default search action
Boucif Amar Bensaber
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c22]Abdallah Belkaaloul, Boucif Amar Bensaber:
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks. ISCC 2021: 1-5 - 2020
- [j8]Boucif Amar Bensaber, Caroly Gabriela Pereira Diaz, Youssef Lahrouni:
Design and modeling an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the prediction of a security index in VANET. J. Comput. Sci. 47: 101234 (2020) - [c21]Fakhr-eddine Hachemi, Mohammed Mana, Boucif Amar Bensaber:
Study of the Impact of Sinkhole Attack in IoT Using Shewhart Control Charts. GLOBECOM 2020: 1-5
2010 – 2019
- 2019
- [j7]Walid Bouksani, Boucif Amar Bensaber:
RIN: A dynamic pseudonym change system for privacy in VANET. Concurr. Comput. Pract. Exp. 31(24) (2019) - [c20]Caroly Gabriela Pereira Diaz, Boucif Amar Bensaber, Youssef Lahrouni:
Design and modeling an Adaptive Neuro-Diffuse System (ANFIS) for the prediction of a security index in VANET. ISCC 2019: 1040-1045 - 2018
- [j6]Ahcene Teniou, Boucif Amar Bensaber:
Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks. Secur. Priv. 1(1) (2018) - 2017
- [j5]Boucif Amar Bensaber, Luca Foschini:
Performance evaluation of communications in distributed systems and web based service architectures. J. Comput. Sci. 22: 237-239 (2017) - [c19]Amina Bendouma, Boucif Amar Bensaber:
RSU authentication by aggregation in VANET using an interaction zone. ICC 2017: 1-6 - [c18]Walid Bouksani, Boucif Amar Bensaber:
An efficient and dynamic pseudonyms change system for privacy in VANET. ISCC 2017: 59-63 - [c17]Youssef Lahrouni, Caroly Pereira, Boucif Amar Bensaber, Ismaïl Biskri:
Using Mathematical Methods Against Denial of Service (DoS) Attacks in VANET. MobiWac 2017: 17-22 - 2016
- [j4]Hayette Boumerzoug, Boucif Amar Bensaber, Ismaïl Biskri:
A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks. Concurr. Comput. Pract. Exp. 28(6): 1831-1847 (2016) - 2015
- [c16]Abdelkader Khobzaoui, Mhamed Mesfioui, Abderrahmane Yousfate, Boucif Amar Bensaber:
On Copulas-Based Classification Method for Intrusion Detection. CIIA 2015: 394-405 - [c15]Karim Laroussi, Boucif Amar Bensaber, Mhamed Mesfioui, Ismaïl Biskri:
A probabilistic model to corroborate three attacks in vehicular ad hoc networks. ISCC 2015: 70-75 - [c14]Kahina Moghraoui, Boucif Amar Bensaber:
An Efficient Pseudonym Change Protocol Based on Trusted Neighbours for Privacy and Anonymity in VANETs. DIVANet@MSWiM 2015: 93-99 - 2014
- [j3]Ismaïl Biskri, Marie Anastacio, Adam Joly, Boucif Amar Bensaber:
A typed applicative system for a language and text processing engineering. J. Innov. Digit. Ecosyst. 1(1-2): 26-37 (2014) - [c13]Frédéric Simard, Ismaïl Biskri, Josée St-Pierre, Boucif Amar Bensaber:
Using Strong Lexical Association Extraction in an Understanding of Managers' Decision Process. FLAIRS 2014 - [c12]Ismaïl Biskri, Boucif Amar Bensaber:
A Flexible Approach for Text Processing Engineering. MEDES 2014: 152-158 - 2013
- [c11]Ismaïl Biskri, Marie Anastacio, Adam Joly, Boucif Amar Bensaber:
Integration of Sequence of Computational Modules Dedicated to Text Analysis: A Combinatory Typed Approach. FLAIRS 2013 - [c10]Adetundji Adigun, Boucif Amar Bensaber, Ismaïl Biskri:
Protocol of change pseudonyms for VANETs. LCN Workshops 2013: 162-167 - [c9]Romain Coussement, Boucif Amar Bensaber, Ismaïl Biskri:
Decision support protocol for intrusion detection in VANETs. DIVANet@MSWiM 2013: 31-38 - [p1]Ismaïl Biskri, Louis Rompre, Christophe Jouis, Abdelghani Achouri, Steve Descoteaux, Boucif Amar Bensaber:
Seeking for High Level Lexical Association in Texts. Modeling Approaches and Algorithms for Advanced Computer Applications 2013: 37-46 - 2012
- [c8]Ismaïl Biskri, Louis Rompre, Steve Descoteaux, Abdelghani Achouri, Boucif Amar Bensaber:
Extraction of Strong Associations in Classes of Similarities. ICMLA (2) 2012: 56-61 - [c7]Adetundji Adigun, Boucif Amar Bensaber, Ismaïl Biskri:
Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs. DIVANet@MSWiM 2012: 111-114 - 2011
- [j2]Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber:
Trust Key Management Scheme for Wireless Body Area Networks. Int. J. Netw. Secur. 12(2): 75-83 (2011) - [c6]Hayette Boumerzoug, Boucif Amar Bensaber, Ismaïl Biskri:
A key management method based on an AVL tree and ECC cryptography for wireless sensor networks. Q2SWinet 2011: 57-62 - [i1]Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber:
A Light Weight Protocol to Provide Location Privacy in Wireless Body Area networks. CoRR abs/1103.3308 (2011)
2000 – 2009
- 2009
- [c5]Adam Joly, Ismaïl Biskri, Boucif Amar Bensaber:
Combinators' Introduction: an Enhanced Algorithm. FLAIRS 2009 - 2008
- [c4]Ismaïl Biskri, Boucif Amar Bensaber:
The Categorial Annotation of Coordination in Arabic. FLAIRS 2008: 462-467 - 2006
- [j1]Ismaïl Biskri, Jean-Pierre Desclés, Boucif Amar Bensaber:
Coordination and Applicative Categorial Type Logic. Int. J. Artif. Intell. Tools 15(6): 1007-1020 (2006) - [c3]André Boumso, Boucif Amar Bensaber, Ismaïl Biskri, Samir Khali:
Multicast Key Agreement Protocol for Mobile Ad-hoc Networks. WINSYS 2006: 86-94 - 2005
- [c2]Ismaïl Biskri, Boucif Amar Bensaber:
Some Arguments for Coordination in Categorial Grammar and Combinatory Logic. FLAIRS 2005: 598-603 - 2000
- [c1]Andrew Grant, Boucif Amar Bensaber, Lise Couture, Nicole Tremblay, Dany Drapeau, Dany Blanchette, Steve Arsenault, Pierre Maheux, Claude Gagné, Daniel Gaudet:
PIERCE Program: Informatics Support for Multi-Site Clinical Research: an Environment for Consensual Use of Clinical Protocols and Clinical Trials. EWGLP 2000: 43-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint