default search action
Abderrahim Benslimane
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j99]Anna Maria Vegni, Claudia Leoni, Valeria Loscrí, Abderrahim Benslimane:
A Reputation-Based Trustworthiness Concept for Wireless Networking in Vehicular Social Networks. IEEE Commun. Mag. 62(5): 28-34 (2024) - [j98]Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li:
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. IEEE Trans. Inf. Forensics Secur. 19: 1963-1978 (2024) - [j97]Julio César Pérez García, An Braeken, Abderrahim Benslimane:
Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members. IEEE Trans. Inf. Forensics Secur. 19: 6709-6721 (2024) - [j96]Liang Xie, Zhou Su, Qichao Xu, Nan Chen, Yixin Fan, Abderrahim Benslimane:
A Secure UAV Cooperative Communication Framework: Prospect Theory Based Approach. IEEE Trans. Mob. Comput. 23(11): 10219-10234 (2024) - [j95]Sahand Khodaparas, Abderrahim Benslimane, Saleh Yousefi:
An Intelligent Caching Scheme Considering the Spatio-Temporal Characteristics of Data in Internet of Vehicles. IEEE Trans. Veh. Technol. 73(5): 7019-7033 (2024) - [c122]Yu Wang, Shuai Han, Abderrahim Benslimane, Cheng Li:
PAPR Analysis and Reduction for OTFS Signal with Large Delay-Doppler Domain. ICC 2024: 5353-5358 - [c121]Grace Colette Tessa Masse, Abderrahim Benslimane, Vianney Kengne Tchendji, Ahmed H. Anwar:
A Secure Hierarchical Federated Learning Using Dirichlet-based Trust Management. ICNC 2024: 1098-1103 - [c120]Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed Hemida, Gabriel Deugoue, Charles A. Kamhoua:
Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks. ICNC 2024: 1114-1120 - [c119]Claudia Leoni, Anna Maria Vegni, Valeria Loscrí, Abderrahim Benslimane:
Reputation-based Trustworthiness Degree in Interference-variable Vehicular Networks. IFIP Networking 2024: 775-780 - [i8]Chenyu Wu, Shuai Han, Qian Chen, Yu Wang, Weixiao Meng, Abderrahim Benslimane:
Enhancing LEO Mega-Constellations with Inter-Satellite Links: Vision and Challenges. CoRR abs/2406.05078 (2024) - 2023
- [j94]Liyao Han, Yijie Xun, Jiajia Liu, Abderrahim Benslimane, Yanning Zhang:
DP-Authentication: A novel deep learning based drone pilot authentication scheme. Ad Hoc Networks 147: 103180 (2023) - [j93]Sunil Kumar, Aman Singh, Abderrahim Benslimane, Premkumar Chithaluru, Marwan Ali Albahar, Rajkumar Singh Rathore, Roberto Marcelo Álvarez:
An Optimized Intelligent Computational Security Model for Interconnected Blockchain-IoT System & Cities. Ad Hoc Networks 151: 103299 (2023) - [j92]Monika Chaudhary, Nitin Goyal, Abderrahim Benslimane, Lalit Kumar Awasthi, Ayed Alwadain, Aman Singh:
Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges. IEEE Internet Things J. 10(4): 3500-3524 (2023) - [j91]Chaimaa Boudagdigue, Abderrahim Benslimane, Abdellatif Kobbane, Jiajia Liu:
Trust-Based Certificate Management for Industrial IoT Networks. IEEE Internet Things J. 10(14): 12867-12885 (2023) - [j90]Julio César Pérez García, Abderrahim Benslimane, An Braeken, Zhou Su:
μTesla-Based Authentication for Reliable and Secure Broadcast Communications in IoD Using Blockchain. IEEE Internet Things J. 10(20): 18400-18413 (2023) - [j89]Hongzhi Guo, Xiaoyi Zhou, Jiadai Wang, Jiajia Liu, Abderrahim Benslimane:
Intelligent Task Offloading and Resource Allocation in Digital Twin Based Aerial Computing Networks. IEEE J. Sel. Areas Commun. 41(10): 3095-3110 (2023) - [j88]Sarkis Moussa, Abderrahim Benslimane, Rony Darazi, Chunxiao Jiang:
Power Allocation-Based NOMA and Underlay D2D Communication for Public Safety Users in the 5G Cellular Network. IEEE Syst. J. 17(3): 3572-3583 (2023) - [j87]Aswin Balaji, Utkarsh Tripathi, Vinay Chamola, Abderrahim Benslimane, Mohsen Guizani:
Toward Safer Vehicular Transit: Implementing Deep Learning on Single Channel EEG Systems for Microsleep Detection. IEEE Trans. Intell. Transp. Syst. 24(1): 1052-1061 (2023) - [j86]Yanika Kongsorot, Pakarat Musikawan, Phet Aimtongkham, Ilsun You, Abderrahim Benslimane, Chakchai So-In:
An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework. IEEE Trans. Sustain. Comput. 8(4): 596-613 (2023) - [j85]Valeria Loscrí, Carola Rizza, Abderrahim Benslimane, Anna Maria Vegni, Eros Innocenti, Romeo Giuliano:
BEST-RIM: A mmWave Beam Steering Approach Based on Computer Vision-Enhanced Reconfigurable Intelligent Metasurfaces. IEEE Trans. Veh. Technol. 72(6): 7613-7626 (2023) - [c118]Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane, El Mehdi Amhoud:
Improvement of Anomaly Detection System in the IoT Networks using CNN-LSTM Approach. GLOBECOM 2023: 3771-3776 - [c117]Xiangrui Cheng, Yiliang Liu, Zhou Su, Xuewen Luo, Qichao Xu, Haixia Peng, Abderrahim Benslimane:
Power Efficiency Physical Layer Security for Multiple Users in IRS-Assisted Uplink Channels: Learning to Phase Shift. GLOBECOM 2023: 5037-5042 - [c116]Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed H. Anwar, Gabriel Deugoue, Frederica Free-Nelson, Charles A. Kamhoua:
Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game. ICC 2023: 6016-6021 - [c115]Yuntao Wang, Zhou Su, Yanghe Pan, Abderrahim Benslimane, Yiliang Liu, Tom H. Luan, Ruidong Li:
Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning. ICC 2023: 6307-6311 - [c114]Sarkis Moussa, Abderrahim Benslimane:
Design of MEC-based Architecture Integrating ProSe and NOMA for Public Safety Users in 5G and Beyond Cellular Networks. IWCMC 2023: 1497-1502 - [i7]Yuntao Wang, Zhou Su, Yanghe Pan, Abderrahim Benslimane, Yiliang Liu, Tom H. Luan, Ruidong Li:
Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning. CoRR abs/2301.08474 (2023) - 2022
- [j84]Shivani Singh, A. Razia Sulthana, Tanvi Shewale, Vinay Chamola, Abderrahim Benslimane, Biplab Sikdar:
Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey. IEEE Internet Things J. 9(1): 236-260 (2022) - [j83]Qian Luo, Yinbo Yu, Jiajia Liu, Abderrahim Benslimane:
Automatic Detection for Privacy Violations in Android Applications. IEEE Internet Things J. 9(8): 6159-6172 (2022) - [j82]Premkumar Chithaluru, Sunil Kumar, Aman Singh, Abderrahim Benslimane, Sunil Kumar Jangir:
An Energy-Efficient Routing Scheduling Based on Fuzzy Ranking Scheme for Internet of Things. IEEE Internet Things J. 9(10): 7251-7260 (2022) - [j81]Mohamed S. Abdalzaher, M. Sami Soliman, Sherif M. El-Hady, Abderrahim Benslimane, Mohamed Elwekeil:
A Deep Learning Model for Earthquake Parameters Observation in IoT System-Based Earthquake Early Warning. IEEE Internet Things J. 9(11): 8412-8424 (2022) - [j80]Peng Wang, Ning Xu, Haibin Zhang, Wen Sun, Abderrahim Benslimane:
Dynamic Access Control and Trust Management for Blockchain-Empowered IoT. IEEE Internet Things J. 9(15): 12997-13009 (2022) - [j79]Sakil Ahmed Chowdhury, Jeff Frolik, Abderrahim Benslimane:
Switching-Based Selection Techniques for Tripolar Antennas in Multihop IoT Networks. IEEE Internet Things J. 9(17): 15957-15968 (2022) - [j78]Basma Mostafa, Miklós Molnár, Mohamed Mostafa Saleh, Abderrahim Benslimane, Sally S. Kassem:
Optimal proactive monitor placement & scheduling for IoT networks. J. Oper. Res. Soc. 73(11): 2431-2450 (2022) - [j77]Yuntao Wang, Haixia Peng, Zhou Su, Tom H. Luan, Abderrahim Benslimane, Yuan Wu:
A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains. IEEE J. Sel. Areas Commun. 40(12): 3305-3324 (2022) - [j76]Der-Jiunn Deng, Abderrahim Benslimane:
Editorial: Innovation and Application of Internet of Things for Smart Cities. Mob. Networks Appl. 27(1): 1-2 (2022) - [j75]Charafeddine E. Aitzaouiat, Adnane Latif, Abderrahim Benslimane, Hui-Hsin Chin:
Machine Learning Based Prediction and Modeling in Healthcare Secured Internet of Things. Mob. Networks Appl. 27(1): 84-95 (2022) - [j74]Peiying Zhang, Fanglin Liu, Chunxiao Jiang, Abderrahim Benslimane, Juan-Luis Gorricho, Joan Serrat-Fernández:
A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks. Mob. Networks Appl. 27(1): 124-138 (2022) - [j73]Kushagra Agrawal, Tejasvi Alladi, Ayush Agrawal, Vinay Chamola, Abderrahim Benslimane:
NovelADS: A Novel Anomaly Detection System for Intra-Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(11): 22596-22606 (2022) - [j72]Jun Du, Chunxiao Jiang, Abderrahim Benslimane, Song Guo, Yong Ren:
SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach. IEEE/ACM Trans. Netw. 30(4): 1613-1628 (2022) - [j71]Yuntao Wang, Tom H. Luan, Zhou Su, Ning Zhang, Abderrahim Benslimane:
A Secure and Efficient Wireless Charging Scheme for Electric Vehicles in Vehicular Energy Networks. IEEE Trans. Veh. Technol. 71(2): 1491-1508 (2022) - [j70]Hafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane, Mohammed Jouhari, Junaid Qadir:
Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game. IEEE Trans. Veh. Technol. 71(10): 11089-11102 (2022) - [j69]Marica Amadeo, Abderrahim Benslimane, Kwang-Cheng Chen, Valeria Loscrì, Seyhan Ucar, Anna Maria Vegni:
Special issue on Revolutionary Paradigms for Smart Connected Vehicles in the 6G Era. Veh. Commun. 33: 100422 (2022) - [c113]Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane, El Mehdi Amhoud:
Adversarial Attacks Against IoT Networks using Conditional GAN based Learning. GLOBECOM 2022: 2788-2793 - [c112]Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li:
A Learning-based Honeypot Game for Collaborative Defense in UAV Networks. GLOBECOM 2022: 3521-3526 - [c111]Rui Xing, Zhou Su, Tom H. Luan, Qichao Xu, Yuntao Wang, Ruidong Li, Abderrahim Benslimane:
UAVs Assisted Secure Blockchain Offline Transactions for V2V Charging Among Electric Vehicles in Disaster Area. ICC 2022: 4211-4216 - [c110]Julio César Pérez García, Abderrahim Benslimane, Zhou Su:
Analysis on the AoI in Blockchain-based IoT Networks with Different Sensing Mechanisms. ICC 2022: 4763-4768 - [c109]Yuanhao Liu, Fen Zhou, Michal Pióro, Tao Shang, Juan-Manuel Torres-Moreno, Abderrahim Benslimane:
On Flow-based Directed p-Cycle Design in Elastic Optical Networks. ISCC 2022: 1-7 - [i6]Peiying Zhang, Chao Wang, Chunxiao Jiang, Abderrahim Benslimane:
Security-Aware Virtual Network Embedding Algorithm based on Reinforcement Learning. CoRR abs/2202.02452 (2022) - [i5]Peiying Zhang, Fanglin Liu, Chunxiao Jiang, Abderrahim Benslimane, Juan-Luis Gorricho, Joan Serrat-Fernández:
A Multi-Domain VNE Algorithm based on Load Balancing in the IoT networks. CoRR abs/2202.05667 (2022) - [i4]Yuntao Wang, Haixia Peng, Zhou Su, Tom H. Luan, Abderrahim Benslimane, Yuan Wu:
A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains. CoRR abs/2208.12046 (2022) - [i3]Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li:
A Learning-based Honeypot Game for Collaborative Defense in UAV Networks. CoRR abs/2209.13815 (2022) - [i2]Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li:
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. CoRR abs/2211.01772 (2022) - 2021
- [j68]Kalpna Guleria, Anil Kumar Verma, Nitin Goyal, Ajay Kumar Sharma, Abderrahim Benslimane, Aman Singh:
An enhanced energy proficient clustering (EEPC) algorithm for relay selection in heterogeneous WSNs. Ad Hoc Networks 116: 102473 (2021) - [j67]Peiying Zhang, Chao Wang, Chunxiao Jiang, Abderrahim Benslimane:
UAV-Assisted Multi-Access Edge Computing: Technologies and Challenges. IEEE Internet Things Mag. 4(4): 12-17 (2021) - [j66]Zubair Md. Fadlullah, Abderrahim Benslimane:
Joint Provisioning of QoS and Security in IoD Networks: Classical Optimization Meets AI. IEEE Internet Things Mag. 4(4): 40-46 (2021) - [j65]Jun Jason Zhang, Fei-Yue Wang, Yong Yuan, Guandong Xu, Huan Liu, Wei Gao, Shoaib Jameel, Imran Razzak, Peter W. Eklund, Sheraz Ahmed, Rui Qin, Juanjuan Li, Xiao Wang, De-Nian Yang, Damla Turgut, Abderrahim Benslimane, Neeli Prasad, Kwang-Cheng Chen:
Guest Editorial Computational Social Systems for COVID-19 Emergency Management and Beyond. IEEE Trans. Comput. Soc. Syst. 8(4): 928-929 (2021) - [j64]Amuleen Gulati, Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Mohammad S. Obaidat, Abderrahim Benslimane:
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles. IEEE Trans. Dependable Secur. Comput. 18(6): 2520-2534 (2021) - [j63]Yuntao Wang, Zhou Su, Ning Zhang, Abderrahim Benslimane:
Learning in the Air: Secure Federated Learning for UAV-Assisted Crowdsensing. IEEE Trans. Netw. Sci. Eng. 8(2): 1055-1069 (2021) - [j62]Peiying Zhang, Chao Wang, Chunxiao Jiang, Abderrahim Benslimane:
Security-Aware Virtual Network Embedding Algorithm Based on Reinforcement Learning. IEEE Trans. Netw. Sci. Eng. 8(2): 1095-1105 (2021) - [j61]Rui Xing, Zhou Su, Qichao Xu, Abderrahim Benslimane:
Truck Platooning Aided Secure Publish/Subscribe System Based on Smart Contract in Autonomous Vehicular Networks. IEEE Trans. Veh. Technol. 70(1): 782-794 (2021) - [c108]Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, Abderrahim Benslimane:
Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach. GLOBECOM 2021: 1-6 - [c107]Samia Boutalbi, Julio César Pérez Carcía, Abderrahim Benslimane:
Blockchain-based secure Handover for IoT using Zero-Knowledge Proof protocol. GLOBECOM 2021: 1-6 - [c106]Julio César Pérez Carcía, Abderrahim Benslimane, Samia Boutalbi:
Blockchain-based system for e-voting using Blind Signature Protocol. GLOBECOM 2021: 1-6 - [c105]Deepanshu Garg, Arvinder Kaur, Abderrahim Benslimane, Rasmeet S. Bali, Neeraj Kumar, Sudeep Tanwar, Joel J. P. C. Rodrigues, Mohammad S. Obaidat:
TruClu: Trust Based Clustering Mechanism in Software Defined Vehicular Networks. GLOBECOM 2021: 1-6 - [c104]Sarkis Moussa, Abderrahim Benslimane, Rony Darazi, Chunxiao Jiang:
Resource allocation for Public Safety Users in the 5G Cellular Network. GLOBECOM 2021: 1-6 - [c103]Zhaoqi Yang, Jun Du, Zhaoyue Xia, Chunxiao Jiang, Abderrahim Benslimane, Yong Ren:
Secure and Cooperative Target Tracking via AUV Swarm: A Reinforcement Learning Approach. GLOBECOM 2021: 1-6 - [c102]Huong Nguyen Minh, Anna Maria Vegni, Valeria Loscrí, Abderrahim Benslimane:
Connectivity Management in an Integrated Heterogeneous Social Networks Framework in Vehicular Environments. GoodIT 2021: 25-30 - [c101]Randa M. Abdelmoneem, Abderrahim Benslimane, Eman Shaaban:
Mobility-Enabled Authentication Scheme for IoT Architecture. ICC 2021: 1-6 - [c100]Liang Xie, Zhou Su, Nan Chen, Qichao Xu, Yixin Fan, Abderrahim Benslimane:
A Game Theory Based Scheme for Secure and Cooperative UAV Communication. ICC 2021: 1-6 - [i1]Jun Du, Chunxiao Jiang, Abderrahim Benslimane, Song Guo, Yong Ren:
SDN-based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach. CoRR abs/2109.12543 (2021) - 2020
- [j60]Dina Tarek, Abderrahim Benslimane, M. Darwish, Amira M. Kotb:
A new strategy for packets scheduling in cognitive radio internet of things. Comput. Networks 178: 107292 (2020) - [j59]Randa M. Abdelmoneem, Abderrahim Benslimane, Eman Shaaban:
Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures. Comput. Networks 179: 107348 (2020) - [j58]Sahand Khodaparas, Abderrahim Benslimane, Saleh Yousefi:
A software-defined caching scheme for the Internet of Things. Comput. Commun. 158: 178-188 (2020) - [j57]Sakil Ahmed Chowdhury, Jeff Frolik, Abderrahim Benslimane:
Coordinating Three-Branch Diversity Switching Using a Hidden Markov Model. IEEE Internet Things J. 7(1): 258-268 (2020) - [j56]Srijit Chowdhury, Abderrahim Benslimane, Chandan Giri:
Noncooperative Gaming for Energy-Efficient Congestion Control in 6LoWPAN. IEEE Internet Things J. 7(6): 4777-4788 (2020) - [j55]Lei Yang, Haipeng Yao, Jingjing Wang, Chunxiao Jiang, Abderrahim Benslimane, Yunjie Liu:
Multi-UAV-Enabled Load-Balance Mobile-Edge Computing for IoT Networks. IEEE Internet Things J. 7(8): 6898-6908 (2020) - [j54]Zubair Md. Fadlullah, Mostafa M. Fouda, Al-Sakib Khan Pathan, Nidal Nasser, Abderrahim Benslimane, Ying-Dar Lin:
Smart IoT Solutions for Combating the COVID-19 Pandemic. IEEE Internet Things Mag. 3(3): 10-11 (2020) - [j53]Anna Maria Vegni, Valeria Loscrì, Abderrahim Benslimane:
SOLVER: A Framework for the Integration of Online Social Networks with Vehicular Social Networks. IEEE Netw. 34(1): 204-213 (2020) - [j52]Yuntao Wang, Zhou Su, Kuan Zhang, Abderrahim Benslimane:
Challenges and Solutions in Autonomous Driving: A Blockchain Approach. IEEE Netw. 34(4): 218-226 (2020) - [j51]Chaimae Boudagdigue, Abderrahim Benslimane, Abdellatif Kobbane, Jiajia Liu:
Trust Management in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 15: 3667-3682 (2020) - [j50]Chunxiao Jiang, Abderrahim Benslimane, Mianxiong Dong, Ekram Hossain:
Guest Editorial: Introduction to the Special Section on Heterogeneous Communications Networks. IEEE Trans. Netw. Sci. Eng. 7(4): 2361-2362 (2020) - [j49]Weiwei Li, Zhou Su, Kuan Zhang, Abderrahim Benslimane, Dongfeng Fang:
Defending Malicious Check-In Using Big Data Analysis of Indoor Positioning System: An Access Point Selection Approach. IEEE Trans. Netw. Sci. Eng. 7(4): 2642-2655 (2020) - [j48]Fatima Hussain, Rasheed Hussain, Alagan Anpalagan, Abderrahim Benslimane:
A New Block-Based Reinforcement Learning Approach for Distributed Resource Allocation in Clustered IoT Networks. IEEE Trans. Veh. Technol. 69(3): 2891-2904 (2020) - [c99]Yuntao Wang, Zhou Su, Ning Zhang, Abderrahim Benslimane:
Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular Energy Networks. CNS 2020: 1-9 - [c98]Yuntao Wang, Zhou Su, Ning Zhang, Abderrahim Benslimane, Ruidong Li, Ying Wang:
Security-Aware Resource Sharing in Software Defined Air-Ground Integrated Networks: A Game Approach. GLOBECOM 2020: 1-6 - [c97]Chaimaa Boudagdigue, Abderrahim Benslimane, Abdellatif Kobbane:
Cluster-based certificate revocation in industrial IOT networks using Signaling game. GLOBECOM 2020: 1-6 - [c96]Ruiyang Duan, Jun Du, Junming Ren, Chunxiao Jiang, Yong Ren, Abderrahim Benslimane:
VoI Based Information Collection for AUV Assisted Underwater Acoustic Sensor Networks. ICC 2020: 1-6 - [c95]Weiwei Li, Zhou Su, Kuan Zhang, Abderrahim Benslimane:
Defending Malicious Check-in Based on Access Point Selection for Indoor Positioning System. ICC 2020: 1-6 - [c94]Dina Tarek, Abderrahim Benslimane, M. Darwish, Amira M. Kotb:
Distributed Packets Scheduling Technique for Cognitive Radio Internet of Things Based on Discrete Permutation Particle Swarm Optimization. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 142-151
2010 – 2019
- 2019
- [j47]Shao-Yu Lien, Yen-Chih Kuo, Der-Jiunn Deng, Hua-Lung Tsai, Alexey V. Vinel, Abderrahim Benslimane:
Latency-Optimal mmWave Radio Access for V2X Supporting Next Generation Driving Use Cases. IEEE Access 7: 6782-6795 (2019) - [j46]Cristanel Razafimandimby, Valeria Loscrí, Anna Maria Vegni, Abderrahim Benslimane:
Neuro-Dominating set scheme for a fast and efficient robot deployment in internet of robotic things. Ad Hoc Networks 86: 36-45 (2019) - [j45]Srijit Chowdhury, Ambarish Roy, Abderrahim Benslimane, Chandan Giri:
On semantic clustering and adaptive robust regression based energy-aware communication with true outliers detection in WSN. Ad Hoc Networks 94 (2019) - [j44]Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Rasheed Hussain, Syed Hassan Ahmed, Abderrahim Benslimane, Carlos T. Calafate, Juan-Carlos Cano, Anna Maria Vegni:
TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles. IEEE Internet Things J. 6(4): 5870-5877 (2019) - [j43]Fekher Khelifi, Abbas Bradai, Abderrahim Benslimane, Priyanka Rawat, Mohamed Atri:
A Survey of Localization Systems in Internet of Things. Mob. Networks Appl. 24(3): 761-785 (2019) - [j42]Lei Xu, Chunxiao Jiang, Nengqiang He, Zhu Han, Abderrahim Benslimane:
Trust-Based Collaborative Privacy Management in Online Social Networks. IEEE Trans. Inf. Forensics Secur. 14(1): 48-60 (2019) - [j41]Qian Luo, Yurui Cao, Jiajia Liu, Abderrahim Benslimane:
Localization and Navigation in Autonomous Driving: Threats and Countermeasures. IEEE Wirel. Commun. 26(4): 38-45 (2019) - [j40]Maurizio Casoni, Song Guo, Abderrahim Benslimane:
Emergency Networks and Future Public Safety Systems. Wirel. Commun. Mob. Comput. 2019: 1647092:1-1647092:2 (2019) - [c93]Hafsa Benaddi, Khalil Ibrahimi, Haytham Dahri, Abderrahim Benslimane:
A Framework to Secure Cluster-Header Decision in Wireless Sensor Network Using Blockchain. ACOSIS 2019: 205-218 - [c92]Sara Benouar, Abderrahim Benslimane:
Robust Blockchain for IoT Security. GLOBECOM 2019: 1-6 - [c91]Sakil Ahmed Chowdhury, Abderrahim Benslimane:
A Markov Model Approach for Managing Switched Antenna Diversity. GLOBECOM 2019: 1-6 - [c90]Jun Du, Chunxiao Jiang, Abderrahim Benslimane, Song Guo, Yong Ren:
Stackelberg Differential Game Based Resource Sharing in Hierarchical Fog-Cloud Computing. GLOBECOM 2019: 1-6 - [c89]Randa M. Abdelmoneem, Abderrahim Benslimane, Eman Shaaban, Sherin Abdel Hamid, Salma A. Ghoneim:
A Cloud-Fog Based Architecture for IoT Applications Dedicated to Healthcare. ICC 2019: 1-6 - [c88]Sahand Khodaparas, Saleh Yousefi, Abderrahim Benslimane:
A Multi Criteria Cooperative Caching Scheme for Internet of Things. ICC 2019: 1-6 - [c87]Kai Zhang, Jun Du, Jingjing Wang, Chunxiao Jiang, Yong Ren, Abderrahim Benslimane:
Distributed Hierarchical Information Acquisition Systems Based on AUV Enabled Sensor Networks. ICC 2019: 1-6 - [c86]Charbel Metrot, Rony Darazi, Abderrahim Benslimane, Elias A. Doumith:
Dynamic AED Allocation and Reallocation for SCA Rescue Using Modified MCLP. ISC2 2019: 310-316 - [c85]Dina Tarek, Abderrahim Benslimane, M. Darwish, Amira M. Kotb:
Cognitive Radio Networks Channel State Estimation Using Machine Learning Techniques. IWCMC 2019: 342-347 - [c84]Xiaoying Qiu, Ting Jiang, Sheng Wu, Chunxiao Jiang, Haipeng Yao, Monson H. Hayes, Abderrahim Benslimane:
Wireless User Authentication Based on KLT and Gaussian Mixture Model. WCNC 2019: 1-5 - [c83]Hafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane, Junaid Qadir:
A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things. WiCON 2019: 73-87 - 2018
- [j39]Sara Benkouider, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahim Benslimane:
Optimal mobile beacon trajectories for nodes localisation in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 29(1/2): 64-76 (2018) - [j38]Basma Mostafa, Abderrahim Benslimane, Mohamed Mostafa Saleh, Sally S. Kassem, Miklós Molnár:
An Energy-Efficient Multiobjective Scheduling Model for Monitoring in Internet of Things. IEEE Internet Things J. 5(3): 1727-1738 (2018) - [j37]Anna Maria Vegni, Valeria Loscrì, Giuseppe Ruggeri, Abderrahim Benslimane, Kwang-Cheng Chen:
Guest Editorial Special Issue on Recent Advances on Social Internet of Vehicles. IEEE Internet Things J. 5(4): 2420-2422 (2018) - [j36]Rasheed Hussain, Donghyun Kim, Junggab Son, Jooyoung Lee, Chaker Abdelaziz Kerrache, Abderrahim Benslimane, Heekuck Oh:
Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds. IEEE Internet Things J. 5(4): 2441-2448 (2018) - [j35]Sameh Zakhary, Abderrahim Benslimane:
On location-privacy in opportunistic mobile networks, a survey. J. Netw. Comput. Appl. 103: 157-170 (2018) - [j34]Han-Chuan Hsieh, Jiann-Liang Chen, Abderrahim Benslimane:
5G Virtualized Multi-access Edge Computing Platform for IoT Applications. J. Netw. Comput. Appl. 115: 94-102 (2018) - [c82]Sakil Ahmed Chowdhury, Abderrahim Benslimane:
Relocating Redundant Sensors in Randomly Deployed Wireless Sensor Networks. GLOBECOM 2018: 1-6 - [c81]Sanghai Guan, Jingjing Wang, Chunxiao Jiang, Zhu Han, Yong Ren, Abderrahim Benslimane:
Colonel Blotto Game Aided Attack-Defense Analysis in Real-World Networks. GLOBECOM 2018: 1-6 - [c80]Sakil Ahmed Chowdhury, Jeff Frolik, Abderrahim Benslimane:
Polarization Matching for Networks Utilizing Tripolar Antenna Systems. GLOBECOM 2018: 206-212 - [c79]Hanane Amirat, Abderrahim Benslimane, Philippe Fournier-Viger, Nasreddine Lagraa:
LocRec: Rule-Based Successive Location Recommendation in LBSN. ICC 2018: 1-6 - [c78]Chaimae Boudagdigue, Abderrahim Benslimane, Abdellatif Kobbane, Mouna Elmachkour:
A Distributed Advanced Analytical Trust Model for IoT. ICC 2018: 1-6 - [c77]Sakil Ahmed Chowdhury, Abderrahim Benslimane, Farzana Akhter:
Autonomous Mobile Chargers for Rechargeable Sensor Networks Using Space Filling Curve. ICC 2018: 1-6 - [c76]Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahim Benslimane, Carlos T. Calafate, Juan-Carlos Cano:
On the Human Factor Consideration for VANETs Security Based on Social Networks. ICC 2018: 1-6 - [c75]Pham Tran Anh Quang, Kamal Deep Singh, Abbas Bradai, Abderrahim Benslimane:
QAAV: Quality of Service-Aware Adaptive Allocation of Virtual Network Functions in Wireless Network. ICC 2018: 1-6 - [c74]Svetlana Ostrovskaya, Oleg Surnin, Rasheed Hussain, Safdar Hussain Bouk, Jooyoung Lee, Narges Mehran, Syed Hassan Ahmed, Abderrahim Benslimane:
Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks. PIMRC 2018: 1-7 - [c73]Guiting Zhong, Jian Yan, Chunxiao Jiang, Linling Kuang, Abderrahim Benslimane:
Space Cloudlet Aided Caching Placement Strategy for Remote Mobile Social Networks. PIMRC 2018: 1776-1781 - [c72]Lohit Kapoor, Anish Jindal, Abderrahim Benslimane, Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Albert Y. Zomaya:
SLOPE: A Self Learning Optimization and Prediction Ensembler for Task Scheduling. WiMob 2018: 1-7 - [c71]Hafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane:
Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN. WINCOM 2018: 1-6 - 2017
- [j33]Abderrahim Benslimane, Huong Nguyen Minh:
Jamming Attack Model and Detection Method for Beacons Under Multichannel Operation in Vehicular Networks. IEEE Trans. Veh. Technol. 66(7): 6475-6488 (2017) - [j32]Abderrahim Benslimane, Hassnaa Moustafa, Ying-Dar Lin, Milena Radenkovic:
Guest Editorial: IoT: Protocol Stack, Cross-Layer, and Power Consumption Issues. IEEE Wirel. Commun. 24(3): 8-9 (2017) - [c70]Fekher Khelifi, Abbas Bradai, Abderrahim Benslimane, Med Lassaad Kaddachi, Mohamed Atri:
Energy-Saving Performance of an Improved DV-Hop Localization Algorithm for Wireless Sensor Networks. GLOBECOM 2017: 1-6 - [c69]Sakil Ahmed Chowdhury, Abderrahim Benslimane, Farzana Akhter:
Throughput maximization of cognitive radio network by conflict-free link allocation using neural network. ICC 2017: 1-6 - [c68]Sakil Ahmed Chowdhury, Abderrahim Benslimane, Farzana Akhter:
Fair and efficient weighted sum rate maximization for multi-rate secondary users in cognitive radio network. ICC 2017: 1-6 - [c67]Walid Khallef, Miklós Molnár, Abderrahim Benslimane, Sylvain Durand:
Multiple constrained QoS routing with RPL. ICC 2017: 1-6 - [c66]Walid Khallef, Miklós Molnár, Abderrahim Benslimane, Sylvain Durand:
On the QoS routing with RPL. PEMWN 2017: 1-5 - 2016
- [j31]Anas Hatim, Said Belkouch, Abderrahim Benslimane, Moha M'rabet Hassani, Tayeb Sadiki:
Efficient architecture for direct 8 × 8 2D DCT computations with earlier zigzag ordering. Multim. Tools Appl. 75(11): 6121-6141 (2016) - [j30]Huong Nguyen Minh, Abderrahim Benslimane, Der-Jiunn Deng:
Reliable broadcasting using polling scheme based receiver for safety applications in vehicular networks. Veh. Commun. 4: 1-14 (2016) - [j29]Himan Zarza, Saleh Yousefi, Abderrahim Benslimane:
RIALS: RSU/INS-aided localization system for GPS-challenged road segments. Wirel. Commun. Mob. Comput. 16(10): 1290-1305 (2016) - [c65]Abderrezak Rachedi, Abderrahim Benslimane:
Multi-objective optimization for security and QoS adaptation in Wireless Sensor Networks. ICC 2016: 1-7 - [c64]A. Aly Halim, Christel Dartigues-Pallez, Frédéric Precioso, Michel Riveill, Abderrahim Benslimane, Salma A. Ghoneim:
Human action recognition based on 3D skeleton part-based pose estimation and temporal multi-resolution analysis. ICIP 2016: 3041-3045 - [c63]Basma Mostafa, Abderrahim Benslimane, E. Boureau, Miklós Molnár, Mohamed Mostafa Saleh:
Distributed monitoring in 6LoWPAN based Internet of Things. MoWNet 2016: 1-7 - [c62]Sakil Ahmed Chowdhury, Abderrahim Benslimane:
Recharging of Wireless Sensor Network using KMEC with dynamic active zone strategy. WiMob 2016: 1-6 - 2015
- [j28]Safa Hamdoun, Abderrezak Rachedi, Abderrahim Benslimane:
RSSI-based localisation algorithms using spatial diversity in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 19(3/4): 157-167 (2015) - [j27]Abbas Bradai, Abderrahim Benslimane, Kamal Deep Singh:
Dynamic anchor points selection for mobility management in Software Defined Networks. J. Netw. Comput. Appl. 57: 1-11 (2015) - [j26]Che-Yu Chang, Hsu-Chun Yen, Abderrahim Benslimane, Der-Jiunn Deng:
A Pragmatic VBR Stream Scheduling Policy for IEEE 802.11e HCCA Access Method. IEEE Trans. Emerg. Top. Comput. 3(4): 514-523 (2015) - [j25]Milena Radenkovic, Abderrahim Benslimane, Derek McAuley:
Reputation Aware Obfuscation for Mobile Opportunistic Networks. IEEE Trans. Parallel Distributed Syst. 26(1): 230-240 (2015) - [c61]Huong Nguyen Minh, Abderrahim Benslimane, Milena Radenkovic:
Social delay tolerant approach for safety services in vehicular networks. IWCMC 2015: 1199-1204 - [c60]Fatima Zohra Bousbaa, Fen Zhou, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahim Benslimane:
Reducing transmission interferences for safety message dissemination in VANETs. IWCMC 2015: 1205-1210 - [c59]Huong Nguyen Minh, Abderrahim Benslimane, Abderrezak Rachedi:
Jamming detection on 802.11p under multi-channel operation in vehicular networks. WiMob 2015: 764-770 - 2014
- [j24]Abderrahim Benslimane, Abderrezak Rachedi:
Rate adaptation scheme for IEEE 802.11-based MANETs. J. Netw. Comput. Appl. 39: 126-139 (2014) - [j23]Abderrahim Benslimane, Jiankun Hu, Xuemin (Sherman) Shen:
Special issue on "quality of service in wireless and mobile networking". J. Netw. Comput. Appl. 46: 250-251 (2014) - [j22]Abderrezak Rachedi, Hakim Badis, Abderrahim Benslimane:
How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks. J. Netw. Comput. Appl. 46: 395-406 (2014) - [j21]Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith, Abderrezak Rachedi:
A secure cluster-based architecture for certificates management in vehicular networks. Secur. Commun. Networks 7(3): 665-683 (2014) - [j20]Sameh Zakhary, Milena Radenkovic, Abderrahim Benslimane:
Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks. IEEE Trans. Veh. Technol. 63(2): 893-906 (2014) - [j19]Abbas Bradai, Toufik Ahmed, Abderrahim Benslimane:
ViCoV: Efficient video streaming for cognitive radio VANET. Veh. Commun. 1(3): 105-122 (2014) - [j18]Abderrahim Benslimane, Clément Saad, Jean-Claude König, Mohammed Boulmalf:
Cooperative localization techniques for wireless sensor networks: free, signal and angle based techniques. Wirel. Commun. Mob. Comput. 14(17): 1627-1646 (2014) - [c58]Ferdews Tlili, Abderrezak Rachedi, Abderrahim Benslimane:
Time-bounded localization algorithm based on distributed Multidimensional Scaling for Wireless Sensor Networks. ICC 2014: 233-238 - [c57]Huong Nguyen Minh, Abderrahim Benslimane:
Polling scheme for reliable broadcasting in vehicular networks. ICC 2014: 330-335 - [e1]Abderrahim Benslimane:
International Conference on Selected Topics in Mobile and Wireless Networking, MoWNet 2014, Rome, Italy, September 8-9, 2014. Procedia Computer Science 40, Elsevier 2014 [contents] - 2013
- [c56]Fen Zhou, Abderrahim Benslimane:
Reliable safety message dissemination with minimum energy in VANETs. GLOBECOM 2013: 587-592 - [c55]Milena Radenkovic, Ivan Vaghi, Sameh Zakhary, Abderrahim Benslimane:
AdaptAnon: Adaptive anonymity for service queries in mobile opportunistic networks. ICC 2013: 1839-1844 - [c54]Sameh Zakhary, Milena Radenkovic, Abderrahim Benslimane:
The quest for location-privacy in opportunistic mobile social networks. IWCMC 2013: 667-673 - 2012
- [c53]Tahani Gazdar, Abderrezak Rachedi, Abderrahim Benslimane, Abdelfettah Belghith:
A distributed advanced analytical trust model for VANETs. GLOBECOM 2012: 201-206 - [c52]Tahani Gazdar, Abderrahim Benslimane, Abderrezak Rachedi, Abdelfettah Belghith:
A trust-based architecture for managing certificates in vehicular ad hoc networks. ICCIT 2012: 180-185 - [c51]Yung-Cheng Chu, Fred Nen-Fu Huang, Abderrahim Benslimane:
A mobility-adaptive information reduction scheme for vehicle safety communications on highways. ITST 2012: 722-726 - [c50]Amal Abdelkarim, Abderrahim Benslimane, Issam Mabrouki, Abdelfettah Belghith:
SecAT-Dist: A Novel Secure AT-Dist Localization Scheme for Wireless Sensor Networks. VTC Fall 2012: 1-5 - 2011
- [j17]Abderrahim Benslimane, Tarik Taleb, Rajarajan Sivaraj:
Dynamic Clustering-Based Adaptive Mobile Gateway Management in Integrated VANET - 3G Heterogeneous Wireless Networks. IEEE J. Sel. Areas Commun. 29(3): 559-570 (2011) - [j16]Abderrahim Benslimane, Saman Barghi, Chadi Assi:
An efficient routing protocol for connecting vehicular networks to the Internet. Pervasive Mob. Comput. 7(1): 98-113 (2011) - [c49]Abderrahim Benslimane, Abdelouahid El Yakoubi, Mohammed Bouhorma:
Analysis of Jamming Effects on IEEE 802.11 Wireless Networks. ICC 2011: 1-5 - [c48]Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith:
Secure Clustering Scheme Based Keys Management in VANETs. VTC Spring 2011: 1-5 - 2010
- [j15]Tahani Gazdar, Abdelfettah Belghith, Abderrahim Benslimane:
A Distributed Secure Architecture for Vehicular Ad Hoc Networks. Int. J. Bus. Data Commun. Netw. 6(4): 38-63 (2010) - [j14]Abderrahim Benslimane, Chadi Assi, Eitan Altman, Hsiao-Hwa Chen:
Guest Editorial: Special Issue "SM 85-Wireless and Mobile Computing, Networking and Communications". Mob. Networks Appl. 15(2): 187-190 (2010) - [j13]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs. Mob. Networks Appl. 15(2): 191-204 (2010) - [j12]Abderrahim Benslimane, Chadi Assi, Fred Nen-Fu Huang, Stamatios V. Kartalopoulos:
Special issue on security in mobile wireless networks. Secur. Commun. Networks 3(2-3): 99-101 (2010) - [j11]Abderrezak Rachedi, Abderrahim Benslimane:
A secure and resistant architecture against attacks for mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 150-166 (2010) - [j10]Tarik Taleb, Abderrahim Benslimane, Khaled Ben Letaief:
Toward an Effective Risk-Conscious and Collaborative Vehicular Collision Avoidance System. IEEE Trans. Veh. Technol. 59(3): 1474-1486 (2010) - [c47]Tahani Gazdar, Abdelfettah Belghith, Abderrahim Benslimane:
A cluster based secure architecture for vehicular ad hoc networks. AICCSA 2010: 1-8 - [c46]Tarik Taleb, Yassine Hadjadj Aoul, Abderrahim Benslimane:
Integrating Security with QoS in Next Generation Networks. GLOBECOM 2010: 1-5 - [c45]Tarik Taleb, Abderrahim Benslimane:
Design Guidelines for a Network Architecture Integrating VANET with 3G & beyond Networks. GLOBECOM 2010: 1-5 - [c44]Abderrahim Benslimane, Ali Miri:
Welcome message from the general chairs. WiMob 2010: 1-5
2000 – 2009
- 2009
- [j9]Mustapha Boushaba, Abdelhakim Hafid, Abderrahim Benslimane:
High accuracy localization method using AoA in sensor networks. Comput. Networks 53(18): 3076-3088 (2009) - [j8]Abderrahim Benslimane, Chadi Assi, Ekram Hossain, Mehmet C. Vuran:
Special issue of "Computer Communications" on Cognitive Radio and Dynamic Spectrum Sharing Systems. Comput. Commun. 32(18): 1903-1904 (2009) - [j7]Abderrezak Rachedi, Abderrahim Benslimane:
Toward a cross-layer monitoring process for mobile ad hoc networks. Secur. Commun. Networks 2(4): 351-368 (2009) - [j6]Abderrezak Rachedi, Abderrahim Benslimane:
Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC. Wirel. Commun. Mob. Comput. 9(4): 469-488 (2009) - [c43]Abderrahim Benslimane, Arshad Ali, Abdellatif Kobbane, Tarik Taleb:
A new opportunistic MAC layer protocol for cognitive IEEE 802.11-based wireless networks. PIMRC 2009: 2181-2185 - [c42]Eric Astier, Abdelhakim Hafid, Abderrahim Benslimane:
Energy and mobility aware clustering technique for multicast routing protocols in wireless ad hoc networks. WCNC 2009: 2150-2155 - [c41]Saman Barghi, Abderrahim Benslimane, Chadi Assi:
A lifetime-based routing protocol for connecting VANETs to the Internet. WOWMOM 2009: 1-9 - 2008
- [j5]Clément Saad, Abderrahim Benslimane, Jean-Claude König:
AT-Dist: Distributed Localization Method with High Accuracy in Sensor Networks. Stud. Inform. Univ. 6(1): 14-39 (2008) - [j4]Lei Guang, Chadi M. Assi, Abderrahim Benslimane:
Enhancing IEEE 802.11 Random Backoff in Selfish Environments. IEEE Trans. Veh. Technol. 57(3): 1806-1822 (2008) - [j3]Lei Guang, Chadi Assi, Abderrahim Benslimane:
MAC layer misbehavior in wireless networks: challenges and solutions. IEEE Wirel. Commun. 15(4): 6-14 (2008) - [c40]Clément Saad, Abderrahim Benslimane, Julien Champ, Jean-Claude König:
Ellipse Routing: A Geographic Routing Protocol for Mobile Sensor Networks with Uncertain Positions. GLOBECOM 2008: 78-82 - [c39]Abderrezak Rachedi, Abderrahim Benslimane:
Security and Pseudo-Anonymity with a Cluster-Based Approach for MANET. GLOBECOM 2008: 1956-1961 - [c38]Abderrahim Benslimane, Abderrezak Rachedi, D. Diwakar:
Relative Fairness and Optimized throughput for Mobile Ad Hoc Networks. ICC 2008: 2233-2237 - [c37]Clément Saad, Abderrahim Benslimane, Jean-Claude König:
AT-Angle: A distributed method for localization using angles in sensor networks. ISCC 2008: 1190-1195 - [c36]Abderrahim Benslimane:
Message from the General Chair. WiMob 2008 - [c35]Abderrezak Rachedi, Abderrahim Benslimane, Hadi Otrok, Noman Mohammed, Mourad Debbabi:
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks. WiMob 2008: 417-422 - 2007
- [c34]Abderrahim Benslimane, Cédric Ferraris, Abdelhakim Hafid:
A Comparative Analysis of Multicast Protocols for Small MANET Groups. ADHOC-NOW 2007: 213-225 - [c33]Abderrahim Benslimane, Cédric Ferraris, Abdelhakim Hafid:
EM2NET: An Energy-Saving Explicit Multicast Protocol for MANETs. GLOBECOM 2007: 592-597 - [c32]Abderrezak Rachedi, Abderrahim Benslimane:
Cross-Layer Approach to Improve the Monitoring Process for Mobile Ad Hoc Networks Based on IEEE 802.11. GLOBECOM 2007: 1086-1091 - [c31]Abderrezak Rachedi, Abderrahim Benslimane, Lei Guang, Chadi Assi:
A Confident Community to Secure Mobile Ad Hoc Networks. ICC 2007: 1254-1259 - [c30]Mustapha Boushaba, Abderrahim Benslimane, Abdelhakim Hafid:
A2L: Angle to Landmarks Based Method Positioning for Wireless Sensor Networks. ICC 2007: 3301-3306 - [c29]Mustapha Boushaba, Abdelhakim Hafid, Abderrahim Benslimane:
HA-A2L: angle to landmark-based high accuracy localization method in sensor networks. IWCMC 2007: 475-480 - [c28]Cédric Ferraris, Abdelhakim Hafid, Abderrahim Benslimane:
A Hybrid Mesh-Explicit Multicast Protocol for MANETs. MWCN 2007: 131-135 - [c27]Clément Saad, Abderrahim Benslimane, Jean-Claude König:
A Distributed Method to Localization for Mobile Sensor Networks. WCNC 2007: 3058-3063 - 2006
- [c26]Abderrezak Rachedi, Abderrahim Benslimane:
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. ICSNC 2006: 72 - [c25]Abderrahim Benslimane:
EM2NET: an explicit multicast for MANET. IWCMC 2006: 431-436 - [c24]Abderrezak Rachedi, Abderrahim Benslimane:
A Secure Architecture for Mobile Ad Hoc Networks. MSN 2006: 424-435 - [c23]Lei Guang, Chadi Assi, Abderrahim Benslimane:
Interlayer Attacks in Mobile Ad Hoc Networks. MSN 2006: 436-448 - [c22]Rachid El Azouzi, Thierry Peyre, Abderrahim Benslimane:
Optimal design of hybrid FEC/ARQ schemes for real-time applications in wireless networks. WMuNeP 2006: 11-18 - [c21]Lei Guang, Chadi Assi, Abderrahim Benslimane:
Modeling and analysis of predictable random backoff in selfish environments. MSWiM 2006: 86-90 - [c20]Clément Saad, Abderrahim Benslimane, Jean-Claude König:
MuR: A Distributed Preliminary Method For Location Techniques in Sensor Networks. WiMob 2006: 61-68 - 2005
- [c19]Abderrahim Benslimane:
Localization in Vehicular Ad Hoc Networks. Systems Communications 2005: 19-25 - [c18]Eitan Altman, Dhiman Barman, Abderrahim Benslimane, Rachid El Azouzi:
Slotted Aloha with Priorities and Random Power. NETWORKING 2005: 610-622 - 2004
- [c17]Abderrahim Benslimane:
Optimized Dissemination of Alarm Messages in Vehicular Ad-Hoc Networks (VANET). HSNMC 2004: 655-666 - 2003
- [c16]Abderrahim Benslimane, Abdelmalik Bachir:
Inter-vehicle Geocast Protocol Supporting Non-equipped GPS Vehicles. ADHOC-NOW 2003: 281-286 - [c15]Abderrahim Benslimane, Omar Moussaoui:
A Scalable Multicast Protocol with QoS Guaranties. Net-Con 2003: 1-13 - [c14]Abderrahim Benslimane, Omar Moussaoui:
A Hierarchical Architecture for a Scalable Multicast. ISCIS 2003: 643-650 - [c13]Abdelmalik Bachir, Abderrahim Benslimane:
Towards Supporting GPS-unequipped Vehicles in Inter-Vehicle Geocast . LCN 2003: 766-767 - 2002
- [j2]Abderrahim Benslimane, Abdelhafid Abouaissa:
Dynamical grouping model for distributed real time causal ordering. Comput. Commun. 25(3): 288-302 (2002) - 2001
- [j1]Abderrahim Benslimane:
Multimedia Multicast in Mobile Computing: Handoff Management. Ann. Softw. Eng. 12(1): 77-93 (2001) - 2000
- [c12]Abderrahim Benslimane:
A Multimedia Synchronization Protocol for Multicast Group. EUROMICRO 2000: 1456- - [c11]Abderrahim Benslimane:
A Multicast Synchronization Protocol for Multiple Distributed Multimedia Streams. HiPC 2000: 469-476 - [c10]Abderrahim Benslimane:
Real Time Multicast in Wireless Networks. LCN 2000: 272-280 - [c9]Abderrahim Benslimane:
Multimedia Multicast in Mobile Computing. ISMSE 2000: 339-346
1990 – 1999
- 1999
- [c8]Abdelhafid Abouaissa, Abderrahim Benslimane:
A grouping model for distributed real time causal ordering. ICCCN 1999: 174-179 - [c7]Abdelhafid Abouaissa, Abderrahim Benslimane:
A multicast synchronization protocol for real time distributed systems. ICON 1999: 21-28 - [c6]Abderrahim Benslimane, Abdelhafid Abouaissa:
A Synchronization Protocol for Group Communication Systems. MASCOTS 1999: 322-329 - 1998
- [c5]Abdelhafid Abouaissa, Abderrahim Benslimane, Mohamed Naimi:
A Group Communication Model for Distributed Real-Time Causal Delivery. ICCCN 1998: 918-925 - [c4]Abdelhafid Abouaissa, Abderrahim Benslimane:
Hierarchical Architecture for Real Time Causal Delivery. LCN 1998: 374-383 - 1994
- [c3]Abderrahim Benslimane:
Deciding Boundedness for Systems of two Linear Communicating Fine State Machines. CAST 1994: 108-122 - [c2]Abderrahim Benslimane:
Deciding Boundedness for Systems of Two Communicating Finite State Machines. HPDC 1994: 262-269 - [c1]Abderrahim Benslimane:
Protocol Validation: A Parallel Technique to Reduce the Reachability Tree. PARLE 1994: 109-121
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint