Faouzi Zarai

Orcid: 0000-0001-9250-7885

According to our database1, Faouzi Zarai authored at least 155 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Cloud Gaming Experience through Optimized Virtual Machine Placement: A Comprehensive Review.
J. Netw. Syst. Manag., October, 2024

QoS-based handover approach for 5G mobile communication system.
Int. J. Wirel. Mob. Comput., 2024

Variable Neighborhood Search-based Resource Allocation for Vehicle-to-Everything Communications.
Proceedings of the 27th IEEE International Symposium on Real-Time Distributed Computing, 2024

2023
CADS-ML/DL: efficient cloud-based multi-attack detection system.
Int. J. Inf. Sec., December, 2023

Resource allocation for Vehicle-to-Everything communications: A survey.
IET Networks, May, 2023

IoT Routing Attacks Detection Using Machine Learning Algorithms.
Wirel. Pers. Commun., February, 2023

Layer-based cooperation for intrusion detection in mobile cloud environment.
Int. J. Mob. Commun., 2023

Multi-layer neural network algorithm for vehicle-to-everything communication in 5G networks.
Int. J. Commun. Syst., 2023

QTc-Based Machine Learning Analysis of COVID-19 and Post-COVID-19 Patients.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

COVID-19 Patient Secure Classification Based on ANN and Risk Analysis.
Proceedings of the IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2023

Blockchain-Based Trust Management for IoMT Environment.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023

Efficient MIH/SDN-Based Vertical Handover for 5G HetNets.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023

IoT botnet detection using deep learning.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Deep Reinforcement Learning Based Handover management for Vehicular Platoon.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Performance Study in HetNets Using Dual Connectivity and Deep Reinforcement Learning.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Transfer learning-based Mirai botnet detection in IoT networks.
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023

Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

New Polar code for 5G New Radio Network.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
Fog-cloud distributed intrusion detection and cooperation.
Trans. Emerg. Telecommun. Technol., 2022

Deep Reinforcement Learning for Downlink Resource Allocation in Vehicular Small Cell Networks.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

2021
Chaotic Grey Wolf Optimization-based resource allocation for Vehicle-to-Everything communications.
Int. J. Commun. Syst., 2021

Secure architecture for Cloud/Fog computing based on firewalls and controllers.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

SACP: Secure Access Control Protocol.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

2020
New Bandwidth Upgradation and Degradation Algorithms for Next Generation of Wireless Network Systems.
Wirel. Pers. Commun., 2020

Radio resource management for vehicular communication via cellular device to device links: review and challenges.
Telecommun. Syst., 2020

An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks.
IET Inf. Secur., 2020

Multiobjective optimization-based radio resource allocation and sharing algorithm for D2D-based V2V communication.
Trans. Emerg. Telecommun. Technol., 2020

A Learning based Secure Anomaly Detection for Healthcare Applications.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Learning-Based Evaluation of Routing Protocol in Vehicular Network Using WEKA.
Proceedings of the Network and Parallel Computing, 2020

Interference Mitigation based on NOMA for Scheduling Algorithm in V2X Environments.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Comparative Study of Classification Algorithms for Cloud IDS using NSL-KDD Dataset in WEKA.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Genetic Algorithm based Resource Allocation for V2X Communications.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020

A Genetic Algorithm For Solving the Radio Network Planning Problem in 5G Cellular Networks.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
A Survey on Radio Resource Allocation for V2X Communication.
Wirel. Commun. Mob. Comput., 2019

MIH/SDN-Based Vertical Handover Approach for 5G Mobile Networks.
J. Inf. Sci. Eng., 2019

Optimized Handover Mechanism in Heterogeneous Vehicular Communication Systems.
J. Inf. Sci. Eng., 2019

Ant Colony Optimization-based Resource Allocation and Resource Sharing Scheme for V2V Communication.
J. Inf. Sci. Eng., 2019

DVF-fog: distributed virtual firewall in fog computing based on risk analysis.
Int. J. Sens. Networks, 2019

OAP-WMN: optimised and secure authentication protocol for wireless mesh networks.
Int. J. Secur. Networks, 2019

SDN/NFV-based handover management approach for ultradense 5G mobile networks.
Int. J. Commun. Syst., 2019

Swarm intelligence-based radio resource management for V2V-based D2D communication.
Int. J. Commun. Syst., 2019

TACRM: trust access control and resource management mechanism in fog computing.
Hum. centric Comput. Inf. Sci., 2019

Secure Reactive Fast Proxy MIPv6-Based Network Mobility (SRFP-NEMO) for Vehicular Ad-hoc Networks (VANETs).
Ad Hoc Sens. Wirel. Networks, 2019

Handover Management Approach for 5G Software Defined Vehicular Networks: A Scheme and Simulation Analysis.
Proceedings of the 9th International Conference on Simulation and Modeling Methodologies, 2019

Ultra Reliable Communication : Availability Analysis in 5G Cellular Networks.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

Dynamic Scheduling Algorithm based on Priority Assignment for LTE-V2X vehicular Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Efficient Scheduling and Resource Allocation for D2D-based LTE-V2X Communications.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Securing Fast PMIPv6 protocol in case of Vertical HandOver in 5G network.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Reinforcement Learning-based Radio Resource Management Algorithm for D2D-based V2V Communication.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Semidefinite Relaxation of a Joint Beamforming and Power Control for Downlink V2X Communications.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Adaptive Radio Resource Management Scheme in 5G networks support for IoT Applications.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

New Architecture for Multi-hop Cellular Networks.
Proceedings of the 26th International Conference on Telecommunications, 2019

Enhancing ANDSF for Extended Wi-Fi Coverage.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

NOMA Based on Dynamic Scheduling Algorithm with Priority Assignment for V2X Communications.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
An enhanced radio resource management based MIH policies in heterogeneous wireless networks.
Telecommun. Syst., 2018

QoS Aware Predictive Radio Resource Management Approach Based on MIH Protocol.
IEEE Syst. J., 2018

Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network.
Int. J. Commun. Syst., 2018

Smart mobility management in 5G heterogeneous networks.
IET Networks, 2018

Improved Mutual Authentication in VANETs.
Ad Hoc Sens. Wirel. Networks, 2018

New Approach for Mobility Management in Openflow/Software-Defined Networks.
Proceedings of 8th International Conference on Simulation and Modeling Methodologies, 2018

Dual Metric scheduling based on Quality of service and Power Control for network assisted D2D communications.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Risk-based Decision for a Distributed and Cooperative network policy in Cloud Computing.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environment.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Model of Role-Risk Based Intrusion Prevention for Cloud Environment.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Radio Resource Allocation Algorithm for Device to Device based on LTE-V2X Communications.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Efficient Radio Resource Management for D2D-based LTE-V2X communications.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

Distributed Firewall and Controller for Mobile Cloud Computing.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

A Trust-based Access Control Scheme for e-Health Cloud.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

Power Control Method Based on Users and Applications QoS Priorities(UAQP) in Femtocell Network.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

Distributed and Cooperative firewall/controller in cloud environments.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
3GPP LTE-Advanced Congestion Control Based on MIH Protocol.
IEEE Syst. J., 2017

Cross layer architecture with integrated MIH in heterogeneous wireless networks.
Comput. Networks, 2017

Secure and Reliable Multi-Path Routing Protocol for Multi-Hop Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Multi-layer Cooperative Intrusion Detection System for Cloud Environment.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A MIH-based Framework for Network Selection in Future HetNets.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Q-learning-based Scheduler Technique for LTE and LTE-Advanced Network.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

5G Cellular: Survey on Some Challenging Techniques.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

Opportunistic Dual Metric scheduling based on Quality of service and Power Control for LTE uplink network.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

QoS enhancement based on resource allocation in wireless networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Comparative analysis of downlink scheduling algorithms for LTE femtocells networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

A Seamless Mobility Mechanism for V2V Communications.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

"Private and Secure ICMP Message" Solution for IP Traceback in Wireless Mesh Network.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

Cell Performance-Optimization Scheduling Algorithm Using Reinforcement Learning for LTE-Advanced Network.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

Visiting Mobile Node Authentication Protocol for Proxy MIPv6-Based NEtwork MObility.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Shortest and secure routing protocol for multi-hop cellular networks (SSRP-MCN).
Secur. Commun. Networks, 2016

A new multi-rat scheduling algorithm for heterogeneous wireless networks.
J. Syst. Softw., 2016

Enhanced IEEE 802.21 Handover Design for QoS Support in Next Generation Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2016

HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Cooperative Radio Resources Allocation in LTE_A Networks within MIH Framework: A Scheme and Simulation Analysis.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016

Cooperative Radio Resources Allocation and Congestion Prevention Scheme for LTE-A.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016

Energy, load, and QoS-aware routing protocol for Ad Hoc networks.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Anonymous and secure on-demand routing protocol for multi-hop cellular networks.
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016

User admission maximization based on ressource allocation in wireless networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secret Zeckendorf number solution for IP traceback in Wireless Mesh Networks.
Proceedings of the 2nd International Conference on Advanced Technologies for Signal and Image Processing, 2016

Interference-limited radio resources allocation in LTE_A system with MIH cooperation.
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016

2015
A new secure and efficient scheme for network mobility management.
Secur. Commun. Networks, 2015

Capacity Analysis in the Next Generation Wireless Networks Based on SINR Constraints.
J. Networks, 2015

Network Selection in Heterogeneous Wireless System Environments.
J. Networks, 2015

Improved IPSec tunnel establishment for 3GPP-WLAN interworking.
Int. J. Commun. Syst., 2015

An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis.
Proceedings of the SIMULTECH 2015 - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Colmar, Alsace, France, 21, 2015

All-in-one binary word solution for IP traceback in Wireless Mesh Network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Markov model-based adaptive CAC scheme for 3GPP LTE femtocell networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Secure and Optimal Routing Protocol for Multi-Hop Cellular Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Performance Evaluation of a Decoupled-Level with QoS-Aware Downlink Scheduling Algorithm for LTE Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

A MSCTP-Based Authentication Protocol: MSCTPAP.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Enhanced MIH Architecture-Aware Radio Resource Management Approach in NGWNs.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network.
Proceedings of the International Conference on Computer, 2015

2014
Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks.
J. Supercomput., 2014

A MIH-based approach for best network selection in heterogeneous wireless networks.
J. Syst. Softw., 2014

An efficient design and validation technique for secure handover between 3GPP LTE and WLANs systems.
J. Syst. Softw., 2014

Adaptive call admission control in 3GPP LTE networks.
Int. J. Commun. Syst., 2014

A novel media independent handover-based approach for vertical handover over heterogeneous wireless networks.
Int. J. Commun. Syst., 2014

Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations.
Proceedings of the WINSYS 2014, 2014

Secure micro mobility protocol for new generation wireless network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Secure macro mobility protocol for new generation access network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A SCTP-based Authentication Protocol: SCTPAP.
Proceedings of the DCNET 2014, 2014

A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

ISEND: An Improved Secure Neighbor Discovery Protocol for Wireless Networks.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Optimized MIH-assisted P-NEMO design for vertical handover over heterogeneous network mobility.
Proceedings of the IEEE International Conference on Communications, 2014

Optimizing handover decision and target selection in LTE-A network-based on MIH protocol.
Proceedings of the IEEE International Conference on Communications, 2014

Call admission control and adaptive bandwidth management approach for HWNs.
Proceedings of the IEEE Global Communications Conference, 2014

Power and Delay-aware Multi-Path Routing Protocol for Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2014

A novel vertical handoff decision making algorithm across Heterogeneous Wireless Networks.
Proceedings of the International Conference on Computer, 2014

Power and Delay-Aware Routing Protocol for Ad Hoc Networks.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Secured and fast handoff in wireless mesh networks.
Secur. Commun. Networks, 2013

HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol.
Proceedings of the SIMULTECH 2013, 2013

Capacity Analysis of Heterogeneous Wireless Networks under SINR Interference Constraints.
Proceedings of the SIGMAP and WINSYS 2013, 2013

End-to-end delay distribution in wireless heterogeneous networks.
Proceedings of IEEE International Conference on Communications, 2013

Re-authentication protocol from WLAN to LTE (ReP WLAN-LTE).
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks.
Proceedings of the International Conference on Computer, 2013

Secure and integrated handover authentication scheme with FMIPv6.
Proceedings of the International Conference on Computer, 2013

2012
Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks.
Proceedings of the SIGMAP and WINSYS 2012, 2012

Architecture of mobile node in heterogeneous networks.
Proceedings of the International Conference on Communications and Information Technology, 2012

Secure handoff protocol in 3GPP LTE networks.
Proceedings of the Third International Conference on Communications and Networking, 2012

2011
Re-authentication Protocol for Vertical Handoff in Heterogeneous Wireless Networks.
Proceedings of the Mobile Lightweight Wireless Systems, 2011

Design and Implementation of a Simulation Environment for the Evaluation of Authentication Protocols in IEEE 802.11s Networks.
Proceedings of the Mobile Lightweight Wireless Systems, 2011

2010
Heterogeneous Wireless Networks: Configuration and Vertical Handoff Management.
Wirel. Pers. Commun., 2010

Efficient Mac Layer handoff management scheme for Wireless Mesh Networks.
Proceedings of the 17th International Conference on Telecommunications, 2010

SWMM: Secure Wireless Mobility Management.
Proceedings of the 17th International Conference on Telecommunications, 2010

2009
Multi-criteria dynamic access selection in heterogeneous wireless networks.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

Reducing handoff blocking probability in fourth generation wireless networks.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

2008
Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis.
Comput. Commun., 2008

Best Video Stream Variation Selection in Wireless Networks.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Provision of quality of service in wireless fourth generation networks.
Int. J. Commun. Syst., 2007

Location Management in Wireless Fourth Generation Networks.
Proceedings of the Global Communications Conference, 2007

2006
WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis.
Simul., 2006

Performance evaluation of a novel scheme for QoS provision in UTRA TDD.
Comput. Commun., 2006

Secured and Seamless Handoff in Wireless Fourth Generation Systems.
Proceedings of the 13th IEEE International Conference on Electronics, 2006

2005
SDPPM: An IP traceback scheme for MANET.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Provision of quality of service in open wireless architectures.
Proceedings of the 12th IEEE International Conference on Electronics, 2005


  Loading...