


Остановите войну!
for scientists:
Mohamed Mosbah
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j53]Ameni Chetouane
, Sabra Mabrouk, Imen Jemili, Mohamed Mosbah
:
Vision-based vehicle detection for road traffic congestion classification. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j52]Dhouha Ghrab
, Imen Jemili, Abdelfettah Belghith
, Mohamed Mosbah
:
Context-aware routing framework for duty-cycled wireless sensor networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j51]Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith
:
Towards general Internet of Vehicles networking: Routing protocols survey. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j50]Emna Taktak
, Mohamed Tounsi
, Mohamed Mosbah
, Abdessalem Mnif, Ahmed Hadj Kacem:
A handshake algorithm for scheduling communications in wireless sensor networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [c118]Ibrahim Dahaoui, Mohamed Mosbah, Akka Zemmari:
Distributed Training from Multi-sourced Data. AINA (2) 2022: 339-347 - [c117]Meroua Moussaoui, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
A RAN Slicing Architecture for ITS-G5 Cooperative Intelligent Transport System. CCNC 2022: 727-728 - [e9]Bo Luo, Mohamed Mosbah
, Frédéric Cuppens
, Lotfi Ben Othmane
, Nora Cuppens
, Slim Kallel
:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [e8]Imen Jemili
, Mohamed Mosbah
:
Distributed Computing for Emerging Smart Networks - Third International Workshop, DiCES-N 2022, Bizerte, Tunisia, February 11, 2022, Proceedings. Communications in Computer and Information Science 1564, Springer 2022, ISBN 978-3-030-99003-9 [contents] - 2021
- [j49]Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith
:
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles. Ann. des Télécommunications 76(9-10): 647-664 (2021) - [j48]Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith
, Mohamed Mosbah, Saad A. Al-Ahmadi
:
Cross-layer multipath approach for critical traffic in duty-cycled wireless sensor networks. J. Netw. Comput. Appl. 191: 103154 (2021) - [j47]Robert M. Hierons
, Mohamed Mosbah:
Preface. Theor. Comput. Sci. 880: 138 (2021) - [c116]Emna Taktak, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
High-Level Approach for the Reconfiguration of Distributed Algorithms in Wireless Sensor Networks. AINA (2) 2021: 95-106 - [c115]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A Lightweight Authentication Scheme for SDN-Based Architecture in IoT. AINA (3) 2021: 336-345 - [c114]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
Implementation and Assessment of IEEE 802.11BD for Improved Road Safety. CCNC 2021: 1-6 - [c113]Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
End-to-End Network Slicing for ITS-G5 Vehicular Communications. IWCMC 2021: 266-271 - [c112]Sabri Khamari
, Toufik Ahmed, Mohamed Mosbah:
Edge-based Safety Intersection Assistance Architecture for Connected Vehicles. IWCMC 2021: 272-277 - 2020
- [j46]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j45]Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith
, Mohamed Mosbah:
Cross-layer adaptive multipath routing for multimedia Wireless Sensor Networks under duty cycle mode. Ad Hoc Networks 109: 102292 (2020) - [j44]Takoua Abdellatif
, Mohamed Mosbah:
Efficient monitoring for intrusion detection in wireless sensor networks. Concurr. Comput. Pract. Exp. 32(15) (2020) - [j43]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah:
Modeling and Proving Distributed Algorithms for Dynamic Graphs. Future Gener. Comput. Syst. 108: 751-761 (2020) - [j42]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah:
Vehicle Platooning Systems: Review, Classification and Validation Strategies. Int. J. Networked Distributed Comput. 8(4): 203-213 (2020) - [j41]Abdelhamid Alleg
, Toufik Ahmed
, Mohamed Mosbah
, Raouf Boutaba
:
Joint Diversity and Redundancy for Resilient Service Chain Provisioning. IEEE J. Sel. Areas Commun. 38(7): 1490-1504 (2020) - [c111]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A New SDN Architecture Based on Trust Management and Access Control for IoT. AINA Workshops 2020: 245-254 - [c110]Ameni Chetouane
, Sabra Mabrouk
, Mohamed Mosbah
:
Traffic Congestion Detection: Solutions, Open Issues and Challenges. DiCES-N 2020: 3-22 - [c109]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah:
Towards an Efficient Clustering-Based Algorithm for Emergency Messages Broadcasting. ICCCI 2020: 267-278 - [c108]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah:
Formal specification and verification of a broadcasting protocol: a refinement-based approach. KES 2020: 2858-2867 - [c107]Aymen Abdallah
, Imen Jemili
, Sabra Mabrouk
, Mohamed Mosbah
:
Leveraging GPS Data for Vehicle Maneuver Detection. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 39-54 - [c106]Badreddine Yacine Yacheur
, Toufik Ahmed
, Mohamed Mosbah
:
Analysis and Comparison of IEEE 802.11p and IEEE 802.11bd. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 55-65 - [c105]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith
:
A Unified Smart Mobility System Integrating Terrestrial, Aerial and Marine Intelligent Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 203-214 - [c104]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac:
A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning. NOMS 2020: 1-7 - [c103]Afaf Bouhoute, Mohamed Mosbah, Akka Zemmari, Ismail Berrada:
On the Application of Machine Learning for Cut-in Maneuver Recognition in Platooning Scenarios. VTC Spring 2020: 1-5 - [e7]Imen Jemili
, Mohamed Mosbah
:
Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18, 2020, Proceedings. Communications in Computer and Information Science 1348, Springer 2020, ISBN 978-3-030-65809-0 [contents] - [e6]Imen Jemili
, Mohamed Mosbah
:
Distributed Computing for Emerging Smart Networks - First International Workshop, DiCES-N 2019, Hammamet, Tunisia, October 30, 2019, Revised Selected Papers. Communications in Computer and Information Science 1130, Springer 2020, ISBN 978-3-030-40130-6 [contents]
2010 – 2019
- 2019
- [j40]Vineeta Jain
, Vijay Laxmi
, Manoj Singh Gaur
, Mohamed Mosbah:
ETGuard: Detecting D2D attacks using wireless Evil Twins. Comput. Secur. 83: 389-405 (2019) - [j39]Nadia Chaabouni
, Mohamed Mosbah
, Akka Zemmari
, Cyrille Sauvignac, Parvez Faruki:
Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutorials 21(3): 2671-2701 (2019) - [j38]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah:
Formal Modeling and Verification of a Distributed Algorithm for Constructing Maximal Cliques in Static Networks. Computación y Sistemas 23(4) (2019) - [c102]Rim Negra, Imen Jemili, Abdelfettah Belghith
, Mohamed Mosbah:
MTM-MAC: Medical Traffic Management MAC Protocol for Handling Healthcare Applications in WBANs. ADHOC-NOW 2019: 483-497 - [c101]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari
, Cyrille Sauvignac:
An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning. ADHOC-NOW 2019: 508-523 - [c100]Chahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith
:
VANETs Routing Protocols Survey: Classifications, Optimization Methods and New Trends. DiCES-N@ICTAC 2019: 3-22 - [c99]Ameni Chetouane, Sabra Mabrouk, Imen Jemili, Mohamed Mosbah:
A Comparative Study of Vehicle Detection Methods in a Video Sequence. DiCES-N@ICTAC 2019: 37-53 - [c98]Emna Taktak
, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem
:
Energy Efficient Handshake Algorithm for Wireless Sensor Networks. DiCES-N@ICTAC 2019: 57-76 - [c97]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah:
An Evaluative Review of the Formal Verification for VANET Protocols. IWCMC 2019: 1209-1214 - [c96]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah:
A Comprehensive Survey on Broadcasting Emergency Messages. IWCMC 2019: 1983-1988 - [c95]Rim Negra, Imen Jemili
, Akka Zemmari
, Mohamed Mosbah, Abdelfettah Belghith
, Nesrine Ouled Abdallah:
Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs. SAC 2019: 754-761 - [e5]Akka Zemmari
, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - [e4]Robert M. Hierons, Mohamed Mosbah:
Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31 - November 4, 2019, Proceedings. Lecture Notes in Computer Science 11884, Springer 2019, ISBN 978-3-030-32504-6 [contents] - [i1]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
ETGuard: Detecting D2D Attacks using Wireless Evil Twins. CoRR abs/1903.05843 (2019) - 2018
- [j37]Wafa Ben Jaballah, Mauro Conti, Gilberto Filè, Mohamed Mosbah, Akka Zemmari
:
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119: 66-82 (2018) - [j36]Dhouha Ghrab
, Imen Jemili
, Abdelfettah Belghith
, Mohamed Mosbah:
Context-aware medium access control protocols in wireless sensor networks. Internet Technol. Lett. 1(6) (2018) - [c94]Emna Taktak, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
Distributed Computations in Wireless Sensor Networks by Local Interactions. ADHOC-NOW 2018: 293-304 - [c93]Vineeta Jain
, Vijay Laxmi
, Manoj Singh Gaur, Mohamed Mosbah:
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. ISEA-ISAP 2018: 219-233 - [c92]Rim Negra, Imen Jemili
, Akka Zemmari
, Mohamed Mosbah, Abdelfettah Belghith
:
WBAN Path Loss Based Approach For Human Activity Recognition With Machine Learning Techniques. IWCMC 2018: 470-475 - [c91]Chahrazed Ksouri, Imen Jemili
, Mohamed Mosbah, Abdelfettah Belghith
:
Data Gathering for Internet of Vehicles Safety. IWCMC 2018: 904-909 - [c90]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
Formal Verification Approaches for Distributed Algorithms: A Systematic Literature Review. KES 2018: 1551-1560 - [c89]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
A Formal Approach for Distributed Computing of Maximal Cliques in Dynamic Networks. SEKE 2018: 348-347 - [c88]Emna Taktak
, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
Proving Distributed Algorithms for Wireless Sensor Networks by Combining Refinement and Local Computations. WETICE 2018: 217-222 - 2017
- [j35]Shweta Bhandari
, Wafa Ben Jaballah, Vineeta Jain
, Vijay Laxmi
, Akka Zemmari
, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti:
Android inter-app communication threats and detection techniques. Comput. Secur. 70: 392-421 (2017) - [j34]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah, Dominique Méry, Ahmed Hadj Kacem:
Proving Distributed Coloring of Forests in Dynamic Networks. Computación y Sistemas 21(4) (2017) - [j33]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017) - [j32]Mouna Ktari, Mohamed Mosbah, Ahmed Hadj Kacem:
Leader election and computation of a spanning tree in dynamic distributed networks using local computations and mobile agents. Int. J. Space Based Situated Comput. 7(2): 57-71 (2017) - [j31]Imen Jemili
, Dhouha Ghrab
, Abdelfettah Belghith
, Mohamed Mosbah:
Context-Aware Broadcast in Duty-Cycled Wireless Sensor Networks. Int. J. Semantic Web Inf. Syst. 13(3): 48-67 (2017) - [j30]Mouna Ktari, Mohamed Amine Haddar, Mohamed Mosbah, Ahmed Hadj Kacem:
Maintenance of a Spanning Tree For Dynamic Graphs by Mobile Agents and Local Computations. RAIRO Theor. Informatics Appl. 51(2): 51-70 (2017) - [c87]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah, Dominique Méry, Ahmed Hadj Kacem:
A correct-by-construction approach for proving distributed algorithms in spanning trees. ICIS 2017: 1-6 - [c86]Dhouha Ghrab
, Imen Jemili, Abdelfettah Belghith
, Mohamed Mosbah:
Correlation-Free MultiPath Routing for Multimedia Traffic in Wireless Sensor Networks. ADHOC-NOW 2017: 276-289 - [c85]Mouna Ktari, Mohamed Mosbah, Ahmed Hadj Kacem:
Electing a Leader in Dynamic Networks using Mobile Agents and Local Computations. ANT/SEIT 2017: 351-358 - [c84]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. ANT/SEIT 2017: 553-559 - [c83]Abdelhamid Alleg
, Toufik Ahmed, Mohamed Mosbah, Roberto Riggio
, Raouf Boutaba:
Delay-aware VNF placement and chaining based on a flexible resource allocation approach. CNSM 2017: 1-7 - [c82]Jyoti Gajrani
, Vijay Laxmi
, Meenakshi Tripathi
, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari
, Mohamed Mosbah, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. CRiSIS 2017: 49-65 - [c81]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
Algorithms for Finding Maximal and Maximum Cliques: A Survey. ISDA 2017: 745-754 - [c80]Maha Boussabbeh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah:
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques. SCSS 2017: 96-106 - [c79]Vineeta Jain
, Shweta Bhandari
, Vijay Laxmi
, Manoj Singh Gaur, Mohamed Mosbah:
SniffDroid: Detection of Inter-App Privacy Leaks in Android. TrustCom/BigDataSE/ICESS 2017: 331-338 - [c78]Takoua Abdellatif, Kais Rouis, Mohamed Mosbah:
Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks. WETICE 2017: 54-59 - [e3]Mohamed Mosbah, Michaël Rusinowitch:
SCSS 2017, The 8th International Symposium on Symbolic Computation in Software Science 2017, April 6-9, 2017, Gammarth, Tunisia. EPiC Series in Computing 45, EasyChair 2017 [contents] - 2016
- [j29]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi
:
The impact of malicious nodes positioning on vehicular alert messaging system. Ad Hoc Networks 52: 3-16 (2016) - [j28]Mohamed Tounsi
, Mohamed Mosbah, Dominique Méry:
From Event-B specifications to programs for distributed algorithms. Int. J. Auton. Adapt. Commun. Syst. 9(3/4): 223-242 (2016) - [c77]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A broadcast authentication scheme in IoT environments. AICCSA 2016: 1-6 - [c76]Mouna Ktari, Mohamed Amine Haddar, Mohamed Mosbah, Ahmed Hadj Kacem:
Distributed Computation and Maintenance of a Spanning Tree in Dynamic Networks by Mobile Agents. AINA Workshops 2016: 331-336 - [c75]Allyx Fontaine, Mohamed Mosbah, Mohamed Tounsi
, Akka Zemmari
:
A Fault-Tolerant Handshake Algorithm for Local Computations. AINA Workshops 2016: 475-480 - [c74]Maha Boussabbeh, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
Formal Proofs of Termination Detection for Local Computations by Refinement-Based Compositions. ABZ 2016: 198-212 - [c73]Vineeta Jain
, Manoj Singh Gaur, Vijay Laxmi
, Mohamed Mosbah:
Detection of SQLite Database Vulnerabilities in Android Apps. ICISS 2016: 521-531 - [c72]Dhouha Ghrab
, Imen Jemili
, Abdelfettah Belghith
, Mohamed Mosbah:
NDRECT: Node-disjoint routes establishment for critical traffic in WSNs. IWCMC 2016: 702-707 - [c71]Maha Boussabbeh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah:
Towards a General Framework for Ensuring and Reusing Proofs of Termination Detection in Distributed Computing. PDP 2016: 504-511 - [c70]Dhouha Ghrab
, Imen Jemili
, Abdelfettah Belghith
, Mohamed Mosbah:
Study of context-awareness efficiency applied to duty cycled wireless sensor networks. WCNC 2016: 1-6 - [c69]Imen Jemili
, Hamida Jarraya, Abdelfettah Belghith
, Mohamed Mosbah:
Fast synchronisation protocol with collision handling for wireless ad hoc networks. WCNC 2016: 1-6 - [c68]Faten Fakhfakh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah:
A Refinement-Based Approach for Proving Distributed Algorithms on Evolving Graphs. WETICE 2016: 44-49 - 2015
- [j27]Eve Garnaud, Sofian Maabout, Mohamed Mosbah:
Functional dependencies are helpful for partial materialization of data cubes. Ann. Math. Artif. Intell. 73(1-2): 245-274 (2015) - [j26]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari
:
Lightweight secure group communications for resource constrained devices. Int. J. Space Based Situated Comput. 5(4): 187-200 (2015) - [j25]Chourouk Hammami, Imen Jemili
, Achraf Gazdar, Abdelfettah Belghith
, Mohamed Mosbah:
HLPSP: A Hybrid Live P2P Streaming Protocol. KSII Trans. Internet Inf. Syst. 9(3): 1035-1056 (2015) - [c67]Faten Fakhfakh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah:
A formal pattern for dynamic networks through evolving graphs. AICCSA 2015: 1-4 - [c66]Mouna Ktari, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah:
Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks. AICCSA 2015: 1-7 - [c65]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure authentication mechanism for resource constrained devices. AICCSA 2015: 1-7 - [c64]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi
:
Impact of security threats in vehicular alert messaging systems. ICC Workshops 2015: 2627-2632 - [c63]Nesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah, Akka Zemmari
:
A Totally Distributed Fair Scheduler for Population Protocols by Randomized Handshakes. ICTAC 2015: 290-306 - [c62]Dhouha Ghrab
, Imen Jemili
, Abdelfettah Belghith
, Mohamed Mosbah:
ECAB: An Efficient Context-Aware multi-hop Broadcasting protocol for wireless sensor networks. IWCMC 2015: 1023-1029 - [c61]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
Enhanced LEAP authentication delay for higher immunity against DoS attack. CFIP/NOTERE 2015: 1-6 - [c60]Faten Fakhfakh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah:
Towards a Formal Model for Dynamic Networks Through Refinement and Evolving Graphs. SNPD (revised selected papers) 2015: 227-243 - 2014
- [j24]Wafa Ben Jaballah, Mauro Conti
, Mohamed Mosbah, Claudio E. Palazzi
:
A secure alert messaging system for safe driving. Comput. Commun. 46: 29-42 (2014) - [j23]Rachid Echahed, Annegret Habel, Mohamed Mosbah:
Preface. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 71 (2014) - [j22]Wafa Ben Jaballah, Mauro Conti
, Mohamed Mosbah, Claudio E. Palazzi
:
Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication. IEEE Trans. Intell. Transp. Syst. 15(1): 433-450 (2014) - [c59]Nesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah, Akka Zemmari
:
Greedy Flooding in Redoubtable Sensor Networks. AINA 2014: 899-906 - [c58]Chourouk Hammami, Imen Jemili, Achraf Gazdar, Abdelfettah Belghith
, Mohamed Mosbah:
Hybrid Live P2P Streaming Protocol. ANT/SEIT 2014: 158-165 - [c57]Wahabou Abdou, Nesrine Ouled Abdallah, Mohamed Mosbah:
ViSiDiA: A Java Framework for Designing, Simulating, and Visualizing Distributed Algorithms. DS-RT 2014: 43-46 - [c56]Maha Boussabbeh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah:
Enhancing Proofs of Local Computations through Formal Event-B Modularization. WETICE 2014: 50-55 - 2013
- [j21]Nesrine Ouled Abdallah, Hatem Hadj Kacem
, Mohamed Mosbah, Akka Zemmari
:
Randomized broadcasting in wireless mobile sensor networks. Concurr. Comput. Pract. Exp. 25(2): 203-217 (2013) - [j20]Rachid Echahed, Annegret Habel, Mohamed Mosbah:
Graph Computation Models 2012. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 61 (2013) - [c55]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari
:
Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks. AINA 2013: 598-605 - [c54]Wafa Ben Jaballah, Mauro Conti
, Roberto Di Pietro
, Mohamed Mosbah, Nino Vincenzo Verde:
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. CRiSIS 2013: 1-6 - [c53]Wafa Ben Jaballah, Mauro Conti
, Mohamed Mosbah, Claudio E. Palazzi
:
Secure Verification of Location Claims on a Vehicular Safety Application. ICCCN 2013: 1-7 - [c52]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef:
Performance evaluation of key disclosure delay-based schemes in wireless sensor networks. PerCom Workshops 2013: 566-571 - [c51]Mohamed Tounsi
, Mohamed Mosbah, Dominique Méry:
From Event-B Specifications to Programs for Distributed Algorithms. WETICE 2013: 104-109 - [c50]Vincent Filou, Mohamed Mosbah, Mohamed Tounsi
:
Towards Proved Distributed Algorithms through Refinement, Composition and Local Computations. WETICE 2013: 353-358 - 2012
- [j19]Eve Garnaud, Sofian Maabout, Mohamed Mosbah:
Les dépendances fonctionnelles pour la sélection de vues dans les cubes de données. J. Decis. Syst. 21(1): 71-91 (2012) - [c49]Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga:
Relaxing Time Granularity for Mining Frequent Sequences. EGC (best of volume) 2012: 53-76 - [c48]Asma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga:
Extraction de séquences fréquentes avec intervalles d'incertitude. EGC 2012: 213-224 - [c47]