关注
Wided Ben Daoud
Wided Ben Daoud
NTSC'om, ENETCOM
在 enis.tn 的电子邮件经过验证
标题
引用次数
引用次数
年份
TACRM: trust access control and resource management mechanism in fog computing
WB Daoud, MS Obaidat, A Meddeb-Makhlouf, F Zarai, KF Hsiao
Human-centric Computing and Information Sciences 9, 1-18, 2019
542019
Secure IoT assistant-based system for Alzheimer’s disease
R Chokri, W Hanini, WB Daoud, SA Chelloug, AM Makhlouf
IEEE Access 10, 44305-44314, 2022
132022
SIMAD: Secure Intelligent Method for IoT-Fog Environments Attacks Detection.
WB Daoud, S Mahfoudhi
Computers, Materials & Continua 70 (2), 2022
122022
A model of role-risk based intrusion prevention for cloud environment
WB Daoud, A Meddeb-Makhlouf, F Zarai
2018 14th international wireless communications & mobile computing …, 2018
122018
A trust-based access control scheme for e-Health Cloud
WB Daoud, A Meddeb-Makhlouf, F Zarai
2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018
112018
[Retracted] Cloud‐IoT Resource Management Based on Artificial Intelligence for Energy Reduction
WB Daoud, A Mchergui, T Moulahi, A Alabdulatif
Wireless Communications and Mobile Computing 2022 (1), 2248962, 2022
82022
SACP: Secure access control protocol
WB Daoud, M Rekik, A Meddeb-Makhlouf, F Zarai, S Mahfoudhi
2021 International Wireless Communications and Mobile Computing (IWCMC), 935-941, 2021
42021
A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
WB Daoud, A Meddeb-Makhlouf, F Zarai, MS Obaidat, KF Hsiao
ICETE (1), 462-468, 2018
42018
Embedded PSO for Solving FJSP on embedded environment (Industry 4.0 Era)
R Zarrouk, WB Daoud, S Mahfoudhi, A Jemai
Applied Sciences 12 (6), 2829, 2022
32022
AI-based System for the Detection and Prevention of COVID-19
S Chokri, WB Daoud, W Hanini, S Mahfoudhi, A Makhlouf
International Journal of Advanced Computer Science and Applications 13 (1), 2022
32022
Fog computing network security based on resources management
WB Daoud, S Othmen, M Hamdi, R Khdhir, H Hamam
EURASIP Journal on Wireless Communications and Networking 2023 (1), 50, 2023
2023
Optimize and Secure Routing Protocol for Multi-hop Wireless Network
S Othmen, W Mansouri, S Asklany, WB Daoud
International Journal of Advanced Computer Science and Applications 13 (1), 2022
2022
Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks
WB Daoud, A Meddeb-Makhlouf, F Zarai, MS Obaidat
Emerging Research in Data Engineering Systems and Computer Communications …, 2020
2020
ICETE 2019-PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS
WB Daoud, A Meddeb-Makhlouf, F Zarai, MS Obaidat, KF Hsiao, ...
2019
Service management algorithm-based on security monitoring mechanism for fog IoT users in fog networks
WB Daoud, A Meddeb-Makhlouf, F Zarai, MS Obaidat, KF Hsiao
ICETE 2019-Proceedings of the 16th International Joint Conference on e …, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–15