Остановите войну!
for scientists:
default search action
Farid Naït-Abdesselam
- > Home > Persons > Farid Naït-Abdesselam
Publications
- 2021
- [j27]Soufiene Djahel, Nafaâ Jabeur, Farid Naït-Abdesselam, Thomas Wolstencroft:
A WAVE Based and Collaboration Driven Framework for Reduced Traffic Congestion in Smart Cities. IEEE Intell. Transp. Syst. Mag. 13(4): 251-261 (2021) - 2019
- [c65]Paul Melnyk, Soufiene Djahel, Farid Naït-Abdesselam:
Towards a Smart Parking Management System for Smart Cities. ISC2 2019: 542-546 - 2015
- [j17]Intesab Hussain, Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam:
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP). Secur. Commun. Networks 8(18): 4436-4451 (2015) - 2014
- [c51]Dalil Moad, Soufiene Djahel, Farid Naït-Abdesselam:
Padovan sequence based Backoff Algorithm for improved wireless medium access in MANETs. GIIS 2014: 1-6 - [c48]Ajmal Sawand, Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam:
Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems. ICCC 2014: 187-192 - 2013
- [c46]Intesab Hussain, Soufiene Djahel, Dimitris Geneiatakis, Farid Naït-Abdesselam:
A lightweight countermeasure to cope with flooding attacks against session initiation protocol. WMNC 2013: 1-5 - 2012
- [j15]Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam, John Murphy:
Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs. IEEE Wirel. Commun. Lett. 1(5): 540-543 (2012) - [c43]Dalil Moad, Soufiene Djahel, Farid Naït-Abdesselam:
Improving the quality of service routing in OLSR protocol. ICCIT 2012: 314-319 - 2011
- [j13]Soufiene Djahel, Farid Naït-Abdesselam, Zonghua Zhang:
Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges. IEEE Commun. Surv. Tutorials 13(4): 658-672 (2011) - [j12]Soufiene Djahel, Farid Naït-Abdesselam, Damla Turgut:
Characterizing the greedy behavior in wireless ad hoc networks. Secur. Commun. Networks 4(3): 284-298 (2011) - 2010
- [c40]Soufiene Djahel, Youcef Begriche, Farid Naït-Abdesselam:
A Bayesian Statistical Model to Alleviate Greediness in Wireless Mesh Networks. GLOBECOM 2010: 1-6 - [c39]Soufiene Djahel, Farid Naït-Abdesselam:
Thwarting back-off rules violation in tactical wireless ad hoc networks. ISCC 2010: 417-422 - 2009
- [j7]Soufiene Djahel, Farid Naït-Abdesselam:
FLSAC: A new scheme to defend against greedy behavior in wireless mesh networks. Int. J. Commun. Syst. 22(10): 1245-1266 (2009) - [c38]Soufiene Djahel, Farid Naït-Abdesselam, Faraz Ahsan:
Highlighting the effects of joint MAC layer misbehavior and virtual link attack in wireless ad hoc networks. AICCSA 2009: 756-763 - [c37]Soufiene Djahel, Farid Naït-Abdesselam, Damla Turgut:
An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks. GLOBECOM 2009: 1-6 - [c36]Soufiene Djahel, Farid Naït-Abdesselam:
A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN. ICC 2009: 1-5 - [c33]Soufiene Djahel, Farid Naït-Abdesselam, Ashfaq A. Khokhar:
A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless networks. LCN 2009: 730-737 - [c31]Faraz Ahsan, Soufiene Djahel, Farid Naït-Abdesselam, Sajjad Mohsin:
Neighbor based channel hopping coordination: Practical against jammer? LCN 2009: 993-998 - 2008
- [j2]Soufiene Djahel, Farid Naït-Abdesselam, Zonghua Zhang, Ashfaq A. Khokhar:
Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Networks 1(3): 245-258 (2008) - [c28]Soufiene Djahel, Farid Naït-Abdesselam:
Avoiding virtual link attacks in wireless ad hoc networks. AICCSA 2008: 355-360 - [c25]Soufiene Djahel, Farid Naït-Abdesselam, Ashfaq A. Khokhar:
An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol. ICC 2008: 2780-2785
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 06:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint