08Tue, 01 Jan 2008 00:00:00 +0100
A model-based semi-quantitative approach for evaluating security of enterprise networks.https://doi.org/10.1145/1363686.1363934, , , :
A model-based semi-quantitative approach for evaluating security of enterprise networks. SAC : 1069-1074]]>
https://dblp.org/rec/conf/sac/ZhangNLH08Tue, 01 Jan 2008 00:00:00 +0100
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.https://doi.org/10.1109/WCNC.2008.460, , , :
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. WCNC : 2621-2626]]>
https://dblp.org/rec/conf/wcnc/ZhangNHL08Tue, 01 Jan 2008 00:00:00 +0100
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless Local Area Networks.https://doi.org/10.1109/AICCSA.2007.370883, , :
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless Local Area Networks. AICCSA : 195-202]]>
https://dblp.org/rec/conf/aiccsa/TaifourNS07Mon, 01 Jan 2007 00:00:00 +0100
Logical Wormhole Prevention in Optimized Link State Routing Protocol.https://doi.org/10.1109/GLOCOM.2007.195, , , :
Logical Wormhole Prevention in Optimized Link State Routing Protocol. GLOBECOM : 1011-1016]]>
https://dblp.org/rec/conf/globecom/AttirNBB07Mon, 01 Jan 2007 00:00:00 +0100
Route Optimization for Large Scale Network Mobility Assisted by BGP.https://doi.org/10.1109/GLOCOM.2007.884, , , :
Route Optimization for Large Scale Network Mobility Assisted by BGP. GLOBECOM : 4659-4663]]>
https://dblp.org/rec/conf/globecom/MimouneNTH07Mon, 01 Jan 2007 00:00:00 +0100
DPS-MAC: An Asynchronous MAC Protocol for Wireless Sensor Networks.https://doi.org/10.1007/978-3-540-77220-0_37, , , :
DPS-MAC: An Asynchronous MAC Protocol for Wireless Sensor Networks. HiPC : 393-404]]>
https://dblp.org/rec/conf/hipc/WangZNK07Mon, 01 Jan 2007 00:00:00 +0100
O-MAC: An Organized Energy-Aware MAC Protocol for Wireless Sensor Networks.https://doi.org/10.1109/ICC.2007.601, , , :
O-MAC: An Organized Energy-Aware MAC Protocol for Wireless Sensor Networks. ICC : 3648-3653]]>
https://dblp.org/rec/conf/icc/Nait-AbdesselamBSH07Mon, 01 Jan 2007 00:00:00 +0100
802.11 Qos Cross-Layer Protocol Based Propagation Conditions Adaptation.https://doi.org/10.1109/LCN.2007.157, , :
802.11 Qos Cross-Layer Protocol Based Propagation Conditions Adaptation. LCN : 698-702]]>
https://dblp.org/rec/conf/lcn/Ben-OthmanBN07Mon, 01 Jan 2007 00:00:00 +0100
R-MAC: Reservation Medium Access Control Protocol for Wireless Sensor Networks.https://doi.org/10.1109/LCN.2007.159, , , :
R-MAC: Reservation Medium Access Control Protocol for Wireless Sensor Networks. LCN : 719-724]]>
https://dblp.org/rec/conf/lcn/YessadNTB07Mon, 01 Jan 2007 00:00:00 +0100
Performance modelling of the o-mac protocol.https://doi.org/10.1145/1298275.1298299, , :
Performance modelling of the o-mac protocol. PM2HW2N : 110-113]]>
https://dblp.org/rec/conf/mswim/ZhangNB07Mon, 01 Jan 2007 00:00:00 +0100
PPN 2007 PC Co-chairs' Message.https://doi.org/10.1007/978-3-540-76890-6_16, , :
PPN 2007 PC Co-chairs' Message. OTM Workshops (2) : 909]]>
https://dblp.org/rec/conf/otm/Nait-AbdesselamHB07Mon, 01 Jan 2007 00:00:00 +0100
Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol.https://doi.org/10.1109/WCNC.2007.576, , :
Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol. WCNC : 3117-3122]]>
https://dblp.org/rec/conf/wcnc/Nait-AbdesselamBY07Mon, 01 Jan 2007 00:00:00 +0100
Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network.https://doi.org/10.1109/GLOCOM.2006.1013, , , , , :
Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network. GLOBECOM ]]>
https://dblp.org/rec/conf/globecom/TalebNJHKN06Sun, 01 Jan 2006 00:00:00 +0100
Energy-Aware Fair Routing in Wireless Sensor Networks with Maximum Data Collection.https://doi.org/10.1109/ICC.2006.255604, , , :
Energy-Aware Fair Routing in Wireless Sensor Networks with Maximum Data Collection. ICC : 3438-3443]]>
https://dblp.org/rec/conf/icc/HungBZN06Sun, 01 Jan 2006 00:00:00 +0100
Maximum Data Collection Least-Cost Routing in Energy Constrained Wireless Sensor Networks.https://doi.org/10.1109/LCN.2006.322097, , , :
Maximum Data Collection Least-Cost Routing in Energy Constrained Wireless Sensor Networks. LCN : 177-184]]>
https://dblp.org/rec/conf/lcn/HungBZN06Sun, 01 Jan 2006 00:00:00 +0100
Enhanced Routing-Aware Adaptive MAC with Traffic Differentiation and Smoothed Contention Window in Wireless Ad-Hoc Networks.https://doi.org/10.1109/ICDCSW.2004.1284107, :
Enhanced Routing-Aware Adaptive MAC with Traffic Differentiation and Smoothed Contention Window in Wireless Ad-Hoc Networks. ICDCS Workshops : 690-695]]>
https://dblp.org/rec/conf/icdcsw/Nait-AbdesselamK04Thu, 01 Jan 2004 00:00:00 +0100
Achieving Routing Based Medium Access Fairness in Wireless Ad-Hoc Networks.https://doi.org/10.1007/978-3-540-24604-6_24, :
Achieving Routing Based Medium Access Fairness in Wireless Ad-Hoc Networks. IWDC : 245-254]]>
https://dblp.org/rec/conf/iwdc/KoubaaN03Wed, 01 Jan 2003 00:00:00 +0100
Cooperative Adaptation to Quality of Servive Using Active Software Agents.https://dblp.org/pid/05/720.html, , , :
Cooperative Adaptation to Quality of Servive Using Active Software Agents. Netw. Inf. Syst. J. 2(3): 283-304 ()]]>
https://dblp.org/rec/journals/nis/Naid-AbdesselamKMH99Fri, 01 Jan 1999 00:00:00 +0100
Intelligent Agents for QoS Control and Adaptation in Distributed Multimedia Systems.https://dblp.org/pid/05/720.html:
Intelligent Agents for QoS Control and Adaptation in Distributed Multimedia Systems. ICEIS : 501-508]]>
https://dblp.org/rec/conf/iceis/Nait-Abdesselam99Fri, 01 Jan 1999 00:00:00 +0100
Cooperative Adaptation to Quality of Service Using Distributed Agents.https://doi.org/10.1109/ICPPW.1999.800107, , :
Cooperative Adaptation to Quality of Service Using Distributed Agents. ICPP Workshops : 502-507]]>
https://dblp.org/rec/conf/icppw/KasiolasNM99Fri, 01 Jan 1999 00:00:00 +0100
Qos Control and Adaptation in Distributed Multimedia Systems.https://doi.org/10.1007/BFb0097919, :
Qos Control and Adaptation in Distributed Multimedia Systems. IPPS/SPDP Workshops : 375-383]]>
https://dblp.org/rec/conf/ipps/Nait-AbdesselamA99Fri, 01 Jan 1999 00:00:00 +0100