default search action
Asma Adnane
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2008
- [b1]Hassiba Asmaa Adnane:
La confiance dans le routage Ad hoc : étude du protocole OLSR. (Trust in adhoc networks : study of the OLSR protocol). University of Rennes 1, France, 2008
Journal Articles
- 2024
- [j11]Mohammad Arafah, Iain Phillips, Asma Adnane:
Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection. IET Networks 13(1): 28-44 (2024) - [j10]Abdessalem Mohamed Hadjkouider, Chaker Abdelaziz Kerrache, Ahmed Korichi, Yesin Sahraoui, Carlos T. Calafate, Sahraoui Dhelim, Asma Adnane:
A Review of Service Selection Strategies in Mobile IoT Networks. IEEE Open J. Commun. Soc. 5: 3229-3244 (2024) - 2022
- [j9]Nabil Kerkacha, Naima Hadj-Said, Noureddine Chaib, Asma Adnane, Adda Ali-Pacha:
Enhancing QoS in Privacy Based Vehicular Communication. Ad Hoc Sens. Wirel. Networks 52(3-4): 273-295 (2022) - [j8]Anissa Cheriguene, Taieb Kabache, Asma Adnane, Chaker Abdelaziz Kerrache, Farhan Ahmad:
On the Use of Blockchain Technology for Education During Pandemics. IT Prof. 24(2): 52-61 (2022) - 2020
- [j7]Farhan Ahmad, Fatih Kurugollu, Asma Adnane, Rasheed Hussain, Fatima Hussain:
MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles. IEEE Internet Things J. 7(4): 3310-3322 (2020) - [j6]Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Boubakr Nour, Asma Adnane, Rasheed Hussain:
DeepDist: A Deep-Learning-Based IoV Framework for Real-Time Objects and Distance Violation Detection. IEEE Internet Things Mag. 3(3): 30-34 (2020) - 2018
- [j5]Farhan Ahmad, Virginia N. L. Franqueira, Asma Adnane:
TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks. IEEE Access 6: 28643-28660 (2018) - [j4]Farhan Ahmad, Asma Adnane, Virginia N. L. Franqueira, Fatih Kurugollu, Lu Liu:
Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies. Sensors 18(11): 4040 (2018) - 2017
- [j3]Yasir Mehmood, Farhan Ahmad, Ibrar Yaqoob, Asma Adnane, Muhammad Imran, Sghaier Guizani:
Internet-of-Things-Based Smart Cities: Recent Advances and Challenges. IEEE Commun. Mag. 55(9): 16-24 (2017) - 2013
- [j2]Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior:
Trust-based security for the OLSR routing protocol. Comput. Commun. 36(10-11): 1159-1171 (2013) - 2011
- [j1]Jiazi Yi, Asmaa Adnane, Sylvain David, Benoît Parrein:
Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Networks 9(1): 28-47 (2011)
Conference and Workshop Papers
- 2022
- [c14]Nicholas Topman, Asma Adnane:
Mobile applications for connected cars: Security analysis and risk assessment. NOMS 2022: 1-6 - 2021
- [c13]Nabil Kerkacha, Naima Hadj-Said, Noureddine Chaib, Asma Adnane, Adda Ali-Pacha:
Impact of Silent Periods on Pseudonym Schemes. SSD 2021: 79-85 - 2019
- [c12]Farhan Ahmad, Asma Adnane, Chaker Abdelaziz Kerrache, Fatih Kurugollu, Iain Phillips:
On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks. AICCSA 2019: 1-7 - [c11]Farhan Ahmad, Asma Adnane, Fatih Kurugollu, Rasheed Hussain:
A Comparative Analysis of Trust Models for Safety Applications in IoT-enabled Vehicular Networks. Wireless Days 2019: 1-8 - 2017
- [c10]Farhan Ahmad, Jordan Hall, Asma Adnane, Virginia N. L. Franqueira:
Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network. iThings/GreenCom/CPSCom/SmartData 2017: 44-52 - 2016
- [c9]Farhan Ahmad, Asma Adnane:
A Novel Context-Based Risk Assessment Approach in Vehicular Networks. AINA Workshops 2016: 466-474 - 2015
- [c8]Michael Loughlin, Asma Adnane:
Privacy and Trust in Smart Camera Sensor Networks. ARES 2015: 244-248 - [c7]Farhan Ahmad, Muhammad Kazim, Asma Adnane, Abir Awad:
Vehicular Cloud Networks: Architecture, Applications and Security Issues. UCC 2015: 571-576 - 2014
- [c6]Qasim M. Alriyami, Asma Adnane, Anthony Kim Smith:
Evaluation criterias for trust management in vehicular ad-hoc networks (VANETs). ICCVE 2014: 118-123 - 2009
- [c5]Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior:
Trust-Based Countermeasures for Securing OLSR Protocol. CSE (2) 2009: 745-752 - 2008
- [c4]Asmaa Adnane, Rafael T. de Sousa Jr., Christophe Bidan, Ludovic Mé:
Autonomic trust reasoning enables misbehavior detection in OLSR. SAC 2008: 2006-2013 - [c3]Asmaa Adnane, Christophe Bidan, Rafael T. de Sousa Jr.:
Effectiveness of Trust Reasoning for Attack Detection in OLSR. WOSIS 2008: 151-157 - 2007
- [c2]Asmaa Adnane, Rafael Timóteo de Sousa Júnior, Christophe Bidan, Ludovic Mé:
Analysis of the implicit trust within the OLSR protocol. IFIPTM 2007: 75-90 - [c1]Asmaa Adnane, Rafael T. de Sousa Jr., Christophe Bidan, Ludovic Mé:
Integrating trust reasonings into node behavior in olsr. Q2SWinet 2007: 152-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint