default search action
Mohamed Guerroumi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Hamadouche Maamar, Khalil Zebbiche, Tebbi Hanane, Mohamed Guerroumi, Youcef Zafoune:
A replay attack detection scheme based on perceptual image hashing. Multim. Tools Appl. 83(3): 8999-9031 (2024) - [j18]Rahmoune Bitit, Abdelouahid Derhab, Mohamed Guerroumi, Farrukh Aslam Khan:
DDoS attack forecasting based on online multiple change points detection and time series analysis. Multim. Tools Appl. 83(18): 53655-53685 (2024) - [j17]Benaicha Mehdi, Samira Moussaoui, Mohamed Guerroumi:
A geographic routing based on local traffic density and multi-hop intersections in VANETs for intelligent traffic system in smart cities (GRBLTD-MI). Wirel. Networks 30(6): 5867-5886 (2024) - 2021
- [j16]Abdelouahid Derhab, Mohamed Guerroumi, Mohamed Belaoued, Omar Cheikhrouhou:
BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks. Wirel. Commun. Mob. Comput. 2021: 9984666:1-9984666:12 (2021) - [j15]Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Salimur Choudhury, Mohamed Guerroumi:
Internet of Things for smart living. Wirel. Networks 27(6): 4293-4295 (2021) - 2020
- [j14]Abdelouahid Derhab, Mohamed Belaoued, Mohamed Guerroumi, Farrukh Aslam Khan:
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing. IEEE Access 8: 28956-28969 (2020) - [j13]Fairouz Chehbour, Zouina Doukha, Samira Moussaoui, Mohamed Guerroumi:
OMS: Opportunistic mules for short latency data collection in smart cities. Int. J. Commun. Syst. 33(10) (2020) - [j12]Souhila Aoufi, Abdelouahid Derhab, Mohamed Guerroumi:
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. J. Inf. Secur. Appl. 54: 102518 (2020) - [j11]Naila Belhadj Aissa, Mohamed Guerroumi, Abdelouahid Derhab:
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset. Neural Comput. Appl. 32(8): 3475-3501 (2020) - [c14]Khalfi Ali, Mohamed Guerroumi:
Roadside Parking Spaces Image Classification Using Deep Learning. CSA 2020: 323-333 - [c13]Fairouz Chehbour, Zouina Doukha, Samira Moussaoui, Mohamed Guerroumi:
Congestion Aware Data Collection with Mobile Sinks in Smart City. ISNCC 2020: 1-7
2010 – 2019
- 2019
- [j10]Abdelouahid Derhab, Mohamed Guerroumi, Abdu Gumaei, Leandros A. Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan:
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors 19(14): 3119 (2019) - [j9]Leila Kheroua, Samira Moussaoui, Mohamed Guerroumi, Al-Sakib Khan Pathan:
Two energy and time-efficient data dissemination protocols for large-scale wireless sensor networks. Telecommun. Syst. 70(1): 81-96 (2019) - [c12]Soumia Bellaouar, Mohamed Guerroumi, Samira Moussaoui:
QoS Based Clustering for Vehicular Networks in Smart Cities. DependSys 2019: 67-79 - [c11]Sarra Boukria, Mohamed Guerroumi, Imed Romdhani:
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. ISCC 2019: 1034-1039 - [e1]Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mohamed Guerroumi:
Smart Grid and Internet of Things - Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 256, Springer 2019, ISBN 978-3-030-05927-9 [contents] - 2018
- [j8]Mohamed Guerroumi, Al-Sakib Khan Pathan:
Hybrid data dissemination protocol (HDDP) for wireless sensor networks. Wirel. Networks 24(5): 1739-1754 (2018) - 2017
- [j7]Abdelouahid Derhab, Mohamed Guerroumi, Mohamed F. Younis:
Wireless and mobile sensing technologies for the future Internet. Ann. des Télécommunications 72(3-4): 117-118 (2017) - [j6]Noureddine Haouari, Samira Moussaoui, Sidi Mohammed Senouci, Abdelwahab Boualouache, Mohamed Guerroumi:
Enhanced local density estimation in internet of vehicles. IET Commun. 11(15): 2393-2401 (2017) - [j5]Mohamed Guerroumi, Al-Sakib Khan Pathan, Abdelouahid Derhab, Nadjib Badache, Samira Moussaoui:
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness. Wirel. Pers. Commun. 96(4): 4973-5010 (2017) - 2016
- [c10]Naila Belhadj Aissa, Mohamed Guerroumi:
Semi-supervised Statistical Approach for Network Anomaly Detection. ANT/SEIT 2016: 1090-1095 - [c9]Noureddine Haouari, Samira Moussaoui, Mohamed Guerroumi, Sidi Mohammed Senouci:
Local density estimation for VANETs. GIIS 2016: 1-6 - [c8]Haroun Benkaouha, Abdelli Abdelkrim, Mohamed Guerroumi, Jalel Ben-Othman, Lynda Mokdad:
EAFD, a failure detector for clustered WSN. ICC 2016: 1-6 - [c7]Naila Belhadj Aissa, Mohamed Guerroumi:
A New Classification Process for Network Anomaly Detection Based on Negative Selection Mechanism. SpaCCS Workshops 2016: 238-248 - [c6]Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks. WCNC 2016: 1-7 - 2015
- [j4]Mohamed Guerroumi, Nadjib Badache, Samira Moussaoui:
Mobile sink and power management for efficient data dissemination in wireless sensor networks. Telecommun. Syst. 58(4): 279-292 (2015) - [c5]Mohamed Guerroumi, Abdelouahid Derhab, Kashif Saleem:
Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink. ITNG 2015: 307-313 - [c4]Naila Belhadj Aissa, Mohamed Guerroumi:
A genetic clustering technique for Anomaly-based Intrusion Detection Systems. SNPD 2015: 87-92 - 2014
- [j3]Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - A Survey. Int. J. Commun. Networks Inf. Secur. 6(2) (2014) - 2013
- [j2]Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 5(3) (2013) - 2012
- [c3]Mohamed Guerroumi, Nadjib Badache, Samira Moussaoui:
Sink Mobile for Efficient Data Dissemination in Wireless Sensor Networks. NDT (1) 2012: 635-645 - 2011
- [c2]Mohamed Guerroumi, Nadjib Badache, Samira Moussaoui:
Data Dissemination and Power Management in Wireless Sensor Networks. ACC (4) 2011: 593-607
2000 – 2009
- 2009
- [j1]Samira Moussaoui, Mohamed Guerroumi, Nadjib Badache:
Two phase replication approach for MANETs. Int. J. Ad Hoc Ubiquitous Comput. 4(5): 292-303 (2009) - 2006
- [c1]Samira Moussaoui, Mohamed Guerroumi, Nadjib Badache:
Data Replication in Mobile Ad Hoc Networks. MSN 2006: 685-697
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint