


Остановите войну!
for scientists:
Abdelouahid Derhab
Person information

- affiliation: King Saud University
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j68]Noureddine Seddari
, Abdelouahid Derhab
, Mohamed Belaoued
, Waleed Halboob
, Jalal Al-Muhtadi
, Abdelghani Bouras
:
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media. IEEE Access 10: 62097-62109 (2022) - [j67]Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou, Abdelouahid Derhab, Moez Krichen:
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput. Electr. Eng. 98: 107716 (2022) - [j66]Abdelouahid Derhab
, Mohamed Belaoued
, Irfan Mohiuddin
, Fajri Kurniawan
, Muhammad Khurram Khan
:
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks. IEEE Trans. Intell. Transp. Syst. 23(3): 2366-2379 (2022) - 2021
- [b1]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - [j65]Farrukh Aslam Khan
, Khan Zeb
, Mabrook Al-Rakhami
, Abdelouahid Derhab
, Syed Ahmad Chan Bukhari
:
Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review. IEEE Access 9: 43711-43735 (2021) - [j64]Abdelouahid Derhab
, Rahaf Alawwad, Khawlah Dehwah, Noshina Tariq, Farrukh Aslam Khan
, Jalal Al-Muhtadi
:
Tweet-Based Bot Detection Using Big Data Analytics. IEEE Access 9: 65988-66005 (2021) - [j63]Ayesha Altaf, Haider Abbas
, Faiza Iqbal
, Farrukh Aslam Khan, Saddaf Rubab
, Abdelouahid Derhab:
Context-oriented trust computation model for industrial Internet of Things. Comput. Electr. Eng. 92: 107123 (2021) - [j62]Wilayat Khan
, Farrukh Aslam Khan
, Abdelouahid Derhab
, Adi Alhudhaif
:
CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover. Complex. 2021: 5525539:1-5525539:12 (2021) - [j61]Abdelouahab Amira
, Abdelouahid Derhab, ElMouatez Billah Karbab, Omar Nouali, Farrukh Aslam Khan:
TriDroid: a triage and classification framework for fast detection of mobile threats in android markets. J. Ambient Intell. Humaniz. Comput. 12(2): 1731-1755 (2021) - [j60]Nassima Bougueroua, Smaine Mazouzi, Mohamed Belaoued, Noureddine Seddari, Abdelouahid Derhab, Abdelghani Bouras:
A Survey on Multi-Agent Based Collaborative Intrusion Detection Systems. J. Artif. Intell. Soft Comput. Res. 11(2): 111-142 (2021) - [j59]Noshina Tariq
, Muhammad Asim
, Farrukh Aslam Khan
, Thar Baker
, Umair Khalid
, Abdelouahid Derhab
:
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things. Sensors 21(1): 23 (2021) - [j58]Abdelouahid Derhab
, Mohamed Guerroumi
, Mohamed Belaoued
, Omar Cheikhrouhou
:
BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks. Wirel. Commun. Mob. Comput. 2021: 9984666:1-9984666:12 (2021) - [c32]Amine Boulemtafes, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal:
PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring. AICCSA 2021: 1-8 - 2020
- [j57]Mohamed Belaoued
, Abdelouahid Derhab
, Smaine Mazouzi
, Farrukh Aslam Khan
:
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance. IEEE Access 8: 14329-14343 (2020) - [j56]Abdelouahid Derhab
, Mohamed Belaoued
, Mohamed Guerroumi
, Farrukh Aslam Khan
:
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing. IEEE Access 8: 28956-28969 (2020) - [j55]Mohamed Amine Ferrag
, Lei Shu, Xing Yang, Abdelouahid Derhab
, Leandros A. Maglaras
:
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Access 8: 32031-32053 (2020) - [j54]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j53]ElMouatez Billah Karbab
, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [j52]Amine Boulemtafes, Abdelouahid Derhab
, Yacine Challal
:
A review of privacy-preserving techniques for deep learning. Neurocomputing 384: 21-45 (2020) - [j51]Souhila Aoufi, Abdelouahid Derhab, Mohamed Guerroumi:
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. J. Inf. Secur. Appl. 54: 102518 (2020) - [j50]Arwa Aldweesh, Abdelouahid Derhab, Ahmed Z. Emam
:
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowl. Based Syst. 189 (2020) - [j49]Naila Belhadj Aissa
, Mohamed Guerroumi, Abdelouahid Derhab:
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset. Neural Comput. Appl. 32(8): 3475-3501 (2020) - [j48]Abdelouahid Derhab
, Abdelghani Bouras
, Mohamed Belaoued
, Leandros A. Maglaras
, Farrukh Aslam Khan
:
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors 20(21): 6106 (2020) - [j47]Mohamed Amine Ferrag
, Leandros A. Maglaras
, Abdelouahid Derhab, Helge Janicke
:
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun. Syst. 73(2): 317-348 (2020) - [j46]Abdelouahid Derhab
, Arwa Aldweesh
, Ahmed Z. Emam
, Farrukh Aslam Khan
:
Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering. Wirel. Commun. Mob. Comput. 2020: 6689134:1-6689134:16 (2020) - [c31]Ouissem Ben Fredj, Omar Cheikhrouhou, Moez Krichen, Habib Hamam, Abdelouahid Derhab:
An OWASP Top Ten Driven Survey on Web Application Protection Methods. CRiSIS 2020: 235-252 - [c30]Ouissem Ben Fredj, Alaeddine Mihoub
, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab:
CyberSecurity Attack Prediction: A Deep Learning Approach. SIN 2020: 5:1-5:6 - [i6]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020)
2010 – 2019
- 2019
- [j45]Wilayat Khan
, Muhammad Kamran, Aakash Ahmad
, Farrukh Aslam Khan
, Abdelouahid Derhab:
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach. IEEE Access 7: 16550-16560 (2019) - [j44]Farrukh Aslam Khan
, Abdu Gumaei
, Abdelouahid Derhab, Amir Hussain:
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection. IEEE Access 7: 30373-30385 (2019) - [j43]Zahid Wadud, Muhammad Ismail
, Abdul Baseer Qazi, Farrukh Aslam Khan
, Abdelouahid Derhab
, Ibrar Ahmad, Arbab Masood Ahmad
:
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks. IEEE Access 7: 175980-175999 (2019) - [j42]Muhammad Imran
, Muhammad Hanif Durad, Farrukh Aslam Khan
, Abdelouahid Derhab
:
Toward an optimal solution against Denial of Service attacks in Software Defined Networks. Future Gener. Comput. Syst. 92: 444-453 (2019) - [j41]Muhammad Tariq
, Hammad Majeed, Mirza Omer Beg, Farrukh Aslam Khan
, Abdelouahid Derhab
:
Accurate detection of sitting posture activities in a secure IoT based assisted living environment. Future Gener. Comput. Syst. 92: 745-757 (2019) - [j40]Muhammad Imran
, Muhammad Hanif Durad, Farrukh Aslam Khan
, Abdelouahid Derhab:
Reducing the effects of DoS attacks in software defined networks using parallel flow installation. Hum. centric Comput. Inf. Sci. 9: 16 (2019) - [j39]Mohamed Belaoued
, Abdelaziz Boukellal, Mohamed Amir Koalal
, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan:
Combined dynamic multi-feature and rule-based behavior for accurate malware detection. Int. J. Distributed Sens. Networks 15(11) (2019) - [j38]Mohamed Amine Ferrag
, Makhlouf Derdour
, Mithun Mukherjee, Abdelouahid Derhab, Leandros A. Maglaras
, Helge Janicke
:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 6(2): 2188-2204 (2019) - [j37]Ayesha Altaf, Haider Abbas
, Faiza Iqbal
, Abdelouahid Derhab:
Trust models of internet of smart things: A survey, open issues, and future directions. J. Netw. Comput. Appl. 137: 93-111 (2019) - [j36]Mohamed Amine Ferrag
, Leandros A. Maglaras
, Abdelouahid Derhab
:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Secur. Commun. Networks 2019: 5452870:1-5452870:20 (2019) - [j35]Abdelouahid Derhab
, Mohamed Guerroumi
, Abdu Gumaei
, Leandros A. Maglaras
, Mohamed Amine Ferrag
, Mithun Mukherjee
, Farrukh Aslam Khan
:
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors 19(14): 3119 (2019) - [j34]Farrukh Aslam Khan
, Ashfaq Hussain Farooqi, Abdelouahid Derhab:
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. J. Supercomput. 75(4): 2221-2242 (2019) - [c29]Mourad Benmalek, Yacine Challal
, Abdelouahid Derhab:
An Improved Key Graph based Key Management Scheme for Smart Grid AMI systems. WCNC 2019: 1-6 - [c28]Mourad Benmalek, Yacine Challal
, Abdelouahid Derhab:
Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges. WETICE 2019: 208-213 - [i5]Leandros A. Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures. CoRR abs/1901.03899 (2019) - [i4]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends. CoRR abs/1901.09374 (2019) - 2018
- [j33]Muneeb Ahmed Sahi, Haider Abbas
, Kashif Saleem
, Xiaodong Yang
, Abdelouahid Derhab, Mehmet A. Orgun
, Mian Muhammad Waseem Iqbal
, Imran Rashid, Asif Yaseen:
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions. IEEE Access 6: 464-478 (2018) - [j32]Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Ahsenali Chaudhry
, Kashif Saleem
, Abdelouahid Derhab, Mehmet A. Orgun
, Rajan Shankaran
, Muhammad Imran, Maruf Pasha
:
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems. IEEE Access 6: 16363-16376 (2018) - [j31]Mourad Benmalek, Yacine Challal
, Abdelouahid Derhab, Abdelmadjid Bouabdallah:
VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems. Comput. Networks 132: 161-179 (2018) - [j30]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24 Supplement: S48-S59 (2018) - [j29]Leandros A. Maglaras, Mohamed Amine Ferrag
, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis:
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. EAI Endorsed Trans. Security Safety 5(16): e1 (2018) - [j28]Muhammad Yaseen, Kashif Saleem
, Mehmet A. Orgun
, Abdelouahid Derhab, Haider Abbas
, Jalal Al-Muhtadi, Mian Muhammad Waseem Iqbal
, Imran Rashid:
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art. Telematics Informatics 35(4): 702-726 (2018) - [c27]Mohamed Belaoued
, Bouchra Guelib, Yasmine Bounaas, Abdelouahid Derhab, Mahmoud Boufaïda:
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers. MLN 2018: 166-180 - [c26]Mohamed Amine Ferrag
, Leandros A. Maglaras
, Abdelouahid Derhab, Abdelaziz Amara Korba:
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices. PAIS 2018: 1-8 - [p1]Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag
, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf:
Vulnerability Assessment of Cyber Security for SCADA Systems. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 59-80 - [i3]Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab, Athanasios V. Vasilakos, Stylianos Rallis, Helge Janicke:
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues. CoRR abs/1803.10281 (2018) - [i2]Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros A. Maglaras, Helge Janicke:
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. CoRR abs/1806.09099 (2018) - 2017
- [j27]Abdelouahid Derhab, Mohamed Guerroumi, Mohamed F. Younis:
Wireless and mobile sensing technologies for the future Internet. Ann. des Télécommunications 72(3-4): 117-118 (2017) - [j26]Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem
, Haider Abbas
, Mehmet A. Orgun
, Mian Muhammad Waseem Iqbal
, Baber Aslam:
A Survey of Authentication Schemes in Telecare Medicine Information Systems. J. Medical Syst. 41(1): 14:1-14:26 (2017) - [j25]Zakaria Gheid, Yacine Challal
, Xun Yi
, Abdelouahid Derhab:
Efficient and privacy-aware multi-party classification protocol for human activity recognition. J. Netw. Comput. Appl. 98: 84-96 (2017) - [j24]Mohamed Guerroumi, Al-Sakib Khan Pathan
, Abdelouahid Derhab, Nadjib Badache, Samira Moussaoui:
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness. Wirel. Pers. Commun. 96(4): 4973-5010 (2017) - [c25]Abdelouahab Amira, Abdelraouf Ouadjaout
, Abdelouahid Derhab, Nadjib Badache:
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications. CODASPY 2017: 139-141 - [i1]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Deep Learning on API Method Sequences. CoRR abs/1712.08996 (2017) - 2016
- [j23]Abdelouahid Derhab, Abdelghani Bouras:
Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 30(3-4): 201-217 (2016) - [j22]Abdelouahid Derhab
, Kashif Saleem
, Jalal Al-Muhtadi
, Mehmet A. Orgun
:
Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices. Comput. Hum. Behav. 59: 9-17 (2016) - [j21]Shaker Alanazi, Kashif Saleem
, Jalal Al-Muhtadi
, Abdelouahid Derhab
:
Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network. Mob. Inf. Syst. 2016: 4853924:1-4853924:19 (2016) - [j20]Kashif Saleem
, Abdelouahid Derhab
, Mehmet A. Orgun
, Jalal Al-Muhtadi
, Joel J. P. C. Rodrigues
, Mohammed Sayim Khalil, Adel Ali Ahmed
:
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks. Sensors 16(4): 460 (2016) - [c24]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Cypider: building community-based cyber-defense infrastructure for android malware detection. ACSAC 2016: 348-362 - [c23]Kashif Saleem
, Khan Zeb, Abdelouahid Derhab, Haider Abbas
, Jalal Al-Muhtadi, Mehmet A. Orgun
, Amjad Gawanmeh
:
Survey on cybersecurity issues in wireless mesh networks based eHealthcare. HealthCom 2016: 1-7 - [c22]Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan
, Nadjib Badache, Samira Moussaoui:
MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks. WCNC 2016: 1-7 - 2015
- [j19]Kashif Saleem
, Abdelouahid Derhab
, Jalal Al-Muhtadi
, Basit Shahzad, Mehmet A. Orgun
:
Secure transfer of environmental data to enhance human decision accuracy. Comput. Hum. Behav. 51: 632-639 (2015) - [j18]Kashif Saleem
, Abdelouahid Derhab, Jalal Al-Muhtadi
, Basit Shahzad:
Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society. Comput. Hum. Behav. 51: 977-985 (2015) - [j17]Kashif Saleem
, Abdelouahid Derhab, Jalal Al-Muhtadi
, Mehmet A. Orgun
:
Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience. Comput. Hum. Behav. 51: 1340-1350 (2015) - [j16]Mohammed B. Abazeed, Kashif Saleem
, Abdelouahid Derhab
, Mehmet A. Orgun
, Norsheila Binti Fisal, Jalal Al-Muhtadi
, Suleiman Zubair
:
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks. Int. J. Distributed Sens. Networks 11: 524038:1-524038:22 (2015) - [j15]AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, Abdelouahid Derhab:
Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks. Int. J. Distributed Sens. Networks 11: 542856:1-542856:13 (2015) - [j14]Abdelouahid Derhab, Abdelghani Bouras
:
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems. Secur. Commun. Networks 8(7): 1193-1212 (2015) - [j13]Miloud Bagaa
, Mohamed F. Younis, Djamel Djenouri
, Abdelouahid Derhab, Nadjib Badache:
Distributed Low-Latency Data Aggregation Scheduling in Wireless Sensor Networks. ACM Trans. Sens. Networks 11(3): 49:1-49:36 (2015) - [c21]Shaker Alanazi, Jalal Al-Muhtadi
, Abdelouahid Derhab, Kashif Saleem
, Afnan N. AlRomi, Hanan S. Alholaibah, Joel J. P. C. Rodrigues:
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. HealthCom 2015: 205-210 - [c20]Kashif Saleem
, Abdelouahid Derhab, Mehmet A. Orgun
, Jalal Al-Muhtadi
:
Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks. ITNG 2015: 234-239 - [c19]Mohamed Guerroumi, Abdelouahid Derhab, Kashif Saleem
:
Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink. ITNG 2015: 307-313 - 2014
- [j12]Miloud Bagaa
, Mohamed F. Younis, Abdelouahid Derhab, Nadjib Badache:
Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN. Comput. Networks 75: 331-350 (2014) - [j11]Miloud Bagaa
, Yacine Challal
, Adlen Ksentini, Abdelouahid Derhab, Nadjib Badache:
Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges. IEEE Commun. Surv. Tutorials 16(3): 1339-1368 (2014) - [j10]Abdelouahid Derhab
, Abdelghani Bouras
, Mustapha Réda Senouci
, Muhammad Imran:
Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c18]Noureddine Lasla
, Abdelouahid Derhab, Abdelraouf Ouadjaout
, Miloud Bagaa
, Yacine Challal
:
SMART: Secure Multi-pAths Routing for wireless sensor neTworks. ADHOC-NOW 2014: 332-345 - [c17]Abdelraouf Ouadjaout
, Noureddine Lasla
, Miloud Bagaa
, Messaoud Doudou, Cherif Zizoua, Mohamed Amine Kafi, Abdelouahid Derhab, Djamel Djenouri
, Nadjib Badache:
DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications. EUSPN/ICTH 2014: 189-195 - [c16]Kashif Saleem
, Abdelouahid Derhab, Jalal Al-Muhtadi
:
Low delay and secure M2M communication mechanism for eHealthcare. Healthcom 2014: 105-110 - [c15]Abdelouahid Derhab, Abdelghani Bouras
, Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang
:
Spam Trapping System: Novel security framework to fight against spam botnets. ICT 2014: 467-471 - [c14]Abdelouahid Derhab, Kashif Saleem
, Ahmed E. Youssef
:
Third line of defense strategy to fight against SMS-based malware in android smartphones. IWCMC 2014: 542-547 - 2013
- [j9]Abdelouahid Derhab, Djamel Djenouri, Jianguo Ding:
Editorial. Int. J. Commun. Networks Distributed Syst. 11(2): 117-119 (2013) - 2012
- [c13]Abdelouahid Derhab, Fatma Ounini, Badis Remli:
MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks. DCOSS 2012: 300-305 - [c12]Miloud Bagaa
, Abdelouahid Derhab, Noureddine Lasla
, Abdelraouf Ouadjaout
, Nadjib Badache:
Semi-structured and unstructured data aggregation scheduling in wireless sensor networks. INFOCOM 2012: 2671-2675 - [c11]Noureddine Lasla
, Abdelouahid Derhab, Abdelraouf Ouadjaout
, Miloud Bagaa
, Adlen Ksentini, Nadjib Badache:
Half-Symmetric Lens based localization algorithm for wireless sensor networks. LCN 2012: 320-323 - 2011
- [c10]Abdelouahid Derhab, Noureddine Lasla
:
Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications. DCOSS 2011: 1-6 - 2010
- [c9]Mohamed Hamdy El-Eliemy
, Abdelouahid Derhab, Birgitta König-Ries:
A Comparison on MANETs' Service Replication Schemes: Interest versus Topology Prediction. WiMo 2010: 202-216
2000 – 2009
- 2009
- [j8]Abdelouahid Derhab, Nadjib Badache:
Data replication protocols for mobile ad-hoc networks: a survey and taxonomy. IEEE Commun. Surv. Tutorials 11(2): 33-51 (2009) - [c8]Mustapha Réda Senouci
, Abdelouahid Derhab, Nadjib Badache:
Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs. ICDCS Workshops 2009: 130-136 - 2008
- [j7]Abdelouahid Derhab, Nadjib Badache:
Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service. Ad Hoc Networks 6(7): 1013-1030 (2008) - [j6]Abdelouahid Derhab, Nadjib Badache:
Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks. J. Parallel Distributed Comput. 68(6): 752-768 (2008) - [j5]Abdelouahid Derhab, Nadjib Badache:
A distributed mutual exclusion algorithm over multi-routing protocol for mobile ad hoc networks. Int. J. Parallel Emergent Distributed Syst. 23(3): 197-218 (2008) - [j4]Abdelouahid Derhab, Nadjib Badache:
A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks. IEEE Trans. Parallel Distributed Syst. 19(7): 926-939 (2008) - [c7]Abdelouahid Derhab:
Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks. ADHOC-NOW 2008: 401-412 - [c6]Abdelouahid Derhab:
SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks. IWSOS 2008: 269-274 - 2007
- [j3]Zakaria Maamar, Qusay H. Mahmoud
, Abdelouahid Derhab:
Enabling ad-hoc collaboration between mobile users in the MESSENGER project. Clust. Comput. 10(1): 67-79 (2007) - [j2]Abdelouahid Derhab, Nadjib Badache:
Mobile Networks A pull-based service replication protocol in mobile ad hoc networks. Eur. Trans. Telecommun. 18(1): 1-11 (2007) - 2006
- [j1]Djamel Djenouri, Abdelouahid Derhab, Nadjib Badache:
Ad Hoc Networks Routing Protocols and Mobility. Int. Arab J. Inf. Technol. 3(2): 126-133 (2006) - [c5]Zakaria Maamar, Qusay H. Mahmoud
, Abdelouahid Derhab:
On Promoting Ad-Hoc Collaboration Among Messengers. AINA (1) 2006: 785-790 - [c4]Abdelouahid Derhab, Nadjib Badache:
Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks. MASS 2006: 668-673 - [c3]Zakaria Maamar, Qusay H. Mahmoud
, Abdelouahid Derhab, Wathiq Mansoor
:
Ad-Hoc Collaboration Between Messengers: Operations and Incentives. MDM 2006: 10 - [c2]Abdelouahid Derhab, Nadjib Badache, Karim Tari, Sihem Sami:
ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks. WASA 2006: 240-251 - 2005
- [c1]Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bouabdallah:
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks. WONS 2005: 236-245