


Остановите войну!
for scientists:


default search action
Mohamed Mosbah 0001
Person information

- affiliation: University of Bordeaux, Bordeaux INP, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j52]Vineeta Jain
, Ulf Wetzker
, Vijay Laxmi, Manoj Singh Gaur
, Mohamed Mosbah, Dominique Méry
:
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks. IEEE Access 11: 84620-84635 (2023) - [c136]Ibrahim Dahaoui, Mohamed Mosbah, Akka Zemmari:
Distribution of the Training Data Over the Shortest Path Between the Servers. AINA (3) 2023: 351-356 - [c135]Badreddine Yacine Yacheur
, Toufik Ahmed
, Mohamed Mosbah
:
Throughput Enhancement in Hybrid Vehicular Networks Using Deep Reinforcement Learning. ISCC 2023: 938-943 - [c134]Sabri Khamari, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
Adaptive Deep Reinforcement Learning Approach for Service Migration in MEC-Enabled Vehicular Networks. ISCC 2023: 1075-1079 - [c133]Imed Ghnaya, Mohamed Mosbah, Hasnaâ Aniss, Toufik Ahmed:
Multi-Agent Advantage Actor-Critic Learning For Message Content Selection in Cooperative Perception Networks. NOMS 2023: 1-9 - [c132]Rania Swessi
, Zeineb El Khalfi
, Imen Jemili
, Mohamed Mosbah
:
Free-Floating Micro-mobility Smart Redistribution Using Spatio-temporal Demand Forecasting. VNC 2023: 73-80 - [c131]Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Optimized Intelligent Driver Model for a Fluid Traffic Flow and Accidents Avoidance. VTC2023-Spring 2023: 1-5 - [c130]Badreddine Yacine Yacheur, Toufik Ahmed, Mohamed Mosbah:
DRL-Based RAT Selection in a Hybrid Vehicular Communication Network. VTC2023-Spring 2023: 1-5 - [c129]Imed Ghnaya, Hasnaâ Aniss, Toufik Ahmed, Mohamed Mosbah:
A Distributed Double Deep Q-Learning Method for Object Redundancy Mitigation in Vehicular Networks. WCNC 2023: 1-6 - 2022
- [j51]Ameni Chetouane
, Sabra Mabrouk, Imen Jemili, Mohamed Mosbah
:
Vision-based vehicle detection for road traffic congestion classification. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j50]Dhouha Ghrab
, Imen Jemili, Abdelfettah Belghith
, Mohamed Mosbah
:
Context-aware routing framework for duty-cycled wireless sensor networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j49]Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah
, Abdelfettah Belghith
:
Towards general Internet of Vehicles networking: Routing protocols survey. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j48]Emna Taktak
, Mohamed Tounsi
, Mohamed Mosbah
, Abdessalem Mnif, Ahmed Hadj Kacem:
A handshake algorithm for scheduling communications in wireless sensor networks. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j47]Faten Fakhfakh
, Mohamed Tounsi
, Mohamed Mosbah
:
Cybersecurity attacks on CAN bus based vehicles: a review and open challenges. Libr. Hi Tech 40(5): 1179-1203 (2022) - [j46]Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith
:
Hybrid routing for safety data with intermittent V2I connectivity. Veh. Commun. 38: 100519 (2022) - [c128]Ibrahim Dahaoui, Mohamed Mosbah
, Akka Zemmari:
Distributed Training from Multi-sourced Data. AINA (2) 2022: 339-347 - [c127]Meroua Moussaoui, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
A RAN Slicing Architecture for ITS-G5 Cooperative Intelligent Transport System. CCNC 2022: 727-728 - [c126]Imed Ghnaya, Toufik Ahmed, Mohamed Mosbah, Hasnaâ Aniss:
Maximizing Information Usefulness in Vehicular CP Networks Using Actor-Critic Reinforcement Learning. CNSM 2022: 296-302 - [c125]Sabri Khamari, Toufik Ahmed, Mohamed Mosbah:
Efficient Edge Server Placement under Latency and Load Balancing Constraints for Vehicular Networks. GLOBECOM 2022: 4437-4442 - [c124]Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
Proactive C-ITS Decentralized Congestion Control Using LSTM. ICC 2022: 4342-4347 - [c123]Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
A Messaging Strategy based on ITS-G5 for a Bus Blockage Emergency at a Level Crossing. WMNC 2022: 108-112 - [c122]Sabri Khamari, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah:
Green Edge Servers Placement for Intelligent Transport Systems. NoF 2022: 1-8 - [c121]Mohamed Mosbah:
Keynote Speaker 2: Cybersecurity of connected Vehicules. SIN 2022: 1 - [e9]Bo Luo, Mohamed Mosbah
, Frédéric Cuppens
, Lotfi Ben Othmane
, Nora Cuppens
, Slim Kallel
:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [e8]Imen Jemili
, Mohamed Mosbah
:
Distributed Computing for Emerging Smart Networks - Third International Workshop, DiCES-N 2022, Bizerte, Tunisia, February 11, 2022, Proceedings. Communications in Computer and Information Science 1564, Springer 2022, ISBN 978-3-030-99003-9 [contents] - 2021
- [j45]Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah
, Abdelfettah Belghith
:
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles. Ann. des Télécommunications 76(9-10): 647-664 (2021) - [j44]Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith
, Mohamed Mosbah
, Saad A. Al-Ahmadi
:
Cross-layer multipath approach for critical traffic in duty-cycled wireless sensor networks. J. Netw. Comput. Appl. 191: 103154 (2021) - [j43]Robert M. Hierons
, Mohamed Mosbah
:
Preface. Theor. Comput. Sci. 880: 138 (2021) - [c120]Emna Taktak, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem:
High-Level Approach for the Reconfiguration of Distributed Algorithms in Wireless Sensor Networks. AINA (2) 2021: 95-106 - [c119]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah
:
A Lightweight Authentication Scheme for SDN-Based Architecture in IoT. AINA (3) 2021: 336-345 - [c118]Badreddine Yacine Yacheur
, Toufik Ahmed, Mohamed Mosbah
:
Implementation and Assessment of IEEE 802.11BD for Improved Road Safety. CCNC 2021: 1-6 - [c117]Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah
:
End-to-End Network Slicing for ITS-G5 Vehicular Communications. IWCMC 2021: 266-271 - [c116]Sabri Khamari
, Toufik Ahmed, Mohamed Mosbah:
Edge-based Safety Intersection Assistance Architecture for Connected Vehicles. IWCMC 2021: 272-277 - 2020
- [j42]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah
, Mauro Conti
:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j41]Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith
, Mohamed Mosbah
:
Cross-layer adaptive multipath routing for multimedia Wireless Sensor Networks under duty cycle mode. Ad Hoc Networks 109: 102292 (2020) - [j40]Takoua Abdellatif
, Mohamed Mosbah
:
Efficient monitoring for intrusion detection in wireless sensor networks. Concurr. Comput. Pract. Exp. 32(15) (2020) - [j39]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
Modeling and Proving Distributed Algorithms for Dynamic Graphs. Future Gener. Comput. Syst. 108: 751-761 (2020) - [j38]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
Vehicle Platooning Systems: Review, Classification and Validation Strategies. Int. J. Networked Distributed Comput. 8(4): 203-213 (2020) - [j37]Abdelhamid Alleg
, Toufik Ahmed
, Mohamed Mosbah
, Raouf Boutaba
:
Joint Diversity and Redundancy for Resilient Service Chain Provisioning. IEEE J. Sel. Areas Commun. 38(7): 1490-1504 (2020) - [c115]Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah
:
A New SDN Architecture Based on Trust Management and Access Control for IoT. AINA Workshops 2020: 245-254 - [c114]Ameni Chetouane
, Sabra Mabrouk
, Mohamed Mosbah
:
Traffic Congestion Detection: Solutions, Open Issues and Challenges. DiCES-N 2020: 3-22 - [c113]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
Towards an Efficient Clustering-Based Algorithm for Emergency Messages Broadcasting. ICCCI 2020: 267-278 - [c112]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
Formal specification and verification of a broadcasting protocol: a refinement-based approach. KES 2020: 2858-2867 - [c111]Aymen Abdallah
, Imen Jemili
, Sabra Mabrouk
, Mohamed Mosbah
:
Leveraging GPS Data for Vehicle Maneuver Detection. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 39-54 - [c110]Badreddine Yacine Yacheur
, Toufik Ahmed
, Mohamed Mosbah
:
Analysis and Comparison of IEEE 802.11p and IEEE 802.11bd. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 55-65 - [c109]Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah
, Abdelfettah Belghith
:
A Unified Smart Mobility System Integrating Terrestrial, Aerial and Marine Intelligent Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2020: 203-214 - [c108]Nadia Chaabouni, Mohamed Mosbah
, Akka Zemmari, Cyrille Sauvignac:
A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning. NOMS 2020: 1-7 - [c107]Afaf Bouhoute, Mohamed Mosbah
, Akka Zemmari, Ismail Berrada:
On the Application of Machine Learning for Cut-in Maneuver Recognition in Platooning Scenarios. VTC Spring 2020: 1-5 - [e7]Imen Jemili
, Mohamed Mosbah
:
Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18, 2020, Proceedings. Communications in Computer and Information Science 1348, Springer 2020, ISBN 978-3-030-65809-0 [contents] - [e6]Imen Jemili
, Mohamed Mosbah
:
Distributed Computing for Emerging Smart Networks - First International Workshop, DiCES-N 2019, Hammamet, Tunisia, October 30, 2019, Revised Selected Papers. Communications in Computer and Information Science 1130, Springer 2020, ISBN 978-3-030-40130-6 [contents]
2010 – 2019
- 2019
- [j36]Vineeta Jain
, Vijay Laxmi
, Manoj Singh Gaur
, Mohamed Mosbah
:
ETGuard: Detecting D2D attacks using wireless Evil Twins. Comput. Secur. 83: 389-405 (2019) - [j35]Nadia Chaabouni
, Mohamed Mosbah
, Akka Zemmari
, Cyrille Sauvignac, Parvez Faruki:
Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutorials 21(3): 2671-2701 (2019) - [j34]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
Formal Modeling and Verification of a Distributed Algorithm for Constructing Maximal Cliques in Static Networks. Computación y Sistemas 23(4) (2019) - [c106]Rim Negra, Imen Jemili, Abdelfettah Belghith
, Mohamed Mosbah
:
MTM-MAC: Medical Traffic Management MAC Protocol for Handling Healthcare Applications in WBANs. ADHOC-NOW 2019: 483-497 - [c105]Nadia Chaabouni, Mohamed Mosbah
, Akka Zemmari
, Cyrille Sauvignac:
An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning. ADHOC-NOW 2019: 508-523 - [c104]Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah
, Abdelfettah Belghith
:
VANETs Routing Protocols Survey: Classifications, Optimization Methods and New Trends. DiCES-N@ICTAC 2019: 3-22 - [c103]Ameni Chetouane, Sabra Mabrouk, Imen Jemili, Mohamed Mosbah
:
A Comparative Study of Vehicle Detection Methods in a Video Sequence. DiCES-N@ICTAC 2019: 37-53 - [c102]Emna Taktak
, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem
:
Energy Efficient Handshake Algorithm for Wireless Sensor Networks. DiCES-N@ICTAC 2019: 57-76 - [c101]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
An Evaluative Review of the Formal Verification for VANET Protocols. IWCMC 2019: 1209-1214 - [c100]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
:
A Comprehensive Survey on Broadcasting Emergency Messages. IWCMC 2019: 1983-1988 - [c99]Rim Negra, Imen Jemili
, Akka Zemmari
, Mohamed Mosbah
, Abdelfettah Belghith
, Nesrine Ouled Abdallah:
Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs. SAC 2019: 754-761 - [e5]Akka Zemmari
, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - [e4]Robert M. Hierons, Mohamed Mosbah:
Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31 - November 4, 2019, Proceedings. Lecture Notes in Computer Science 11884, Springer 2019, ISBN 978-3-030-32504-6 [contents] - [i1]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
ETGuard: Detecting D2D Attacks using Wireless Evil Twins. CoRR abs/1903.05843 (2019) - 2018
- [j33]Wafa Ben Jaballah, Mauro Conti, Gilberto Filé, Mohamed Mosbah
, Akka Zemmari
:
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119: 66-82 (2018) - [j32]Dhouha Ghrab
, Imen Jemili
, Abdelfettah Belghith
, Mohamed Mosbah:
Context-aware medium access control protocols in wireless sensor networks. Internet Technol. Lett. 1(6) (2018) - [c98]Emna Taktak, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem:
Distributed Computations in Wireless Sensor Networks by Local Interactions. ADHOC-NOW 2018: 293-304 - [c97]Vineeta Jain
, Vijay Laxmi
, Manoj Singh Gaur, Mohamed Mosbah
:
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. ISEA-ISAP 2018: 219-233 - [c96]Rim Negra, Imen Jemili
, Akka Zemmari
, Mohamed Mosbah
, Abdelfettah Belghith
:
WBAN Path Loss Based Approach For Human Activity Recognition With Machine Learning Techniques. IWCMC 2018: 470-475 - [c95]Chahrazed Ksouri
, Imen Jemili
, Mohamed Mosbah
, Abdelfettah Belghith
:
Data Gathering for Internet of Vehicles Safety. IWCMC 2018: 904-909 - [c94]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem:
Formal Verification Approaches for Distributed Algorithms: A Systematic Literature Review. KES 2018: 1551-1560 - [c93]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah, Ahmed Hadj Kacem:
A Formal Approach for Distributed Computing of Maximal Cliques in Dynamic Networks. SEKE 2018: 348-347 - [c92]Emna Taktak
, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem:
Proving Distributed Algorithms for Wireless Sensor Networks by Combining Refinement and Local Computations. WETICE 2018: 217-222 - 2017
- [j31]Shweta Bhandari
, Wafa Ben Jaballah, Vineeta Jain
, Vijay Laxmi
, Akka Zemmari
, Manoj Singh Gaur, Mohamed Mosbah
, Mauro Conti:
Android inter-app communication threats and detection techniques. Comput. Secur. 70: 392-421 (2017) - [j30]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
, Dominique Méry, Ahmed Hadj Kacem:
Proving Distributed Coloring of Forests in Dynamic Networks. Computación y Sistemas 21(4) (2017) - [j29]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah
:
A secure electric energy management in smart home. Int. J. Commun. Syst. 30(17) (2017) - [j28]Mouna Ktari, Mohamed Mosbah, Ahmed Hadj Kacem:
Leader election and computation of a spanning tree in dynamic distributed networks using local computations and mobile agents. Int. J. Space Based Situated Comput. 7(2): 57-71 (2017) - [j27]Imen Jemili
, Dhouha Ghrab
, Abdelfettah Belghith
, Mohamed Mosbah
:
Context-Aware Broadcast in Duty-Cycled Wireless Sensor Networks. Int. J. Semantic Web Inf. Syst. 13(3): 48-67 (2017) - [j26]Mouna Ktari, Mohamed Amine Haddar, Mohamed Mosbah
, Ahmed Hadj Kacem:
Maintenance of a Spanning Tree For Dynamic Graphs by Mobile Agents and Local Computations. RAIRO Theor. Informatics Appl. 51(2): 51-70 (2017) - [c91]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
, Dominique Méry, Ahmed Hadj Kacem:
A correct-by-construction approach for proving distributed algorithms in spanning trees. ICIS 2017: 1-6 - [c90]Dhouha Ghrab
, Imen Jemili, Abdelfettah Belghith
, Mohamed Mosbah
:
Correlation-Free MultiPath Routing for Multimedia Traffic in Wireless Sensor Networks. ADHOC-NOW 2017: 276-289 - [c89]Mouna Ktari, Mohamed Mosbah
, Ahmed Hadj Kacem:
Electing a Leader in Dynamic Networks using Mobile Agents and Local Computations. ANT/SEIT 2017: 351-358 - [c88]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah
:
An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. ANT/SEIT 2017: 553-559 - [c87]Abdelhamid Alleg
, Toufik Ahmed, Mohamed Mosbah
, Roberto Riggio
, Raouf Boutaba:
Delay-aware VNF placement and chaining based on a flexible resource allocation approach. CNSM 2017: 1-7 - [c86]Jyoti Gajrani
, Vijay Laxmi
, Meenakshi Tripathi
, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari
, Mohamed Mosbah
, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. CRiSIS 2017: 49-65 - [c85]Faten Fakhfakh, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem:
Algorithms for Finding Maximal and Maximum Cliques: A Survey. ISDA 2017: 745-754 - [c84]Maha Boussabbeh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah:
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques. SCSS 2017: 96-106 - [c83]Vineeta Jain
, Shweta Bhandari
, Vijay Laxmi
, Manoj Singh Gaur, Mohamed Mosbah
:
SniffDroid: Detection of Inter-App Privacy Leaks in Android. TrustCom/BigDataSE/ICESS 2017: 331-338 - [c82]Takoua Abdellatif, Kais Rouis, Mohamed Mosbah
:
Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks. WETICE 2017: 54-59 - [e3]Mohamed Mosbah, Michaël Rusinowitch:
SCSS 2017, The 8th International Symposium on Symbolic Computation in Software Science 2017, April 6-9, 2017, Gammarth, Tunisia. EPiC Series in Computing 45, EasyChair 2017 [contents] - 2016
- [j25]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah
, Claudio E. Palazzi
:
The impact of malicious nodes positioning on vehicular alert messaging system. Ad Hoc Networks 52: 3-16 (2016) - [j24]Mohamed Tounsi
, Mohamed Mosbah
, Dominique Méry:
From Event-B specifications to programs for distributed algorithms. Int. J. Auton. Adapt. Commun. Syst. 9(3/4): 223-242 (2016) - [c81]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah
:
A broadcast authentication scheme in IoT environments. AICCSA 2016: 1-6 - [c80]Mouna Ktari, Mohamed Amine Haddar, Mohamed Mosbah
, Ahmed Hadj Kacem:
Distributed Computation and Maintenance of a Spanning Tree in Dynamic Networks by Mobile Agents. AINA Workshops 2016: 331-336 - [c79]Allyx Fontaine, Mohamed Mosbah
, Mohamed Tounsi
, Akka Zemmari
:
A Fault-Tolerant Handshake Algorithm for Local Computations. AINA Workshops 2016: 475-480 - [c78]Maha Boussabbeh, Mohamed Tounsi
, Mohamed Mosbah
, Ahmed Hadj Kacem:
Formal Proofs of Termination Detection for Local Computations by Refinement-Based Compositions. ABZ 2016: 198-212 - [c77]Vineeta Jain
, Manoj Singh Gaur, Vijay Laxmi
, Mohamed Mosbah
:
Detection of SQLite Database Vulnerabilities in Android Apps. ICISS 2016: 521-531 - [c76]Dhouha Ghrab
, Imen Jemili
, Abdelfettah Belghith
, Mohamed Mosbah
:
NDRECT: Node-disjoint routes establishment for critical traffic in WSNs. IWCMC 2016: 702-707 - [c75]Maha Boussabbeh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah
:
Towards a General Framework for Ensuring and Reusing Proofs of Termination Detection in Distributed Computing. PDP 2016: 504-511 - [c74]Dhouha Ghrab
, Imen Jemili
, Abdelfettah Belghith
, Mohamed Mosbah
:
Study of context-awareness efficiency applied to duty cycled wireless sensor networks. WCNC 2016: 1-6 - [c73]Imen Jemili
, Hamida Jarraya, Abdelfettah Belghith
, Mohamed Mosbah
:
Fast synchronisation protocol with collision handling for wireless ad hoc networks. WCNC 2016: 1-6 - [c72]Faten Fakhfakh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah
:
A Refinement-Based Approach for Proving Distributed Algorithms on Evolving Graphs. WETICE 2016: 44-49 - 2015
- [j23]Eve Garnaud, Sofian Maabout, Mohamed Mosbah
:
Functional dependencies are helpful for partial materialization of data cubes. Ann. Math. Artif. Intell. 73(1-2): 245-274 (2015) - [j22]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari
:
Lightweight secure group communications for resource constrained devices. Int. J. Space Based Situated Comput. 5(4): 187-200 (2015) - [j21]Chourouk Hammami, Imen Jemili
, Achraf Gazdar, Abdelfettah Belghith
, Mohamed Mosbah
:
HLPSP: A Hybrid Live P2P Streaming Protocol. KSII Trans. Internet Inf. Syst. 9(3): 1035-1056 (2015) - [c71]Faten Fakhfakh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah
:
A formal pattern for dynamic networks through evolving graphs. AICCSA 2015: 1-4 - [c70]Mouna Ktari, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah
:
Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks. AICCSA 2015: 1-7 - [c69]Bacem Mbarek
, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah
:
A secure authentication mechanism for resource constrained devices. AICCSA 2015: 1-7 - [c68]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah
, Claudio E. Palazzi
:
Impact of security threats in vehicular alert messaging systems. ICC Workshops 2015: 2627-2632 - [c67]Nesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah
, Akka Zemmari
:
A Totally Distributed Fair Scheduler for Population Protocols by Randomized Handshakes. ICTAC 2015: 290-306 - [c66]