Amel Meddeb-Makhlouf
Orcid: 0000-0003-0551-4927
According to our database1,
Amel Meddeb-Makhlouf
authored at least 54 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammers.
Serv. Oriented Comput. Appl., September, 2024
2023
Int. J. Inf. Sec., December, 2023
Int. J. Mob. Commun., 2023
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
Trans. Emerg. Telecommun. Technol., 2022
Review of Authentication with Privacy-preserving Schemes for 5G-enabled Vehicular Networks.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
Proceedings of the 19th International Multi-Conference on Systems, Signals & Devices, 2022
2021
Int. J. Commun. Networks Inf. Secur., 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
2020
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020
Proceedings of the Network and Parallel Computing, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Comparative Study of Classification Algorithms for Cloud IDS using NSL-KDD Dataset in WEKA.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the Impact of Digital Technologies on Public Health in Developed and Developing Countries, 2020
Proceedings of the 17th International Multi-Conference on Systems, Signals & Devices, 2020
2019
Int. J. Sens. Networks, 2019
Int. J. Secur. Networks, 2019
Int. J. Inf. Sec., 2019
Hum. centric Comput. Inf. Sci., 2019
Dynamic Scheduling Algorithm based on Priority Assignment for LTE-V2X vehicular Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Risk-based Decision for a Distributed and Cooperative network policy in Cloud Computing.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017
2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
2009
EURASIP J. Adv. Signal Process., 2009
2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of the Global Communications Conference, 2007
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005