default search action
Noureddine Boudriga
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j77]Mouna Garai, Maha Sliti, Manel Mrabet, Noureddine Boudriga, Lassaad Ben Ammar:
Authentication in QoS Aware VANET: An Approach Based on Enhanced Digital Certificates. IEEE Access 12: 124452-124477 (2024) - 2022
- [c208]Maha Sliti, Noureddine Boudriga:
Aircraft Wing Vibration Monitoring based on FBG Sensor Network. SSD 2022: 280-285 - [c207]Maha Sliti, Noureddine Boudriga:
Structural Health Monitoring of Road Infrastructures Based on FBG Sensor Network. APCC 2022: 36-41 - 2021
- [j76]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
Proactive Security for Safety and Sustainability of Mission Critical Systems. IEEE Trans. Sustain. Comput. 6(2): 257-273 (2021) - [j75]Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
ZAO-AKA : a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system. Wirel. Networks 27(6): 4199-4215 (2021) - [c206]Maha Sliti, Noureddine Boudriga:
Building Structural Health Monitoring: an FBG-based estimation of external vibrations. SSD 2021: 1026-1031 - [c205]Maha Sliti, Noureddine Boudriga:
Bridge Structural Health Monitoring using an FBG-based Architecture. MWSCAS 2021: 621-625 - [c204]Soumaya Bel Hadj Youssef, Noureddine Boudriga:
A Robust and Efficient Micropayment Infrastructure Using Blockchain for e-Commerce. SAI (2) 2021: 825-839 - 2020
- [c203]Nourhene Ellouze, Noureddine Boudriga:
A Smart Healthcare: Methods based on WBAN and Multi-engine Artificial Intelligence. BIODEVICES 2020: 184-191 - [c202]Soumaya Bel Hadj Youssef, Noureddine Boudriga, Slim Rekhis:
A trust-aware micropayment system for data muling in cloud environment: a Blockchain based approach. COMNET 2020: 1-8 - [c201]Meriem Salhi, Noureddine Boudriga:
Multi-Array Spherical LIDAR System for Drone Detection. ICTON 2020: 1-5
2010 – 2019
- 2019
- [j74]Noureddine Boudriga, Paulvanna Nayaki Marimuthu, Sami J. Habib:
Measurement and security trust in WSNs: a proximity deviation based approach. Ann. des Télécommunications 74(5-6): 257-272 (2019) - [j73]Meriem Salhi, Maha Sliti, Noureddine Boudriga:
All-optical VPN platform for multisite VLC-based networks. Trans. Emerg. Telecommun. Technol. 30(2) (2019) - [j72]Imen Arfaoui, Noureddine Boudriga:
A border surveillance system using WSN under various environment characteristics. Int. J. Sens. Networks 30(4): 263-278 (2019) - [j71]Yosra Miaoui, Noureddine Boudriga:
Enterprise security investment through time when facing different types of vulnerabilities. Inf. Syst. Frontiers 21(2): 261-300 (2019) - [j70]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios. J. Univers. Comput. Sci. 25(9): 1066-1088 (2019) - [c200]Meriem Salhi, Maha Sliti, Noureddine Boudriga:
An Array-based Laser Radar for UAV detection. ICECS 2019: 662-665 - [c199]Dhouha Krichen, Walid Abdallah, Noureddine Boudriga:
On the Design of an Intelligent Landing and Take-off Assistance System Using Optical Wireless Communication. ICTON 2019: 1-6 - [c198]Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks. ISPA/BDCloud/SocialCom/SustainCom 2019: 160-167 - [c197]Yacine Djemaiel, Boutheina A. Fessi, Noureddine Boudriga:
Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction. ISPA/BDCloud/SocialCom/SustainCom 2019: 991-998 - [c196]Maroua Gharam, Noureddine Boudriga:
Game Theoretical model for Resource Allocation in 5G Hybrid HetNets. NISS 2019: 22:1-22:7 - [c195]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
A Blockchain based Secure IoT Solution for the Dam Surveillance. WCNC 2019: 1-6 - [i1]Emmanuel Tuyishimire, Antoine B. Bagula, Slim Rekhis, Noureddine Boudriga:
Real-time data muling using a team of heterogeneous unmanned aerial vehicles. CoRR abs/1912.08846 (2019) - 2018
- [j69]Nihel Ramdhan, Maha Sliti, Noureddine Boudriga:
A tree-based data collection protocol for optical unmanned aerial vehicle networks. Comput. Electr. Eng. 66: 80-97 (2018) - [j68]Yacine Djemaiel, Sarra Berrahal, Noureddine Boudriga:
A Novel Graph-Based Approach for the Management of Health Data on Cloud-Based WSANs. J. Grid Comput. 16(2): 317-344 (2018) - [j67]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, Mohamed Allouche:
Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform. J. Netw. Comput. Appl. 107: 1-21 (2018) - [c194]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
Game-Based Data Muling as a Service in Infrastructureless Area. ADHOC-NOW 2018: 280-292 - [c193]Samson Busuyi Akintoye, Antoine B. Bagula, Omowunmi E. Isafiade, Yacine Djemaiel, Noureddine Boudriga:
Data Model for Cloud Computing Environment. AFRICOMM 2018: 199-215 - [c192]Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Cloud-Based Global Monitoring System for Smart Cities. AINA Workshops 2018: 307-312 - [c191]Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Secure Authentication Solution for Cloud-based Smart City Surveillance System. ICETE (2) 2018: 668-673 - [c190]Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
An Optical Wireless Communication Based 5G Architecture to Enable Smart City Applications. ICTON 2018: 1-6 - [c189]Nihel Ramdhan, Maha Sliti, Noureddine Boudriga:
Packet Insertion Attack Detection in Optical UAV Networks. ICTON 2018: 1-5 - [c188]Maha Sliti, Walid Abdallah, Noureddine Boudriga:
Jamming Attack Detection in Optical UAV Networks. ICTON 2018: 1-5 - [c187]Maroua Gharam, Noureddine Boudriga:
Cell Selection Game in 5G Heterogeneous Networks. UNet 2018: 28-39 - [c186]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
A Context-Based Model for Validating the Ability of Cyber Systems to Defend Against Attacks. UNet 2018: 295-307 - [c185]Meriem Salhi, Noureddine Boudriga:
MIMO Beamforming Anti-jamming Scheme for Mobile Smallcell Networks. UNet 2018: 308-319 - [c184]Noureddine Boudriga, Paulvanna Nayaki Marimuthu, Sami J. Habib:
Trusting Sensors Measurements in a WSN: An Approach Based on True and Group Deviation Estimation. WorldCIST (2) 2018: 603-613 - [e3]Noureddine Boudriga, Mohamed-Slim Alouini, Slim Rekhis, Essaid Sabir, Sofie Pollin:
Ubiquitous Networking - 4th International Symposium, UNet 2018, Hammamet, Tunisia, May 2-5, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11277, Springer 2018, ISBN 978-3-030-02848-0 [contents] - 2017
- [j66]Dhouha Krichen, Walid Abdallah, Noureddine Boudriga:
On the design of an embedded wireless sensor network for aircraft vibration monitoring using efficient game theoretic based MAC protocol. Ad Hoc Networks 61: 1-15 (2017) - [j65]Imen Arfaoui, Noureddine Boudriga, Khalifa Trimeche:
A WSN Deployment Scheme under Irregular Conditions for Surveillance Applications. Ad Hoc Sens. Wirel. Networks 35(3-4): 217-259 (2017) - [j64]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga, Mohamed Allouche:
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios. Digit. Investig. 21: 11-30 (2017) - [j63]Maha Sliti, Walid Abdallah, Noureddine Boudriga:
Digitizing radio-over-fiber transceiver based on optical tunable encoder and optical codewords. Photonic Netw. Commun. 33(3): 313-327 (2017) - [c183]Walid Abdallah, Noureddine Boudriga:
The design of an optical wireless sensor network based train vibration monitoring system. ICTON 2017: 1-5 - [c182]Emmanuel Tuyishimire, Antoine B. Bagula, Slim Rekhis, Noureddine Boudriga:
Cooperative data muling from ground sensors to base stations using UAVs. ISCC 2017: 35-41 - [c181]Dhouha Krichen, Walid Abdallah, Noureddine Boudriga:
Ant colony based hole detection in wireless sensor networks. IWCMC 2017: 1808-1813 - [c180]Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
Access control in 5G communication networks using simple PKI certificates. IWCMC 2017: 2092-2097 - [c179]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
Proactive Damage Assessment of Cyber Attacks Using Mobile Observer Agents. MoMM 2017: 29-38 - [c178]Maroua Gharam, Walid Abdallah, Noureddine Boudriga:
The design of a Game-theoretic Based Multiple Access scheme for 5G Millimeter Wave Communication Networks. MoMM 2017: 166-174 - [c177]Imen Arfaoui, Noureddine Boudriga, Khalifa Trimeche, Walid Abdallah:
WSN-based Border Surveillance Systems Using Estimated Known Crossing Paths. MoMM 2017: 182-190 - [c176]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
Observation-based detection of femtocell attacks in wireless mobile networks. SAC 2017: 529-534 - [c175]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development. UNet 2017: 141-153 - [c174]Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
Chaotic ZKP Based Authentication and Key Distribution Scheme in Environmental Monitoring CPS. UNet 2017: 472-483 - [c173]Maroua Gharam, Noureddine Boudriga:
An Agreement Graph-Based-Authentication Scheme for 5G Networks. UNet 2017: 509-520 - 2016
- [j62]Sarra Berrahal, Noureddine Boudriga, M'hamed Chammem:
Wban-Assisted Navigation for Firefighters in Indoor Environments. Ad Hoc Sens. Wirel. Networks 33(1-4): 81-119 (2016) - [c172]Imen Arfaoui, Noureddine Boudriga, Khalifa Trimeche:
Design and analysis of protecting strategies against border crossing under irregular conditions. ACOSIS 2016: 1-6 - [c171]Mouna Garai, Noureddine Boudriga:
A secure QoS aware VANET. ACOSIS 2016: 1-6 - [c170]Dhouha Krichen, Walid Abdallah, Noureddine Boudriga:
An optical wireless network for railways condition monitoring. APCC 2016: 153-160 - [c169]Sarra Berrahal, Noureddine Boudriga, Antoine B. Bagula:
Cooperative sensor-clouds for public safety services in infrastructure-less areas. APCC 2016: 222-229 - [c168]Imen Arfaoui, Noureddine Boudriga, Khalifa Trimeche:
Resilience of thick-line WSN based surveillance systems under irregular crossings. APCC 2016: 307-314 - [c167]Walid Abdallah, Noureddine Boudriga:
A location-aware authentication and key management scheme for wireless sensor networks. APCC 2016: 488-495 - [c166]Yacine Djemaiel, Nadia Labidi, Noureddine Boudriga:
A Dynamic Hybrid RBF/Elman Neural Networks for Credit Scoring Using Big Data. BIS 2016: 102-113 - [c165]Taariq Mullins, Antoine B. Bagula, Slim Rhekis, Noureddine Boudriga:
Service Provisioning for Lightweight Community Cloud Infrastructures. CONF-IRM 2016: 21 - [c164]Walid Abdallah, Noureddine Boudriga:
Enabling 5G wireless access using Li-Fi technology: An OFDM based approach. ICTON 2016: 1-6 - [c163]Mouna Garai, Maha Sliti, Noureddine Boudriga:
Access and resource reservation in vehicular Visible Light Communication networks. ICTON 2016: 1-6 - [c162]Maroua Gharam, Noureddine Boudriga:
User Mobility under LTE based VPN: QoS and Handover Management. MobiWac 2016: 1-8 - [c161]Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention. MoMM 2016: 45-49 - [c160]Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
An Approach To A Graph-Based Active Cyber Defense Model. MoMM 2016: 261-268 - [c159]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga, Antoine B. Bagula:
A cloud of UAVs for the Delivery of a Sink As A Service to Terrestrial WSNs. MoMM 2016: 317-326 - [c158]Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga:
A sensor cloud architecture for healthcare applications. SAC 2016: 612-617 - [c157]Antoine B. Bagula, Emmanuel Tuyishimire, Jason Wadepoel, Noureddine Boudriga, Slim Rekhis:
Internet-of-Things in Motion: A Cooperative Data Muling Model for Public Safety. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 17-24 - [c156]Emmanuel Tuyishimire, Ismail Adiel, Slim Rekhis, Antoine B. Bagula, Noureddine Boudriga:
Internet of Things in Motion: A Cooperative Data Muling Model Under Revisit Constraints. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 1123-1130 - [c155]Mouna Garai, Slim Rekhis, Noureddine Boudriga:
A Vehicular Cloud for Secure and QoS Aware Service Provision. UNet 2016: 219-233 - 2015
- [j61]Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S. Sitharama Iyengar, Nagarajan Prabakar:
Autonomous pipeline monitoring and maintenance system: a RFID-based approach. EURASIP J. Wirel. Commun. Netw. 2015: 262 (2015) - [j60]Maha Sliti, Noureddine Boudriga:
BHP flooding vulnerability and countermeasure. Photonic Netw. Commun. 29(2): 198-213 (2015) - [j59]Maha Sliti, Noureddine Boudriga:
Security filtering of optical data signals: an approach based on codewords. Photonic Netw. Commun. 30(2): 261-279 (2015) - [c154]Meriem Salhi, Noureddine Boudriga:
LTE-VPN: A platform for enhancing QoS and authentication. ICICS 2015: 1-5 - [c153]Sarra Berrahal, Noureddine Boudriga, Antoine B. Bagula:
Healthcare Systems in Rural Areas: A Cloud-Sensor Based Approach for Epidemic Diseases Management. AFRICOMM 2015: 167-177 - [c152]Dhouha Krichen, Walid Abdallah, Noureddine Boudriga, Antoine B. Bagula:
A Public Safety Wireless Sensor Network: A Visible Light Communication Based Approach. AFRICOMM 2015: 203-214 - [c151]Yacine Djemaiel, Boutheina A. Fessi, Noureddine Boudriga:
A Mark Based-Temporal Conceptual Graphs for Enhancing Big Data Management and Attack Scenario Reconstruction. BIS 2015: 62-73 - [c150]Maroua Gharam, Meriem Salhi, Noureddine Boudriga:
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. CANS 2015: 248-256 - [c149]Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
A light-based communication architecture for smart city applications. ICTON 2015: 1-6 - [c148]Dhouha Krichen, Maha Sliti, Walid Abdallah, Noureddine Boudriga:
An aeronautical visible light communication system to enable in-flight connectivity. ICTON 2015: 1-6 - [c147]Mouna Garai, Slim Rekhis, Noureddine Boudriga:
Communication as a service for cloud VANETs. ISCC 2015: 371-377 - [c146]Soumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga:
Design and analysis of a WBAN-based system for firefighters. IWCMC 2015: 526-531 - [c145]Yosra Miaoui, Noureddine Boudriga, Ezzeddine Abaoub:
Insurance versus Investigation Driven Approach for the Computation of Optimal Security Investment. PACIS 2015: 135 - [c144]Nourhene Ellouze, Slim Rekhis, Noureddine Boudriga:
Energy harvesting based protection of border surveillance systems. SAC 2015: 621-626 - [c143]Sarra Berrahal, Jong-Hoon Kim, Slim Rekhis, Noureddine Boudriga, Deon Wilkins, Jaime Acevedo:
Unmanned aircraft vehicle assisted WSN-based border surveillance. SoftCOM 2015: 132-137 - 2014
- [j58]Ramzi Bellazreg, Noureddine Boudriga:
DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2014: 9 (2014) - [j57]Dongwan Kim, Noureddine Boudriga, Sunshin An:
A new leader-based multicast scheme with a Raptor code in IEEE 802.11 multi-rate WLANs. EURASIP J. Wirel. Commun. Netw. 2014: 184 (2014) - [j56]Noureddine Boudriga:
On a Controlled Random Deployment WSN-Based Monitoring System Allowing Fault Detection and Replacement. Int. J. Distributed Sens. Networks 10 (2014) - [j55]Boutheina A. Fessi, Salah Benabdallah, Noureddine Boudriga, Mohamed Hamdi:
A multi-attribute decision model for intrusion response system. Inf. Sci. 270: 237-254 (2014) - [j54]Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga:
Security of implantable medical devices: limits, requirements, and proposals. Secur. Commun. Networks 7(12): 2475-2491 (2014) - [c142]Mouna Garai, Mariem Mahjoub, Slim Rekhis, Noureddine Boudriga, Mohamed Bettaz:
Access and Resources Reservation in 4G-VANETs for Multimedia Applications. ADHOC-NOW Workshops 2014: 95-108 - [c141]Yacine Djemaiel, Nejla Essaddi, Noureddine Boudriga:
Optimizing Big Data Management Using Conceptual Graphs: A Mark-Based Approach. BIS 2014: 1-12 - [c140]Sihem Trabelsi, Noureddine Boudriga:
An Innovative Approach for Dynamic Evaluation of Telecommunications Interconnection Costs for Multimedia Real Time Services. BIS (Workshops) 2014: 80-92 - [c139]Yacine Djemaiel, Noureddine Boudriga:
Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems. BIS (Workshops) 2014: 281-292 - [c138]Walid Abdallah, Suk Kyu Lee, Hwagnam Kim, Noureddine Boudriga:
Adaptive QoS and Security for Video Transmission over Wireless Networks: A Cognitive-Based Approach. ICA3PP (1) 2014: 138-151 - [c137]Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
A chaos-based authentication and key management scheme for M2M communication. ICITST 2014: 366-371 - [c136]Noureddine Boudriga, Maha Sliti:
All optical switching control. ICTON 2014: 1-6 - [c135]Dhouha Krichen, Walid Abdallah, Noureddine Boudriga:
An optimized spectrum allocation scheme for future aircraft Cognitive Radio Wireless Sensor Networks. ISCIT 2014: 107-111 - [c134]Sarra Berrahal, Noureddine Boudriga:
A smart QoS- based traffic management for WBANs. ISCIT 2014: 161-165 - [c133]Imen Arfaoui, Ramzi Bellazreg, Noureddine Boudriga:
A hole detection scheme based on polygonal cycles for the irregular radio range in WSN. MOBIWAC 2014: 31-38 - [c132]Ramzi Bellazreg, Noureddine Boudriga:
TargMoveS: An optimized sensor scheduling scheme based on target mobility variations. WMNC 2014: 1-8 - [c131]Dhouha Krichen, Walid Abdallah, Noureddine Boudriga:
WSN-based flutter control application for aircraft wings structural health monitoring. SAC 2014: 680-685 - [c130]Imen Arfaoui, Ramzi Bellazreg, Noureddine Boudriga:
A novel realistic irregular radio model to enhance coverage evaluation in wireless sensor networks. SoftCOM 2014: 160-164 - [c129]Nourhene Ellouze, Slim Rekhis, Mohamed Allouche, Noureddine Boudriga:
Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices. AIDP 2014: 15-30 - [e2]Noureddine Boudriga, Slim Rekhis:
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, SFCS 2014, Kyoto, Japan, June 3, 2014. ACM 2014, ISBN 978-1-4503-2802-9 [contents] - 2013
- [j53]Neila Krichene, Noureddine Boudriga:
Intrusion tolerant QoS provision in mobile multihop relay networks. EURASIP J. Wirel. Commun. Netw. 2013: 100 (2013) - [c128]Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga:
Securing implantable cardiac medical devices: use of radio frequency energy harvesting. TrustED@CCS 2013: 35-42 - [c127]Imeddine Ben Abid, Noureddine Boudriga:
Game theory for misbehaving detection in wireless sensor networks. ICOIN 2013: 60-65 - [c126]Ramzi Bellazreg, Noureddine Boudriga, Sunshin An:
Border surveillance using sensor based thick-lines. ICOIN 2013: 221-226 - [c125]Maha Sliti, Noureddine Boudriga:
Optical stateful security filtering approach based on code words. ISCC 2013: 916-921 - [c124]Ramzi Bellazreg, Noureddine Boudriga, Khalifa Trimeche, Sunshin An:
Border surveillance: A dynamic deployment scheme for WSN-based solutions. WMNC 2013: 1-8 - [c123]Bayrem Triki, Slim Rekhis, M'hamed Chammem, Noureddine Boudriga:
A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks. WMNC 2013: 1-8 - [c122]Maha Sliti, Noureddine Boudriga:
Stateless security filtering of optical data signals: An approach based on code words. ONDM 2013: 119-124 - 2012
- [j52]Slim Rekhis, Noureddine Boudriga:
A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks. Comput. Secur. 31(8): 967-982 (2012) - [j51]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Unifying identity management for fourth generation wireless networks. IET Commun. 6(18): 3222-3230 (2012) - [j50]Slim Rekhis, Noureddine Boudriga:
A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks. IEEE Trans. Inf. Forensics Secur. 7(2): 635-650 (2012) - [c121]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
A mark association-based investigation of attack scenarios in communication networks. ICC 2012: 6673-6677 - [c120]Amor Gueddana, Rihab Chatta, Noureddine Boudriga:
Success Probability Evaluation of Quantum Circuits based on Probabilistic CNOT-Gates. DCNET/ICE-B/OPTICS 2012: 378-387 - [c119]Selma Batti, Mourad Zghal, Noureddine Boudriga:
All-optical Multi-wavelength Virtual Memory Architecture - Design and Performances Analysis. DCNET/ICE-B/OPTICS 2012: 388-395 - [c118]M'hamed Chammem, Sarra Berrahal, Noureddine Boudriga:
Smart Navigation for Firefighters in Hazardous Environments: A Ban-Based Approach. ICPCA/SWS 2012: 82-96 - [c117]Slim Rekhis, Nourhene Ellouze, Noureddine Boudriga:
A wireless sensor network based water monitoring system. Q2SWinet 2012: 33-40 - [c116]Neila Krichene, Noureddine Boudriga:
A Reservation Scheme for QoS Provision within Mobile Multihop Relay Networks. NCA 2012: 151-154 - [c115]Ramzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi:
A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks. TrustCom 2012: 1077-1082 - 2011
- [j49]Slim Rekhis, Noureddine Boudriga:
Logic-based approach for digital forensic investigation in communication Networks. Comput. Secur. 30(6-7): 376-396 (2011) - [j48]Slim Rekhis, Noureddine Boudriga:
Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks. EURASIP J. Wirel. Commun. Netw. 2011: 39 (2011) - [j47]Nejla Essaddi, Mohamed Hamdi, Sami Habib, Noureddine Boudriga:
Evolutionary strategies for non-uniform deployment in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 7(3/4): 331-354 (2011) - [j46]Noureddine Boudriga, Mohamed Hamdi, S. Sitharama Iyengar:
Coverage Assessment and Target Tracking in 3D Domains. Sensors 11(10): 9904-9927 (2011) - [c114]Boutheina A. Fessi, S. B. Abdallah, Yacine Djemaiel, Noureddine Boudriga:
A Clustering Data Fusion Method for Intrusion Detection System. CIT 2011: 539-545 - [c113]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks. IWCMC 2011: 695-700 - [c112]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks. IWCMC 2011: 1250-1255 - [c111]Slim Rekhis, Baha Bennour, Noureddine Boudriga:
Validation of Security Solutions for Communication Networks: A Policy-Based Approach. NCA 2011: 115-122 - 2010
- [j45]Sihem Trabelsi, Noureddine Boudriga:
Predictive Dynamic Uplink /Downlink Resource Reservation for Vertical Handoff Optimization in 4G Networks. Int. J. Bus. Data Commun. Netw. 6(4): 64-85 (2010) - [j44]Selma Batti, Mourad Zghal, Noureddine Boudriga:
A New All-Optical Switching Node Including Virtual Memory and Synchronizer. J. Networks 5(2): 165-179 (2010) - [j43]Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping. Simul. 86(4): 217-227 (2010) - [c110]Ramzi Bellazreg, Mohamed Hamdi, Noureddine Boudriga:
On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks. AICCSA 2010: 1-8 - [c109]Nejla Essaddi, Mohamed Hamdi, Sami Habib, Noureddine Boudriga:
Optimizing area coverage in Wireless Sensor Networks. AICCSA 2010: 1-6 - [c108]Sihem Trabelsi, Noureddine Boudriga:
Predictive dynamic resource reservation for vertical handoff optimization in 4G mobile wireless networks. AICCSA 2010: 1-8 - [c107]Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S. Sitharama Iyengar:
SPAMMS: A sensor-based pipeline autonomous monitoring and maintenance system. COMSNETS 2010: 1-10 - [c106]Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S. S. Iyengar:
RAMP system for proactive pipeline monitoring. COMSNETS 2010: 1-2 - [c105]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
A Novel Secure and Multipath Routing Algorithm in Wireless Sensor Networks. DCNET/OPTICS 2010: 25-34 - [c104]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks. ICETE (Selected Papers) 2010: 54-70 - [c103]Mohamed Hamdi, Noureddine Boudriga, Habtamu Abie, Mieso K. Denko:
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments. DCNET/OPTICS 2010: 85-92 - [c102]M'hamed Chammem, Mohamed Hamdi, Noureddine Boudriga:
A Novel Modular Black-box Architecture for Secure Vehicular Networks. DCNET/OPTICS 2010: 93-103 - [c101]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Mobility and Security Models for Wireless Sensor Networks using Voronoi Tessellations. DCNET/OPTICS 2010: 104-113 - [c100]Slim Rekhis, Noureddine Boudriga:
Formal Digital Investigation of Anti-forensic Attacks. SADFE 2010: 33-44 - [c99]Mohamed Hamdi, Noureddine Boudriga:
Content-based network filtering of encrypted image data. WCNIS 2010: 343-348 - [c98]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
A new tracking-aware gossiping scheme for Wireless Sensor Networks. WCNIS 2010: 349-354 - [c97]Neila Krichene, Noureddine Boudriga:
QoS Scheduling for IEEE 802.16e Mesh Mode using Genetic Algorithms. WINSYS 2010: 5-12
2000 – 2009
- 2009
- [j42]Mohamed Hamdi, Amel Meddeb-Makhlouf, Noureddine Boudriga:
Multilayer Statistical Intrusion Detection in Wireless Networks. EURASIP J. Adv. Signal Process. 2009 (2009) - [j41]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
Forensic Investigation in Communication Networks Using Incomplete Digital Evidences. Int. J. Commun. Netw. Syst. Sci. 2(9): 857-873 (2009) - [j40]Slim Rekhis, Noureddine Boudriga:
Visibility: a novel concept for characterising provable network digital evidences. Int. J. Secur. Networks 4(4): 234-245 (2009) - [j39]Noureddine Boudriga, Habtamu Abie:
Guest Editorial. J. Networks 4(7): 537-538 (2009) - [j38]Slim Rekhis, Noureddine Boudriga:
Investigating Attack Scenarios in Multihop Wireless Systems. J. Networks 4(7): 539-551 (2009) - [j37]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams. J. Networks 4(7): 589-597 (2009) - [c96]Alaaedine Chouchane, Slim Rekhis, Noureddine Boudriga:
Defending against rogue base station attacks using wavelet based fingerprinting. AICCSA 2009: 523-530 - [c95]Maha Sliti, Mohamed Hamdi, Noureddine Boudriga:
Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks. AICCSA 2009: 633-636 - [c94]Mohamed Hamdi, Nejla Essaddi, Noureddine Boudriga:
ReAlSec: A Relational Language for Advanced Security Engineering. AINA 2009: 596-601 - [c93]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
A Dynamic Mobile Grid System for 4G Networks. FGIT-GDC 2009: 140-147 - [c92]Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Efficient Resource Reservation for Optical Burst Switching Networks. GLOBECOM 2009: 1-5 - [c91]Mohamed Hamdi, Noureddine Boudriga:
A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks. ICC 2009: 1-5 - [c90]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
An image-based tracking algorithm for hybrid Wireless Sensor Networks using epipolar geometry. ICME 2009: 346-349 - [c89]M'hamed Chammem, Mohamed Hamdi, Noureddine Boudriga:
A platform for secure multi-service vehicular communication. ICUMT 2009: 1-6 - [c88]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks. ICUMT 2009: 1-8 - [c87]Slim Rekhis, Noureddine Boudriga:
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. ICUMT 2009: 1-8 - [c86]Yacine Djemaiel, Noureddine Boudriga:
Intrusion detection and tolerance for transaction based applications in wireless environments. IPDPS 2009: 1-8 - [c85]Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga:
A public key algorithm for optical communication based on lattice cryptography. ISCC 2009: 200-205 - [c84]Boutheina A. Fessi, Salah Benabdallah, Mohamed Hamdi, Noureddine Boudriga:
A new genetic algorithm approach for intrusion response system in computer networks. ISCC 2009: 342-347 - [c83]Selma Batti, Mourad Zghal, Noureddine Boudriga, Trevor Hall:
An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings. ISCC 2009: 736-741 - [c82]Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. NCA 2009: 179-186 - [c81]Neila Krichene, Noureddine Boudriga:
Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context. NCA 2009: 296-299 - [c80]Neila Krichene, Noureddine Boudriga:
Securing Roaming and Vertical Handover in Fourth Generation Networks. NSS 2009: 225-231 - [c79]Slim Rekhis, Noureddine Boudriga:
A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks. SADFE 2009: 62-72 - [c78]Ramzi Bellazreg, Mohamed Hamdi, Noureddine Boudriga:
Coverage control and irregular radio propagation in eireless sensor networks. WCNC 2009: 2474-2479 - 2008
- [j36]Noureddine Boudriga, Mohammad S. Obaidat, Faouzi Zarai:
Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis. Comput. Commun. 31(16): 3752-3759 (2008) - [j35]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Intrusion detection and tolerance: A global scheme. Int. J. Commun. Syst. 21(2): 211-230 (2008) - [j34]Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
WHOMoVeS: An optimized broadband sensor network for military vehicle tracking. Int. J. Commun. Syst. 21(3): 277-300 (2008) - [j33]Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:
Heterogeneous Security Policy Validation: From Formal to Executable Specifications. J. Networks 3(8): 55-69 (2008) - [j32]Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking. IEEE Syst. J. 2(1): 74-82 (2008) - [c77]Yacine Djemaiel, Noureddine Boudriga:
Dynamic Detection and Tolerance of Attacks in Storage Area Networks. AINA Workshops 2008: 377-382 - [c76]Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga:
Automated Intrusion Response System: Surveys and Analysis. Security and Management 2008: 149-155 - [c75]Souheil Ben Ayed, Mohamed Hamdi, Noureddine Boudriga:
DPRMM: A Novel Coverage-Invariant Mobility Model for Wireless Sensor Networks. GLOBECOM 2008: 193-197 - [c74]Mohamed Hamdi, Noureddine Boudriga:
Chaotic Progressive Access Control for JPEG2000 Images Repositories. GLOBECOM 2008: 1867-1871 - [c73]Yacine Djemaiel, Noureddine Boudriga:
Using Object Metadata to Detect and Tolerate Attacks in Object Storage Devices. GLOBECOM 2008: 3159-3163 - [c72]Manel Abdelkader, Mouna Skouri, Noureddine Boudriga:
GRIDSAN: an available dynamic grid system for ad hoc networks. UPGRADE-CN 2008: 3-12 - [c71]Maha Sliti, Mohamed Hamdi, Noureddine Boudriga:
An elliptic threshold signature framework for k-security in wireless sensor networks. ICECS 2008: 226-229 - [c70]Mohamed Hamdi, Noureddine Boudriga:
Four dimensional chaotic ciphers for secure image transmission. ICME 2008: 437-440 - [c69]Jihène Krichène, Noureddine Boudriga:
Incident Response Probabilistic Cognitive Maps. ISPA 2008: 689-694 - [c68]Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks. NTMS 2008: 1-5 - [c67]Neila Krichene, Noureddine Boudriga:
Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS. NTMS 2008: 1-5 - [c66]Slim Rekhis, Noureddine Boudriga:
Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless Systems. NTMS 2008: 1-4 - [c65]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
Cognitive-Maps Based Investigation of Digital Security Incidents. SADFE 2008: 25-40 - [c64]Slim Rekhis, Jihène Krichène, Noureddine Boudriga:
DigForNet: Digital Forensic in Networking. SEC 2008: 637-651 - [c63]Mohamed Hamdi, Nejla Essaddi, Noureddine Boudriga:
Energy-Efficient Routing in Wireless Sensor Networks Using Probabilistic Strategies. WCNC 2008: 2567-2572 - 2007
- [j31]Amor Lazzez, Yassine Ramadhane Khlifi, Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat:
A novel node architecture for optical networks: Modeling, analysis and performance evaluation. Comput. Commun. 30(5): 999-1014 (2007) - [j30]Mohammad S. Obaidat, Yassine Ramadhane Khlifi, Noureddine Boudriga:
Performance analysis of a dynamic QoS scheme in optical label-switched networks. Comput. Commun. 30(16): 3012-3026 (2007) - [j29]Mohamed Hamdi, Noureddine Boudriga:
Detecting Denial-of-Service attacks using the wavelet transform. Comput. Commun. 30(16): 3203-3213 (2007) - [j28]Boutheina A. Fessi, Mohamed Hamdi, Salah Benabdallah, Noureddine Boudriga:
A decisional framework system for computer network intrusion detection. Eur. J. Oper. Res. 177(3): 1824-1838 (2007) - [j27]Faouzi Zarai, Noureddine Boudriga:
Provision of quality of service in wireless fourth generation networks. Int. J. Commun. Syst. 20(11): 1215-1243 (2007) - [j26]Noureddine Boudriga, Amor Lazzez, Mohammad S. Obaidat:
Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks: A Scheme and Performance Evaluation. Simul. 83(2): 173-187 (2007) - [c62]Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi:
A QoS-Oriented Protocol for Burst Admission Control in OBS Networks. AICCSA 2007: 172-179 - [c61]Yassine Ramadhane Khlifi, Noureddine Boudriga, Mohammad S. Obaidat:
Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach. AICCSA 2007: 233-240 - [c60]Mohamed Hamdi, Ramzi Bellazreg, Noureddine Boudriga:
Doppler Effect on Location-Based Tracking in Mobile Sensor Networks. AICCSA 2007: 252-257 - [c59]Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat:
A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks. AICCSA 2007: 266-273 - [c58]Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga:
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. AICCSA 2007: 825-832 - [c57]Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
Sensor Activity Scheduling for Efficient WSN-based Tracking. AICCSA 2007: 840-847 - [c56]Yassine Ramadhane Khlifi, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi:
Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach. Annual Simulation Symposium 2007: 106-113 - [c55]Amel Meddeb-Makhlouf, Noureddine Boudriga, Mohammad S. Obaidat:
Radio-Based Cooperation for Wireless Intrusion Detection. GLOBECOM 2007: 946-950 - [c54]Faouzi Zarai, Noureddine Boudriga, Mohammad S. Obaidat:
Location Management in Wireless Fourth Generation Networks. GLOBECOM 2007: 4984-4988 - [c53]Yassine Ramadhane Khlifi, Noureddine Boudriga, Mohammad S. Obaidat:
A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks. ICC 2007: 435-440 - [c52]Amor Lazzez, Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat:
A Dynamic QoS-Based Scheme for Admission Control in OBS Networks. ICC 2007: 449-454 - [c51]Yassine Ramadhane Khlifi, Noureddine Boudriga, Mohammad S. Obaidat:
A Real-Time Admission Control and Planning of OLS Networks. ICECS 2007: 601-604 - [c50]Amor Lazzez, Noureddine Boudriga:
A QoS-Oriented Scheme for a Real Time Admission Control in OBS Networks. ICECS 2007: 792-795 - [c49]Amel Meddeb-Makhlouf, Noureddine Boudriga, Mohammad S. Obaidat:
Radio-based Cooperation Scheme for DDoS Detection. ICECS 2007: 1051-1054 - [c48]Manel Abdelkader, Noureddine Boudriga, Mohammad S. Obaidat:
A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting. ICETE (Selected Papers) 2007: 30-54 - [c47]Manel Abdelkader, Noureddine Boudriga, Mohammad S. Obaidat:
Secure Grid-Based Multi-Party Micropayment System in 4G Networks. ICE-B 2007: 137-148 - [c46]Yacine Djemaiel, Noureddine Boudriga:
A global marking scheme for tracing cyber attacks. SAC 2007: 170-174 - [c45]Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga:
Global intrusion detection and tolerance in networked systems. SAC 2007: 188-189 - [c44]Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:
Security policy validation using temporal executable specifications. SMC 2007: 2848-2853 - [c43]Jihène Krichène, Noureddine Boudriga:
Network security project management: a security policy-based approach. SMC 2007: 3311-3316 - 2006
- [j25]Noureddine Boudriga, Mohammad S. Obaidat:
Mobility, sensing, and security management in wireless ad hoc sensor systems. Comput. Electr. Eng. 32(1-3): 266-276 (2006) - [j24]Faouzi Zarai, Noureddine Boudriga, Mohammad S. Obaidat:
Performance evaluation of a novel scheme for QoS provision in UTRA TDD. Comput. Commun. 29(8): 969-982 (2006) - [j23]Faouzi Zarai, Noureddine Boudriga, Mohammad S. Obaidat:
WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis. Simul. 82(6): 413-424 (2006) - [c42]Noureddine Boudriga, Mourad Baghdadi, Mohammad S. Obaidat:
A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks. Annual Simulation Symposium 2006: 61-67 - [c41]Mohamed Hamdi, Noureddine Boudriga:
Towards a Relational Calculus for Security Library Management. GLOBECOM 2006 - [c40]Mohamed Hamdi, Noureddine Boudriga, Mohammad S. Obaidat:
Designing a Wireless Sensor Network for Mobile Target Localization and Tracking. GLOBECOM 2006 - [c39]Slim Rekhis, Noureddine Boudriga:
Execution-based Digital Investigation on Compromised Systems with Automated Hypotheses Generation. GLOBECOM 2006 - [c38]Faouzi Zarai, Noureddine Boudriga, Mohammad S. Obaidat:
Secured and Seamless Handoff in Wireless Fourth Generation Systems. ICECS 2006: 970-973 - [c37]Manel Abdelkader, Noureddine Boudriga, Mohammad S. Obaidat:
SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks. ICETE (Selected Papers) 2006: 15-27 - [c36]Manel Abdelkader, Noureddine Boudriga, Mohammad S. Obaidat:
SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks. ICE-B 2006: 22-30 - [p2]Manel Abdelkader, Noureddine Boudriga:
SPUR: A secured protocol for UMTS registration. e-Business and Telecommunication Networks 2006: 210-218 - 2005
- [j22]Mohamed Hamdi, Noureddine Boudriga:
Computer and network security risk management: theory, challenges, and countermeasures. Int. J. Commun. Syst. 18(8): 763-793 (2005) - [c35]Noureddine Boudriga, Mohammad S. Obaidat:
Mobility and security issues in wireless ad-hoc sensor networks. GLOBECOM 2005: 5 - [c34]Manel Abdelkader, Noureddine Boudriga:
Intrusion tolerant GRID in ad-hoc networks. ICECS 2005: 1-4 - [c33]Mourad Baghdadi, Noureddine Boudriga:
Scalable mobility management in wireless ad hoc sensor systems. ICECS 2005: 1-5 - [c32]Noureddine Boudriga, Mohammad S. Obaidat, Moëz Cherif, Sihem Guemara-ElFatmi:
An advance dynamic resource reservation algorithm for OBS networks: Design and performance. ICECS 2005: 1-4 - [c31]Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Cooperative Intrusion Detection and Tolerance System. ICECS 2005: 1-4 - [c30]Mohamed Hamdi, Nouha Grira, Noureddine Boudriga:
Detecting distributed computer network attacks: A multi-dimensional wavelet approach. ICECS 2005: 1-5 - [c29]Yassine Ramadhane Khlifi, Sihem Guemara El Fatmi, Noureddine Boudriga:
Optical Label Switching: Design issues, modeling and performance analysis. ICECS 2005: 1-5 - [c28]Amor Lazzez, Sihem Guemara El Fatmi, Noureddine Boudriga:
Performance analysis and simulation of a novel OBS network architecture. ICECS 2005: 1-5 - [c27]Faouzi Zarai, Noureddine Boudriga:
Provision of quality of service in open wireless architectures. ICECS 2005: 1-5 - [c26]Faouzi Zarai, Slim Rekhis, Noureddine Boudriga, Kamel Zidane:
SDPPM: An IP traceback scheme for MANET. ICECS 2005: 1-4 - [c25]Slim Rekhis, Noureddine Boudriga:
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. MMM-ACNS 2005: 325-338 - [c24]Slim Rekhis, Noureddine Boudriga:
A formal logic-based language and an automated verification tool for computer forensic investigation. SAC 2005: 287-291 - [c23]Noureddine Boudriga, Mohammad S. Obaidat:
Fault and intrusion tolerance in wireless ad hoc networks. WCNC 2005: 2281-2286 - 2004
- [j21]Sihem Guemara-ElFatmi, Noureddine Boudriga, Mohammad S. Obaidat:
Relational-based calculus for trust management in networked services. Comput. Commun. 27(12): 1206-1219 (2004) - [j20]Noureddine Boudriga, Mohammad S. Obaidat:
Intelligent agents on the Web: a review. Comput. Sci. Eng. 6(4): 35-42 (2004) - [c22]Manel Abdelkader, Noureddine Boudriga:
SPUR: A Secured Protocol for UMTS Registration. ICETE (3) 2004: 8-16 - [c21]Mohamed Hamdi, Noureddine Boudriga:
An Abstract Reduction Model for Computer Security Risk. SEC 2004: 1-16 - [c20]Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:
Collective computer incident response using cognitive maps. SMC (1) 2004: 1080-1085 - [e1]Mohammad S. Obaidat, Noureddine Boudriga:
Electronic Government and Commerce: Design, Modeling, Analysis and Security - Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security, EGCDMAS 2004, In conjunction with ICETE 2004, Setúbal, Portugal, August 2004. INSTICC Press 2004, ISBN 972-8865-17-1 [contents] - 2003
- [j19]Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga:
DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle. Comput. Commun. 26(7): 708-717 (2003) - [j18]Noureddine Boudriga:
Optical burst switching protocols for supporting QoS and adaptive routing. Comput. Commun. 26(15): 1804-1812 (2003) - [c19]Mohamed Hamdi, Noureddine Boudriga:
Algebraic specification of network security risk management. FMSE 2003: 52-60 - [c18]Noureddine Boudriga, Mohammad S. Obaidat:
Admission control and resource management of uncertain duration traffic in optical networks. ICECS 2003: 1018-1021 - [c17]Noureddine Boudriga, Mohammad S. Obaidat:
Resource Management Schemes in Optical Networks. SCCC 2003: 99-108 - 2002
- [c16]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
Adaptive QoS schemes in DWDM networks. ICC 2002: 2881-2885 - [c15]Sihem Guemara El Fatmi, Noureddine Boudriga, Mohammad S. Obaidat:
Quality of service provision in high-speed networks: an active approach. ICECS 2002: 1071-1074 - [p1]Noureddine Boudriga, Salah Benabdallah:
Laying out the Foundation for a Digital Government Model Case Study - Tunisia. Advances in Digital Government 2002: 289-303 - 2001
- [j17]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
On a congestion management scheme for high speed networks using aggregated large deviations principle. Comput. Commun. 24(9): 860-867 (2001) - [c14]Sihem Guemara El Fatmi, Noureddine Boudriga:
Synchronizing multimedia flows in active-high-speed networks. ICON 2001: 50-55 - [c13]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
Supporting Adaptive QoS for Multiple Classes of Service in DWDM Networks. ICPP Workshops 2001: 283-290 - 2000
- [j16]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
A methodology to optimize the design of telecommunication systems. Comput. Commun. 23(10): 912-921 (2000) - [j15]Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga:
An adaptive approach to manage traffic in CDMA ATM networks. Comput. Commun. 23(10): 942-949 (2000) - [c12]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
QoS management in wireless ATM networks using large deviation principle. WCNC 2000: 271-275
1990 – 1999
- 1999
- [j14]Mohammad S. Obaidat, C. Ben Ahmed, Noureddine Boudriga:
Schemes for mobility management of wireless ATM networks. Int. J. Commun. Syst. 12(3): 153-166 (1999) - [j13]C. Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
A performance analysis scheme for intelligent wireless ATM networks. Int. J. Commun. Syst. 12(5-6): 405-426 (1999) - [c11]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
Managing traffic in CDMA ATM networks. ICCCN 1999: 486-493 - [c10]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
Performance analysis of intelligent mobile ATM networks. IPCCC 1999: 83-89 - [c9]Mohammad S. Obaidat, Chiheb Ben Ahmed, Noureddine Boudriga:
Managing mobility in a wireless ATM network. IPCCC 1999: 90-96 - [c8]Noureddine Boudriga, O. Hassairi, Mohammad S. Obaidat:
Intelligent Services Integration in Mobile ATM Networks. SAC 1999: 91-97 - 1998
- [j12]C. Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
Bandwidth allocation and call admission control in ATM networks. Int. J. Commun. Syst. 11(4): 287-295 (1998) - [c7]Chiheb Ben Ahmed, Noureddine Boudriga, Mohammad S. Obaidat:
Optimum Design of Telecommunication Systems. ICCCN 1998: 792-799 - 1997
- [j11]Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi:
Multiple connections in data communication and advanced applications. Comput. Commun. 20(12): 1051-1058 (1997) - [j10]Chiheb Ben Ahmed, Noureddine Boudriga:
Reducing Network Latency and Server Load in Hypermedia Systems. Inf. Sci. 102(1-4): 1-29 (1997) - [c6]Noureddine Boudriga, Sihem Guemara-ElFatmi:
Formal Protocol Description: Model and validation. RelMiCS 1997: 187-203 - [c5]Noureddine Boudriga, Sihem Guemara-ElFatmi:
Extended connection models for advanced applications. FTDCS 1997: 208-215 - 1995
- [j9]Eva Kühn, Ahmed K. Elmagarmid, Yungho Leu, Noureddine Boudriga:
A Parallel Logic Language for Transaction Specification in Multidatabase Systems. J. Syst. Integr. 5(3): 219-252 (1995) - 1993
- [j8]Yungho Leu, Ahmed K. Elmagarmid, Noureddine Boudriga:
Corrigendum: Specification and execution of transactions for advanced database applications. Inf. Syst. 18(2): 141 (1993) - [j7]Noureddine Boudriga, Yahya Slimani, Ali Mili:
Relation-based semantics for concurrency. Inf. Sci. 75(3): 223-252 (1993) - [j6]Jules Desharnais, Ali Jaoua, Fatma Mili, Noureddine Boudriga, Ali Mili:
A Relation Division Operator: The Conjugate Kernel. Theor. Comput. Sci. 114(2): 247-272 (1993) - [c4]Omran A. Bukhres, Jeanne Alm, Noureddine Boudriga:
A Priority-Based PCG Algorithm for Global Deadlock Detection and Resilution in Multidatabase Systems. RIDE-IMS 1993: 241-244 - 1992
- [j5]Noureddine Boudriga, Ali Mili, R. Zalila, Fatma Mili:
A Relational Model for the Specification of Data Types. Comput. Lang. 17(2): 101-131 (1992) - [j4]Noureddine Boudriga, Fathi Elloumi, Ali Mili:
On the Lattice of Specifications: Applications to a Specification Methodology. Formal Aspects Comput. 4(6): 544-571 (1992) - [j3]Yungho Leu, Ahmed K. Elmagarmid, Noureddine Boudriga:
Specification and execution of transactions for advanced database applications. Inf. Syst. 17(2): 171-183 (1992) - [j2]Noureddine Boudriga, Ali Mili, Roland T. Mittermeir:
Semantic-Based Software Retrieval to Support Rapid Prototyping. Struct. Program. 13(3): 109-127 (1992) - [c3]Kamel Barkaoui, Noureddine Boudriga, Amel Grissa Touzi:
A Transition Net Formalism for Deductive Databases Efficiently Handling Quering and Integrity Constraints Aspects. DEXA 1992: 221-225 - [c2]Ali Mili, Noureddine Boudriga:
Computers in the Classroom: A National Proposal. IFIP Congress (2) 1992: 116-122 - 1991
- [j1]Ali Jaoua, Ali Mili, Noureddine Boudriga, J. L. Durieux:
Regularity of Relations: A Measure of Uniformity. Theor. Comput. Sci. 79(2): 323-339 (1991) - 1990
- [c1]Noureddine Boudriga, Ali Mili:
A Database of Software Components: An Algebraic Structure and Its Implementation. DEXA 1990: 162-166
Coauthor Index
aka: C. Ben Ahmed
aka: Sihem Guemara-ElFatmi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint