default search action
Lynda Mokdad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad:
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments. Internet Things 25: 101021 (2024) - [j59]Mi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau:
Probabilistic performance evaluation of the class-A device in LoRaWAN protocol on the MAC layer. Perform. Evaluation 166: 102446 (2024) - [j58]Mi Chen, Jalel Ben-Othman, Lynda Mokdad:
Greedy Behavior Detection With Machine Learning for LoRaWAN Network. IEEE Trans. Netw. Serv. Manag. 21(3): 2731-2740 (2024) - [c109]Mohamed Redha Bouakouk, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
AOF-RPL: Towards an MCDM Based Adaptive Objective Function in RPL. WINCOM 2024: 1-6 - 2023
- [j57]Sooeon Lee, Seungheyon Lee, Yumin Choi, Jalel Ben-Othman, Lynda Mokdad, Kyungkoo Jun, Hyunbum Kim:
Affective Surveillance Management in Virtual Emotion Based Smart Complex Infrastructure. IEEE Commun. Mag. 61(10): 62-68 (2023) - [j56]Seungheyon Lee, Sooeon Lee, Yumin Choi, Jalel Ben-Othman, Lynda Mokdad, Hyunbum Kim:
Time Varied Self-Reliance Aerial Ground Traffic Monitoring System With Pre-Recognition Collision Avoidance. IEEE Commun. Lett. 27(5): 1477-1480 (2023) - [j55]Mi Chen, Jalel Ben-Othman, Lynda Mokdad:
Novel Denial-of-Service Attacks Against LoRaWAN on MAC Layer. IEEE Commun. Lett. 27(11): 3123-3126 (2023) - [j54]Mi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau:
Dynamic Parameter Allocation With Reinforcement Learning for LoRaWAN. IEEE Internet Things J. 10(12): 10250-10265 (2023) - [j53]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad:
Intelligent Terrestrial and Non-Terrestrial Vehicular Networks with Green AI and Red AI Perspectives. Sensors 23(2): 806 (2023) - [j52]Jalel Ben-Othman, Lynda Mokdad:
Performance analysis to evaluate overtaking behavior on highways. Simul. Model. Pract. Theory 124: 102721 (2023) - [j51]Sooeon Lee, Seungheyon Lee, Yumin Choi, Jalel Ben-Othman, Lynda Mokdad, Kwang-il Hwang, Hyunbum Kim:
Task-Oriented Surveillance Framework for Virtual Emotion Informatics in Polygon Spaces. IEEE Wirel. Commun. 30(3): 104-111 (2023) - [c108]Mi Chen, Jalel Ben-Othman, Lynda Mokdad:
Intelligent Urban Expressway Managing Architecture Using LoRaWAN and Edge Computing. GLOBECOM 2023: 758-763 - [c107]Mi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau:
Probabilistic Model Checking for Unconfirmed Transmission in LoRaWAN on the MAC Layer. GLOBECOM 2023: 2457-2462 - [c106]Mi Chen, Lynda Mokdad, Jalel Ben-Othman:
Robustness and Resilience of LoRaWAN Facing Greedy Behaviors on the MAC Layer. ICC 2023: 4737-4742 - [c105]Abdel Razak Hamadou Adamou, Jalel Ben-Othman, Lynda Mokdad, Ali Benzerbadj:
Enhancing Roundabout Performance Measures through a New Generic Simulink-Based Simulator. ICICM 2023: 1-8 - [c104]Mi Chen, Lynda Mokdad, Jalel Ben-Othman:
MELoNS - A Modular and Extendable Simulator for LoRaWAN Network. IWCMC 2023: 923-928 - [c103]Jalel Ben-Othman, Lynda Mokdad:
Analytical Study for Vehicle Mobility Modeling. WINCOM 2023: 1-6 - 2022
- [j50]Abdelkrim Abdelli, Walid Serrai, Lynda Mokdad:
A novel and efficient index based web service discovery approach. Comput. Stand. Interfaces 80: 103586 (2022) - [j49]Meriem Achir, Abdelkrim Abdelli, Lynda Mokdad, Jalel Benothman:
Service discovery and selection in IoT: A survey and a taxonomy. J. Netw. Comput. Appl. 200: 103331 (2022) - [j48]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Paolo Bellavista:
A Virtual Emotion Detection Architecture With Two-Way Enabled Delay Bound toward Evolutional Emotion-Based IoT Services. IEEE Trans. Mob. Comput. 21(4): 1172-1181 (2022) - [c102]Mi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau:
LoRaLOFT-A Local Outlier Factor-based Malicious Nodes detection Method on MAC Layer for LoRaWAN. GLOBECOM 2022: 2026-2031 - [c101]Mi Chen, Lynda Mokdad, Cedric Charmois, Jalel Ben-Othman, Jean-Michel Fourneau:
An MDP model-based initial strategy prediction method for LoRaWAN. ICC 2022: 4836-4841 - [c100]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman:
Dealing with complex routing requirements using an MCDM based approach. IWCMC 2022: 1256-1261 - [i2]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman:
Dealing with complex routing requirements using an MCDM based approach. CoRR abs/2204.01876 (2022) - [i1]Meriem Achir, Abdelkrim Abdelli, Lynda Mokdad:
Distributed architecture for resource description and discovery in the IoT. CoRR abs/2209.10973 (2022) - 2021
- [j47]Lynda Mokdad, Jean-Michel Fourneau, Abdelkrim Abdelli, Jalel Ben-Othman:
Performance evaluation of a solution for composite service selection problem with multiple consumers. Simul. Model. Pract. Theory 109: 102271 (2021) - [c99]Mi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau:
STEPS - Score Table based Evaluation and Parameters Surfing approach of LoRaWAN. GLOBECOM 2021: 1-6 - [c98]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
ODM-RPL: Optimized Dual MOP RPL. ISCC 2021: 1-6 - [c97]Mi Chen, Lynda Mokdad, Jalel Ben-Othman, Jean-Michel Fourneau:
MULANE - A Lightweight Extendable Agent-oriented LoRaWAN Simulator with GUI. ISCC 2021: 1-6 - 2020
- [j46]Abdelkrim Abdelli, Lynda Mokdad, Youcef Hammal:
Dealing with value constraints in decision making using MCDM methods. J. Comput. Sci. 44: 101154 (2020) - [j45]Youcef Hammal, Khadidja Salah-Mansour, Abdelkrim Abdelli, Lynda Mokdad:
Formal techniques for consistency checking of orchestrations of semantic Web services. J. Comput. Sci. 44: 101165 (2020) - [j44]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Kiho Lim:
CONTVERB: Continuous Virtual Emotion Recognition Using Replaceable Barriers for Intelligent Emotion-Based IoT Services and Applications. IEEE Netw. 34(5): 269-275 (2020) - [j43]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Junggab Son, Chunguo Li:
Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices. IEEE Netw. 34(6): 288-294 (2020) - [j42]El Habib Boudjema, Sergey Verlan, Lynda Mokdad, Christèle Faure:
VYPER: Vulnerability detection in binary code. Secur. Priv. 3(2) (2020) - [j41]Safae Lhazmir, Omar Ait Oualhaj, Abdellatif Kobbane, Lynda Mokdad:
A decision-making analysis in UAV-enabled wireless power transfer for IoT networks. Simul. Model. Pract. Theory 103: 102102 (2020) - [c96]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
Survey on the Cloud-IoT paradigms: Taxonomy and architectures. ISCC 2020: 1-6 - [c95]Meriem Achir, Abdelkrim Abdelli, Lynda Mokdad:
A taxonomy of service discovery approaches in IoT. WINCOM 2020: 1-6
2010 – 2019
- 2019
- [j40]Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Ashref Serrai:
How to deal with QoS value constraints in MCDM based Web service selection. Concurr. Comput. Pract. Exp. 31(24) (2019) - [j39]Hyunbum Kim, Jalel Ben-Othman, Sungrae Cho, Lynda Mokdad:
A Framework for IoT-Enabled Virtual Emotion Detection in Advanced Smart Cities. IEEE Netw. 33(5): 142-148 (2019) - [j38]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad:
UDiPP: A Framework for Differential Privacy Preserving Movements of Unmanned Aerial Vehicles in Smart Cities. IEEE Trans. Veh. Technol. 68(4): 3933-3943 (2019) - [c94]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Garrett Neilson, Paolo Bellavista:
Delay-Bounded Virtual Emotion Recognition Using IoT Barriers in Advanced Smart Environment. GLOBECOM 2019: 1-6 - [c93]Lynda Mokdad, Jean-Michel Fourneau, Abdelkrim Abdelli:
Performance Evaluation of the QoS Aware Web Service Composition with Communities of Consumers. GLOBECOM 2019: 1-6 - [c92]Youcef Hammal, Khadidja Salah-Mansour, Abdelkrim Abdelli, Lynda Mokdad:
Formal Approach for Compatibility Checking of Orchestrations of Composite Semantic Web Services. ISCC 2019: 1004-1009 - [c91]Khadidja Salah-Mansour, Youcef Hammal, Lynda Mokdad:
Formal specification and validation of refinement from WS-CDL to BPEL. ISCC 2019: 1016-1021 - [c90]Abdelkrim Abdelli, Youcef Hammal, Lynda Mokdad:
ISOCOV: a new MCDM method to handle value constraints in Web service selection. ISCC 2019: 1022-1027 - [c89]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Kiho Lim:
A Seamless Virtual Emotion System with Replaceable Detection toward Proper Emotion-based IoT Services. ISCC 2019: 1051-1055 - 2018
- [j37]Hyunbum Kim, Lynda Mokdad, Jalel Ben-Othman:
Designing UAV Surveillance Frameworks for Smart City and Extensive Ocean with Differential Perspectives. IEEE Commun. Mag. 56(4): 98-104 (2018) - [j36]Djamila Bendouda, Lynda Mokdad, Hafid Haffaf:
Exploiting node mobility for fault management in RPL-based wireless sensor networks. Int. J. High Perform. Comput. Netw. 12(1): 26-38 (2018) - [j35]El Habib Boudjema, Christèle Faure, Mathieu Sassolas, Lynda Mokdad:
Detection of security vulnerabilities in C language applications. Secur. Priv. 1(1) (2018) - [j34]Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman, Youcef Hammal:
Dealing with a non green behaviour in WSN. Simul. Model. Pract. Theory 84: 124-142 (2018) - [c88]Bouchaib Assila, Abdellatif Kobbane, Mohammed El Koutbi, Jalel Ben-Othman, Lynda Mokdad:
Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios. GLOBECOM 2018: 1-6 - [c87]Hyunbum Kim, Jalel Ben-Othman, Sungrae Cho, Lynda Mokdad:
On Virtual Emotion Barrier in Internet of Things. ICC 2018: 1-6 - [c86]Djamel Mansouri, Lynda Mokdad, Jalel Ben-Othman, Malika Ioualalen:
Modeling Accordion Method Using SAN. ICC 2018: 1-6 - [c85]Haroun Benkaouha, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad:
Failure Detection in MANETs based on geographical repartition of nodes. ISCC 2018: 1-6 - 2017
- [j33]Quentin Monnet, Lynda Mokdad, Paolo Ballarini, Youcef Hammal, Jalel Ben-Othman:
DoS detection in WSNs: Energy-efficient methods for selecting monitoring nodes. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j32]Haroun Benkaouha, Nadjib Badache, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
A novel hybrid protocol of checkpointing and rollback recovery for flat MANETs. Int. J. Auton. Adapt. Commun. Syst. 10(1): 114-138 (2017) - [j31]Djamel Mansouri, Lynda Mokdad, Jalel Ben-Othman, Malika Ioualalen:
Dynamic and adaptive detection method for flooding in wireless sensor networks. Int. J. Commun. Syst. 30(12) (2017) - [j30]Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Youcef Hammal:
Towards an efficient and a more accurate web service selection using MCDM methods. J. Comput. Sci. 22: 253-267 (2017) - [j29]Mohamed Amine Kafi, Jalel Ben-Othman, Lynda Mokdad, Nadjib Badache:
Performance analysis and evaluation of REFIACC using queuing networks. Simul. Model. Pract. Theory 71: 15-26 (2017) - [j28]Richard Werner Nelem Pazzi, Azzedine Boukerche, Robson Eduardo De Grande, Lynda Mokdad:
A clustered trail-based data dissemination protocol for improving the lifetime of duty cycle enabled wireless sensor networks. Wirel. Networks 23(1): 177-192 (2017) - [c84]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad:
On differential privacy-preserving movements of unmanned aerial vehicles. ICC 2017: 1-6 - [c83]Lynda Mokdad, Nawel Gharbi, Jalel Ben-Othman:
On the applicability of SAN in modeling and analyzing a Priority Queue Management based congestion control for WMSNs. ICC 2017: 1-6 - [c82]Quentin Monnet, Mathieu Sassolas, Lynda Mokdad:
Modeling DoS attacks in WSNs with quantitative games. ICC 2017: 1-6 - [c81]Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Ashref Serrai:
Dealing with user constraints in MCDM based web service selection. ISCC 2017: 158-163 - [c80]Samy Hafidi, Nawel Gharbi, Lynda Mokdad:
Queuing and service management for congestion control in wireless sensor networks using Markov Chains. ISCC 2017: 176-181 - [c79]Hyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Sungrae Cho, Paolo Bellavista:
On collision-free reinforced barriers for multi domain IoT with heterogeneous UAVs. UEMCON 2017: 466-471 - [c78]Jean-Michel Fourneau, Lynda Mokdad, Jalel Ben-Othman, Abdelkrim Abdelli:
Admission Control Based on WRR in WiMAX Networks. WCNC 2017: 1-6 - [c77]Mohamed Amine Kafi, Jalel Ben-Othman, Lynda Mokdad, Jean-Michel Fourneau, Nadjib Badache:
REFIACC Scheme Evaluation Using Analytical Modeling. WCNC 2017: 1-6 - 2016
- [j27]Haroun Benkaouha, Abdelli Abdelkrim, Jalel Ben-Othman, Lynda Mokdad:
Towards an efficient failure detection in MANETs. Wirel. Commun. Mob. Comput. 16(17): 2939-2955 (2016) - [c76]Leila Charabi, Nawel Gharbi, Jalel Ben-Othman, Lynda Mokdad:
Call Admission Control in Small Cell Networks with Retrials and Guard Channels. GLOBECOM 2016: 1-6 - [c75]Haroun Benkaouha, Abdelli Abdelkrim, Mohamed Guerroumi, Jalel Ben-Othman, Lynda Mokdad:
EAFD, a failure detector for clustered WSN. ICC 2016: 1-6 - [c74]Lynda Mokdad, Jalel Ben-Othman, Paolo Ballarini:
Stochastic models for IEEE 802.11p. ISCC 2016: 74-78 - [c73]Walid Serrai, Abdelli Abdelkrim, Lynda Mokdad, Youcef Hammal:
An efficient approach for Web service selection. ISCC 2016: 167-172 - [c72]Haroun Benkaouha, Abdelli Abdelkrim, Jalel Ben-Othman, Youcef Zaffoune, Lynda Mokdad:
Distributed implementation of a stable storage for MANET checkpointing protocols. IWCMC 2016: 672-677 - 2015
- [j26]Youcef Hammal, Jalel Ben-Othman, Lynda Mokdad, Abdelkrim Abdelli:
Formal Modeling of Greedy Nodes in 802.15.4 WSN. ICT Express 1(1): 10-13 (2015) - [j25]Said Fouchal, Djamel Mansouri, Lynda Mokdad, M. Iouallalen:
Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks. Int. J. Commun. Syst. 28(2): 309-324 (2015) - [j24]Lynda Mokdad, Jalel Ben-Othman, Abdelli Abdelkrim:
Performance evaluation of composite Web services. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(4): e4 (2015) - [j23]Lynda Mokdad, Jalel Ben-Othman, Anh Tuan Nguyen:
DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks. Perform. Evaluation 87: 47-59 (2015) - [c71]Haroun Benkaouha, Abdelli Abdelkrim, Nadjib Badache, Jalel Ben-Othman, Lynda Mokdad:
Towards Improving Failure Detection in Mobile Ad Hoc Networks. GLOBECOM 2015: 1-6 - [c70]Nawel Gharbi, Lynda Mokdad, Jalel Ben-Othman:
A Performance Study of Next Generation Cellular Networks with Base Stations Channels Vacations. GLOBECOM 2015: 1-6 - [c69]Quentin Monnet, Youcef Hammal, Lynda Mokdad, Jalel Ben-Othman:
Fair Election of Monitoring Nodes in WSNs. GLOBECOM 2015: 1-6 - [c68]Nawel Gharbi, Leila Charabi, Lynda Mokdad:
Performance Evaluation of Heterogeneous Servers Allocation Disciplines in Networks with Retrials. HPCC/CSS/ICESS 2015: 904-907 - [c67]Djamel Mansouri, Lynda Mokdad, Jalel Ben-Othman, Malika Ioualalen:
Preventing Denial of Service attacks in Wireless Sensor Networks. ICC 2015: 3014-3019 - [c66]Lynda Mokdad, Youcef Hammal, Jalel Ben-Othman, Abdelli Abdelkrim:
Formal modeling and analysis of greedy behaviors in IEEE 802.11 protocols. ICC 2015: 3579-3584 - [c65]Mohamed Lamine Laouira, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
An efficient transmitting strategy for image fusion in WMSN. ICC 2015: 5325-5330 - [c64]Abdelli Abdelkrim, Walid Serrai, Lynda Mokdad, Youcef Hammal:
Time Petri Nets for performance evaluation of composite web services architectures. ISCC 2015: 122-127 - [c63]Haroun Benkaouha, Abdelli Abdelkrim, Nadjib Badache, Jalel Ben-Othman, Lynda Mokdad:
AFDAN: Accurate failure detection protocol for MANETs. IWCMC 2015: 733-738 - 2014
- [j22]Lynda Mokdad, Jalel Ben-Othman, Bashir Yahya, S. Niagne:
Performance evaluation tools for QoS MAC protocol for wireless sensor networks. Ad Hoc Networks 12: 86-99 (2014) - [j21]Youcef Hammal, Jalel Ben-Othman, Lynda Mokdad, Abdelli Abdelkrim:
Formal modeling and verification of an enhanced variant of the IEEE 802.11 CSMA/CA protocol. J. Commun. Networks 16(4): 385-396 (2014) - [j20]Nawel Gharbi, Besma Nemmouchi, Lynda Mokdad, Jalel Ben-Othman:
The impact of breakdowns disciplines and repeated attempts on performances of Small Cell Networks. J. Comput. Sci. 5(4): 633-644 (2014) - [j19]Youcef Hammal, Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman, Abdelli Abdelkrim:
Timed automata based modeling and veri?cation of denial of service attacks in wireless sensor networks. Stud. Inform. Univ. 12(1): 1-46 (2014) - [j18]Jalel Ben-Othman, Lynda Mokdad, Sahar Ghazal:
Performance Analysis of WiMAX Networks AC. Wirel. Pers. Commun. 74(1): 133-146 (2014) - [c62]Abdelli Abdelkrim, Lynda Mokdad:
Time Petri net based performance evaluation of traffic scheduling in WIMAX networks. GLOBECOM 2014: 368-373 - [c61]Jalel Ben-Othman, Lynda Mokdad:
Modeling and verification tools for jamming attacks in VANETs. GLOBECOM 2014: 4562-4567 - [c60]Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman:
Energy-balancing method to detect denial of service attacks in wireless sensor networks. ICC 2014: 106-111 - [c59]Haroun Benkaouha, Lynda Mokdad, Abdelli Abdelkrim:
SAN-based modeling of fault tolerant protocols for MANETs. ICC 2014: 336-341 - [c58]Lynda Mokdad, Jalel Ben-Othman:
Stochastic automata networks for performance evaluation of composite Web services. I4CS 2014: 55-60 - [c57]Youcef Hammal, Jalel Ben-Othman, Lynda Mokdad, Abdelli Abdelkrim:
Formal modeling and checking of an enhanced variant of the IEEE 802.11 CSMA/CA protocol. ISCC 2014: 1-6 - [c56]Lynda Mokdad, Abdelli Abdelkrim, Jalel Ben-Othman:
Detection of Greedy Behavior in WSN Using IEEE 802.15 Protocol. MASCOTS 2014: 106-111 - 2013
- [j17]Amir Djouama, Lynda Mokdad, Marwen Abdennebi:
Performance evaluation of lifetime-driven admission control for infrastructure-less clustered wireless networks. Concurr. Comput. Pract. Exp. 25(5): 718-727 (2013) - [j16]Serge Haddad, Lynda Mokdad, Samir Youcef:
Bounding models families for performance evaluation in composite Web services. J. Comput. Sci. 4(4): 232-241 (2013) - [j15]Paolo Ballarini, Lynda Mokdad, Quentin Monnet:
Modeling tools for detecting DoS attacks in WSNs. Secur. Commun. Networks 6(4): 420-436 (2013) - [c55]Said Fouchal, Djamel Mansouri, Lynda Mokdad, Jalel Ben-Othman, Malika Ioualalen:
Clustering wireless sensors networks with FFUCA. ICC 2013: 6438-6443 - [c54]Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman:
Data protection in multipath WSNs. ISCC 2013: 67-72 - [c53]Nawel Gharbi, Lynda Mokdad, Jalel Ben-Othman:
Performance and reliability analysis of Small Cell Networks with retrials and different breakdowns disciplines: A computational approach. ISCC 2013: 85-90 - [c52]Haroun Benkaouha, Lynda Mokdad, Abdelli Abdelkrim:
2PACA: Two phases algorithm of checkpointing for Ad hoc mobile networks. IWCMC 2013: 1359-1364 - [c51]Anh Tuan Nguyen, Lynda Mokdad, Jalel Ben-Othman:
Solution of detecting jamming attacks in vehicle ad hoc networks. MSWiM 2013: 405-410 - [c50]Djamel Mansouri, Lynda Mokdad, Jalel Ben-Othman, Malika Ioualalen:
Detecting DoS attacks in WSN based on clustering technique. WCNC 2013: 2214-2219 - 2012
- [j14]Lynda Mokdad, Mirela Sechi Moretti Annoni Notare:
Special Issue: "Performance evaluation of communications in distributed systems and Web based service architectures". Clust. Comput. 15(4): 333 (2012) - [j13]Lynda Mokdad, Samir Youcef:
Stochastic bounds for composite Web services response times. Clust. Comput. 15(4): 363-371 (2012) - [j12]Hind Castel-Taleb, Lynda Mokdad, Nihal Pekergin:
An algorithm approach to bounding aggregations of multidimensional Markov chains. Theor. Comput. Sci. 452: 12-20 (2012) - [c49]Lynda Mokdad, Jalel Ben-Othman:
Performance evaluation of security routing strategies to avoid DoS attacks in WSN. GLOBECOM 2012: 2859-2863 - [c48]Malek Guechari, Lynda Mokdad, Sovanna Tan:
Dynamic solution for detecting Denial of Service attacks in wireless sensor networks. ICC 2012: 173-177 - [c47]Said Fouchal, Quentin Monnet, Djamel Mansouri, Lynda Mokdad, Malika Ioualalen:
A clustering method for wireless sensors networks. ISCC 2012: 888-892 - [c46]Paolo Ballarini, Jalel Ben-Othman, Lynda Mokdad:
Quantitative Verification of WiMAX Traffic Shaping Solutions. ANT/MobiWIS 2012: 1026-1031 - 2011
- [j11]Lynda Mokdad, Jalel Ben-Othman:
Admission control mechanism and performance analysis based on stochastic automata networks formalism. J. Parallel Distributed Comput. 71(4): 594-602 (2011) - [j10]Lynda Mokdad, Mbaye Sene, Azzedine Boukerche:
Call Admission Control Performance Analysis in Mobile Networks Using Stochastic Well-Formed Petri Nets. IEEE Trans. Parallel Distributed Syst. 22(8): 1332-1341 (2011) - [c45]Jalel Ben-Othman, Lynda Mokdad, Yesica Imelda Saavedra Benitez:
Performance Comparison between IBC-HWMP and Hash-HWMP. GLOBECOM 2011: 1-5 - [c44]Jalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh:
Sectorial Coverage in a Deployment of a WMN Backbone Based on Directional Antennas. GLOBECOM 2011: 1-5 - [c43]Jalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh:
A New Architecture of Wireless Mesh Networks Based IEEE 802.11s Directional Antennas. ICC 2011: 1-5 - [c42]Jalel Ben-Othman, Lynda Mokdad, Bashir Yahya:
An Energy Efficient Priority-Based QoS MAC Protocol for Wireless Sensor Networks. ICC 2011: 1-6 - [c41]Richard W. Pazzi, Dipu Zhang, Azzedine Boukerche, Lynda Mokdad:
E-TRAIL: Energy-Efficient Trail-Based Data Dissemination Protocol for Wireless Sensor Networks with Mobile Sinks. ICC 2011: 1-5 - [c40]Youssou Kasse, Lynda Mokdad:
Quantitative verification for response times in composite Web service model. ISCC 2011: 97-102 - [c39]Lynda Mokdad:
Evaluation of lifetime in wireless sensor networks. LCN 2011: 706-710 - [c38]Yonglin Ren, Azzedine Boukerche, Lynda Mokdad:
Performance analysis of a selective encryption algorithm for wireless ad hoc networks. WCNC 2011: 1038-1043 - 2010
- [j9]Lynda Mokdad, Mirela Sechi Moretti Annoni Notare:
Special Issue: Performance Evaluation of Communications in Distributed Systems and Web-Based Service Architectures. Concurr. Comput. Pract. Exp. 22(10): 1205-1206 (2010) - [j8]Jean-Michel Fourneau, Lynda Mokdad, Nihal Pekergin:
Stochastic bounds for performance evaluation of Web services. Concurr. Comput. Pract. Exp. 22(10): 1286-1307 (2010) - [j7]Jalel Ben-Othman, Lynda Mokdad:
Enhancing data security in ad hoc networks based on multipath routing. J. Parallel Distributed Comput. 70(3): 309-316 (2010) - [c37]Lynda Mokdad, Jalel Ben-Othman, Mohamed Ould Cheikh:
Improving QoS for BE traffics in WIMAX networks. AICCSA 2010: 1-5 - [c36]Serge Haddad, Lynda Mokdad, Samir Youcef:
Selection of the Best composite Web Service Based on Quality of Service. ISSS/BPSC 2010: 255-266 - [c35]Jalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh:
Q-HWMP: Improving End-to-End QoS for 802.11s Based Mesh Networks. GLOBECOM 2010: 1-6 - [c34]Serge Haddad, Lynda Mokdad, Samir Youcef:
Response time of BPEL4WS constructors. ISCC 2010: 695-700 - [c33]Youssou Kasse, Lynda Mokdad, Samir Youcef:
Stochastic bounds for end-to-end delay. ISCC 2010: 1127-1132 - [c32]Yonglin Ren, Azzedine Boukerche, Lynda Mokdad:
A novel framework of secure network management for wireless and mobile networks. LCN 2010: 676-683 - [c31]Jalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh:
On improving the performance of IEEE 802.11s based wireless mesh networks using directional antenna. LCN 2010: 785-790 - [c30]Azzedine Boukerche, Yonglin Ren, Lynda Mokdad:
Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness. Q2SWinet 2010: 33-40 - [c29]Jalel Ben-Othman, Serigne Diagne, Lynda Mokdad, Bashir Yahya:
Performance evaluation of a hybrid MAC protocol for wireless sensor networks. MSWiM 2010: 327-334
2000 – 2009
- 2009
- [j6]Jalel Ben-Othman, Lynda Mokdad, Souheila Bouam:
Amclm: Adaptive Multi-Services Cross-Layer MAC Protocol for IEEE 802.11 Networks. J. Interconnect. Networks 10(4): 283-301 (2009) - [j5]Lynda Mokdad, Jalel Ben-Othman:
Stochastic Automata Networks for Modelling Scheduling Scheme in WiMAX Networks. J. Interconnect. Networks 10(4): 481-495 (2009) - [c28]Ali Hamieh, Jalel Ben-Othman, Lynda Mokdad:
Detection of Radio Interference Attacks in VANET. GLOBECOM 2009: 1-5 - [c27]Tarek Bejaoui, Lynda Mokdad:
Adaptive Hybrid Call Admission Control Policy for UMTS with Underlying Tunnel-WLANs Heterogeneous Networks. ICC 2009: 1-5 - [c26]Jean-Michel Fourneau, Lynda Mokdad, Nihal Pekergin:
Stochastic bounds for performance evaluation of web services. ISCC 2009: 7-12 - [c25]Amir Djouama, Marwen Abdennebi, Lynda Mokdad, Samir Tohmé:
Lifetime aware admission control for infrastructure-less wireless networks. ISCC 2009: 67-72 - [c24]Jalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh, Mbaye Sene:
Performance analysis of composite web services using Stochastic Automata Networks over IP network. ISCC 2009: 92-97 - [c23]Youssou Kasse, Lynda Mokdad, Mbaye Sene:
Performance analysis of Web services architecture. ISCC 2009: 94-98 - [c22]Amir Djouama, Lynda Mokdad, Marwen Abdennebi, Samir Tohmé:
Topology control for enhanced QoS on infrastructure-less heterogeneous radio networks. LCN 2009: 414-419 - [c21]Azzedine Boukerche, Lynda Mokdad, Samer Samarah:
The 5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet 2009). LCN 2009: 714 - [c20]Mbaye Sene, Lynda Mokdad, Serigne Diagne:
Load balancing in distributed communication systems: performance evaluation with SWN models. LCN 2009: 716-723 - 2008
- [j4]Lynda Mokdad, Hind Castel-Taleb:
Stochastic comparisons: A methodology for the performance evaluation of fixed and mobile networks. Comput. Commun. 31(17): 3894-3904 (2008) - [j3]Jalel Ben-Othman, Hind Castel, Lynda Mokdad:
A multi-service MAC protocol in a multi-channel CSMA/CA for IEEE 802.11 networks. J. Commun. Networks 10(3): 287-296 (2008) - [j2]Jalel Ben-Othman, Hind Castel-Taleb, Lynda Mokdad:
Performance Evaluation of Mobile Networks Based on Stochastic Ordering Markov Chains. Stud. Inform. Univ. 6(3): 313-329 (2008) - [c19]Jalel Ben-Othman, Farid Naït-Abdesselam, Lynda Mokdad, Octavio Ramirez Rojas:
Performance evaluation of TCP handoffs over mobile IP connections. AICCSA 2008: 366-372 - [c18]Sahar Ghazal, Lynda Mokdad, Jalel Ben-Othman:
A Real Time Adaptive Scheduling Scheme for Multi-Service Flows in WiMAX Networks. GLOBECOM 2008: 1652-1656 - [c17]Sahar Ghazal, Lynda Mokdad, Jalel Ben-Othman:
Performance Analysis of UGS, rtPS, nrtPS Admission Control in WiMAX Networks. ICC 2008: 2696-2701 - [c16]Lynda Mokdad, Jalel Ben-Othman:
Performance analysis of an admission control enhancement in WIMAX networks using SAN. LCN 2008: 674-679 - 2007
- [c15]Hind Castel, Lynda Mokdad, Nihal Pekergin:
Loss rates bounds in IP buffers by Markov chains aggregations. AICCSA 2007: 623-630 - [c14]Jean-Michel Fourneau, Lynda Mokdad, Nihal Pekergin, Samir Youcef:
Stochastic Bounds for Loss Rates. AICT 2007: 9 - [c13]Muhammad Usman Bhatti, Samir Youcef, Lynda Mokdad, Valérie Monfort:
Execution Time Analysis of Aspectized Web Services. ICIW 2007: 30 - [c12]Hind Castel, Lynda Mokdad, Nihal Pekergin:
Stochastic Bounds Applied to the End to End QoS in Communication Systems. MASCOTS 2007: 374-380 - [c11]Hind Castel-Taleb, Lynda Mokdad, Nihal Pekergin:
Aggregated bounding Markov processes applied to the analysis of tandem queues. VALUETOOLS 2007: 43 - 2006
- [j1]Octavio Ramirez Rojas, Jalel Ben-Othman, Safouane Sfar, Lynda Mokdad:
VIP (VHE in Mobile IP Networks) Architecture. J. Commun. 1(5): 28-38 (2006) - [c10]Jalel Ben-Othman, Lynda Mokdad, Octavio Ramirez Rojas:
ATHOMIC: Architecture managing Tcp Handoff Over Mobile Ip Connections. AICCSA 2006: 70-73 - [c9]Hind Castel-Taleb, Lynda Mokdad, Nihal Pekergin:
Loss rates bounds for IP switches in MPLS networks. AICCSA 2006: 208-214 - [c8]Céline Boutrous-Saab, Tarek Melliti, Lynda Mokdad:
Performance evaluation for mobile access to compositeWeb services. AICT/ICIW 2006: 154 - [c7]Serge Haddad, Lynda Mokdad, Patrice Moreaux:
A New Approach to the Evaluation of Non Markovian Stochastic Petri Nets. ICATPN 2006: 221-240 - [c6]Lynda Mokdad, Mbaye Sene:
Performance measures of a call admission control in mobile networks using SWN. VALUETOOLS 2006: 64 - 2005
- [c5]Jalel Ben-Othman, Hind Castel-Taleb, Lynda Mokdad:
Multi-services MAC protocol for wireless networks. AICCSA 2005: 61 - [c4]Hind Castel-Taleb, Lynda Mokdad:
Performance measure bounds in mobile networks by state space reduction. MASCOTS 2005: 397-406 - 2001
- [c3]Lynda Mokdad, Jalel Ben-Othman, Abdelhak Mourad Guéroui:
Quality of Service of A Rerouting Algorithm Using Stochastic Automata Networks. ISCC 2001: 338-343
1990 – 1999
- 1998
- [c2]Jean-Michel Fourneau, Lynda Mokdad:
A Perturbation and Reduction Based Algorithm. Computer Performance Evaluation (Tools) 1998: 142-153 - 1997
- [b1]Lynda Mokdad:
Méthodes et outils pour l'évaluation des performances des réseaux informatiques. (Methods and tools for performance evaluation of computer networks). Versailles Saint-Quentin-en-Yvelines University, France, 1997 - [c1]Jean-Michel Fourneau, Lynda Mokdad, Nihal Pekergin:
Bounding the Loss Rates in a Multistage ATM Switch. Computer Performance Evaluation 1997: 193-205
Coauthor Index
aka: Abdelkrim Abdelli
aka: Jalel Benothman
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint