关注
Amel Makhlouf
Amel Makhlouf
NTS'COM,ENET'COM
在 enetcom.usf.tn 的电子邮件经过验证
标题
引用次数
引用次数
年份
TACRM: trust access control and resource management mechanism in fog computing
WB Daoud, MS Obaidat, A Meddeb-Makhlouf, F Zarai, KF Hsiao
Human-centric Computing and Information Sciences 9, 1-18, 2019
542019
SE-AOMDV: Secure and efficient AOMDV routing protocol for vehicular communications
A Meddeb Makhlouf, M Guizani
International Journal of Information Security 18 (5), 665-676, 2019
322019
Comparative study of classification algorithms for cloud ids using nsl-kdd dataset in weka
S Farhat, M Abdelkader, A Meddeb-Makhlouf, F Zarai
2020 International Wireless Communications and Mobile Computing (IWCMC), 445-450, 2020
212020
Intrusion cancellation for anomaly detection in healthcare applications
MB Mohamed, A Meddeb-Makhlouf, A Fakhfakh
2019 15th International Wireless Communications & Mobile Computing …, 2019
172019
Study of vehicular cloud during traffic congestion
N Mensi, M Guizani, A Makhlouf
2016 4th International Conference on Control Engineering & Information …, 2016
152016
An embedded ANN raspberry PI for inertial sensor based human activity recognition
A Jmal, R Barioul, A Meddeb Makhlouf, A Fakhfakh, O Kanoun
The Impact of Digital Technologies on Public Health in Developed and …, 2020
142020
Correlation for efficient anomaly detection in medical environment
MB Mohamed, AM Makhlouf, A Fakhfakh
2018 14th International Wireless Communications & Mobile Computing …, 2018
142018
Secure IoT assistant-based system for Alzheimer’s disease
R Chokri, W Hanini, WB Daoud, SA Chelloug, AM Makhlouf
IEEE Access 10, 44305-44314, 2022
132022
Multilayer statistical intrusion detection in wireless networks
M Hamdi, A Meddeb-Makhlouf, N Boudriga
EURASIP Journal on Advances in Signal Processing 2009, 1-13, 2008
132008
A model of role-risk based intrusion prevention for cloud environment
WB Daoud, A Meddeb-Makhlouf, F Zarai
2018 14th international wireless communications & mobile computing …, 2018
122018
A trust-based access control scheme for e-Health Cloud
WB Daoud, A Meddeb-Makhlouf, F Zarai
2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018
112018
Dynamic scheduling algorithm based on priority assignment for LTE-V2X vehicular networks
AD Trabelsi, H Marouane, F Zarai, A Meddeb-Makhlouf
2019 15th International Wireless Communications & Mobile Computing …, 2019
102019
DVF-fog: distributed virtual firewall in fog computing based on risk analysis
F Kamoun-Abid, A Meddeb-Makhlouf, F Zarai, M Guizani
International Journal of Sensor Networks 30 (4), 242-253, 2019
102019
C-dids: A cooperative and distributed intrusion detection system in cloud environment
S Ghribi, AM Makhlouf, F Zarai
2018 14th International Wireless Communications & Mobile Computing …, 2018
102018
Improved dual authentication and key management techniques in vehicular ad hoc networks
M Rekik, A Meddeb-Makhlouf, F Zarai, MS Obaidat
2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017
92017
Secure architecture for Cloud/Fog computing based on firewalls and controllers
F Kamoun-Abid, M Rekik, A Meddeb-Makhlouf, F Zarai
Procedia Computer Science 192, 822-833, 2021
82021
Wireless body sensor networks with enhanced reliability by data aggregation based on machine learning algorithms
M Belhaj Mohamed, A Meddeb-Makhlouf, A Fakhfakh, O Kanoun
Advanced Sensors for biomedical applications, 67-81, 2021
82021
Incentives for safe driving in vanet
N Mensi, A Makhlouf, M Guizani
2016 4th International Conference on Control Engineering & Information …, 2016
82016
Fog‐cloud distributed intrusion detection and cooperation
S Ghribi, AM Makhlouf, F Zarai, M Guizani
Transactions on Emerging Telecommunications Technologies 33 (8), e3835, 2022
72022
Intrusion and anomaly detection in wireless networks
AM Makhlouf, N Boudriga
Handbook of Research on Wireless Security, 78-94, 2008
72008
系统目前无法执行此操作,请稍后再试。
文章 1–20