TACRM: trust access control and resource management mechanism in fog computing WB Daoud, MS Obaidat, A Meddeb-Makhlouf, F Zarai, KF Hsiao Human-centric Computing and Information Sciences 9, 1-18, 2019 | 54 | 2019 |
SE-AOMDV: Secure and efficient AOMDV routing protocol for vehicular communications A Meddeb Makhlouf, M Guizani International Journal of Information Security 18 (5), 665-676, 2019 | 32 | 2019 |
Comparative study of classification algorithms for cloud ids using nsl-kdd dataset in weka S Farhat, M Abdelkader, A Meddeb-Makhlouf, F Zarai 2020 International Wireless Communications and Mobile Computing (IWCMC), 445-450, 2020 | 21 | 2020 |
Intrusion cancellation for anomaly detection in healthcare applications MB Mohamed, A Meddeb-Makhlouf, A Fakhfakh 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 17 | 2019 |
Study of vehicular cloud during traffic congestion N Mensi, M Guizani, A Makhlouf 2016 4th International Conference on Control Engineering & Information …, 2016 | 15 | 2016 |
An embedded ANN raspberry PI for inertial sensor based human activity recognition A Jmal, R Barioul, A Meddeb Makhlouf, A Fakhfakh, O Kanoun The Impact of Digital Technologies on Public Health in Developed and …, 2020 | 14 | 2020 |
Correlation for efficient anomaly detection in medical environment MB Mohamed, AM Makhlouf, A Fakhfakh 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 14 | 2018 |
Secure IoT assistant-based system for Alzheimer’s disease R Chokri, W Hanini, WB Daoud, SA Chelloug, AM Makhlouf IEEE Access 10, 44305-44314, 2022 | 13 | 2022 |
Multilayer statistical intrusion detection in wireless networks M Hamdi, A Meddeb-Makhlouf, N Boudriga EURASIP Journal on Advances in Signal Processing 2009, 1-13, 2008 | 13 | 2008 |
A model of role-risk based intrusion prevention for cloud environment WB Daoud, A Meddeb-Makhlouf, F Zarai 2018 14th international wireless communications & mobile computing …, 2018 | 12 | 2018 |
A trust-based access control scheme for e-Health Cloud WB Daoud, A Meddeb-Makhlouf, F Zarai 2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018 | 11 | 2018 |
Dynamic scheduling algorithm based on priority assignment for LTE-V2X vehicular networks AD Trabelsi, H Marouane, F Zarai, A Meddeb-Makhlouf 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 10 | 2019 |
DVF-fog: distributed virtual firewall in fog computing based on risk analysis F Kamoun-Abid, A Meddeb-Makhlouf, F Zarai, M Guizani International Journal of Sensor Networks 30 (4), 242-253, 2019 | 10 | 2019 |
C-dids: A cooperative and distributed intrusion detection system in cloud environment S Ghribi, AM Makhlouf, F Zarai 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 10 | 2018 |
Improved dual authentication and key management techniques in vehicular ad hoc networks M Rekik, A Meddeb-Makhlouf, F Zarai, MS Obaidat 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 9 | 2017 |
Secure architecture for Cloud/Fog computing based on firewalls and controllers F Kamoun-Abid, M Rekik, A Meddeb-Makhlouf, F Zarai Procedia Computer Science 192, 822-833, 2021 | 8 | 2021 |
Wireless body sensor networks with enhanced reliability by data aggregation based on machine learning algorithms M Belhaj Mohamed, A Meddeb-Makhlouf, A Fakhfakh, O Kanoun Advanced Sensors for biomedical applications, 67-81, 2021 | 8 | 2021 |
Incentives for safe driving in vanet N Mensi, A Makhlouf, M Guizani 2016 4th International Conference on Control Engineering & Information …, 2016 | 8 | 2016 |
Fog‐cloud distributed intrusion detection and cooperation S Ghribi, AM Makhlouf, F Zarai, M Guizani Transactions on Emerging Telecommunications Technologies 33 (8), e3835, 2022 | 7 | 2022 |
Intrusion and anomaly detection in wireless networks AM Makhlouf, N Boudriga Handbook of Research on Wireless Security, 78-94, 2008 | 7 | 2008 |