Abdelghani Bouras
Orcid: 0000-0003-1372-9725
According to our database1,
Abdelghani Bouras
authored at least 14 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the 37th ECMS International Conference on Modelling and Simulation, 2023
2022
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media.
IEEE Access, 2022
2021
J. Artif. Intell. Soft Comput. Res., 2021
A new transformation approach for complex systems modelling and simulation: application to industrial control system.
Int. J. Simul. Process. Model., 2021
2020
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020
Collaboration Mechanism for Shared Returnable Transport Items in Closed Loop Supply Chains.
Proceedings of the 9th International Conference on Operations Research and Enterprise Systems, 2020
2016
Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2016
2015
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems.
Secur. Commun. Networks, 2015
Quality tools to improve the communication level in the surgery department at a local hospital.
Comput. Hum. Behav., 2015
2014
Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 21st International Conference on Telecommunications, 2014
2013
Hybrid chaos optimization and affine scaling search algorithm for solving linear programming problems.
Appl. Soft Comput., 2013
2011
Proceedings of the 13th UKSim-AMSS International Conference on Computer Modelling and Simulation, Cambridge University, Emmanuel College, Cambridge, UK, 30 March, 2011
2009
Proceedings of the Third International Conference on Network and System Security, 2009