Network intrusion detection for IoT security based on learning techniques N Chaabouni, M Mosbah, A Zemmari, C Sauvignac, P Faruki IEEE Communications Surveys & Tutorials 21 (3), 2671-2701, 2019 | 864 | 2019 |
Monadic second-order evaluations on tree-decomposable graphs B Courcelle, M Mosbah Theoretical Computer Science 109 (1-2), 49-82, 1993 | 321 | 1993 |
Delay-aware VNF placement and chaining based on a flexible resource allocation approach A Alleg, T Ahmed, M Mosbah, R Riggio, R Boutaba 2017 13th international conference on network and service management (CNSM), 1-7, 2017 | 129 | 2017 |
Convex drawings of 3-connected plane graphs N Bonichon, S Felsner, M Mosbah Algorithmica 47 (4), 399-420, 2007 | 121 | 2007 |
Fast and secure multihop broadcast solutions for intervehicular communication WB Jaballah, M Conti, M Mosbah, CE Palazzi IEEE Transactions on Intelligent Transportation Systems 15 (1), 433-450, 2013 | 58 | 2013 |
Android inter-app communication threats and detection techniques S Bhandari, WB Jaballah, V Jain, V Laxmi, A Zemmari, MS Gaur, ... Computers & Security 70, 392-421, 2017 | 55 | 2017 |
Wagner’s theorem on realizers N Bonichon, B Le Saëc, M Mosbah International Colloquium on Automata, Languages, and Programming, 1043-1053, 2002 | 47 | 2002 |
Towards general Internet of Vehicles networking: Routing protocols survey C Ksouri, I Jemili, M Mosbah, A Belghith Concurrency and Computation: Practice and Experience 34 (7), e5994, 2022 | 37 | 2022 |
Joint diversity and redundancy for resilient service chain provisioning A Alleg, T Ahmed, M Mosbah, R Boutaba IEEE Journal on Selected Areas in Communications 38 (7), 1490-1504, 2020 | 37 | 2020 |
Vision‐based vehicle detection for road traffic congestion classification A Chetouane, S Mabrouk, I Jemili, M Mosbah Concurrency and Computation: Practice and Experience 34 (7), e5983, 2022 | 36 | 2022 |
A unified framework for designing, implementing and visualizing distributed algorithms M Bauderon, M Mosbah Electronic Notes in Theoretical Computer Science 72 (3), 13-24, 2003 | 34 | 2003 |
From local computations to asynchronous message passing systems M Bauderon, Y Métivier, M Mosbah, A Sellami Technical Report 1271 (2), 2002 | 34 | 2002 |
Visualization of distributed algorithms based on labeled rewriting systems M Bauderon, S Gruner, Y Métivier, M Mosbah, A Sellami Second International Workshop on Graph Transformation and Visual Modeling …, 2001 | 33* | 2001 |
Cross-layer adaptive multipath routing for multimedia wireless sensor networks under duty cycle mode I Jemili, D Ghrab, A Belghith, M Mosbah Ad Hoc Networks 109, 102292, 2020 | 32 | 2020 |
A OneM2M intrusion detection and prevention system based on edge machine learning N Chaabouni, M Mosbah, A Zemmari, C Sauvignac NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020 | 28 | 2020 |
Electing a leader in the local computation model using mobile agents MA Haddar, AH Kacem, Y Métivier, M Mosbah, M Jmaiel 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 28 | 2008 |
Watermelon uniform random generation with applications N Bonichon, M Mosbah Theoretical Computer Science 307 (2), 241-256, 2003 | 28 | 2003 |
Hybrid live P2P streaming protocol C Hammami, I Jemili, A Gazdar, A Belghith, M Mosbah Procedia Computer Science 32, 158-165, 2014 | 27 | 2014 |
Distributed computation of a spanning tree in a dynamic graph by mobile agents S Abbas, M Mosbah, A Zemmari 2006 IEEE International Conference on Engineering of Intelligent Systems, 1-6, 2006 | 27 | 2006 |
VANETs routing protocols survey: classifications, optimization methods and new trends C Ksouri, I Jemili, M Mosbah, A Belghith Distributed Computing for Emerging Smart Networks: First International …, 2020 | 25 | 2020 |